Chapter 11 Kizza
| | | | |1. Briefly state the main idea of this chapter. | | | Chapter 11 in Kizza is about the ethical issues that apply to | | |cyberspace, IPR, social networking global ethics.
Kizza describes | | |safeguards and the continual process of security. The global ethics | | |portion of the issue is mostly cultures, language, privacy, IP rights | | |and censorship. In this chapter Kizza gives the reader and | | |understanding of cyberspace and some of the threats posed.
Kizza also| | |explains why the cultural differences brinf forth some issues. | | | | | | | | | |2.
List three important facts that the author uses to support the main idea: | | A. The detection and prevention of computer crimes in cyberspace is a daunting job that requires advance techniques and prevention | |methods. | | B. System and network scanning for vulnerability is an automated process where a scanning program sends network traffic to all computers | |or selected computers in the network and expects receiving return traffic that will indicate whether those computers have known | vulnerabilities. | | C. As growth of online social networks skyrocketed so did privacy and other social concerns for the user and other innocent bystanders. | |3. What information or ideas discussed in this chapter are also discussed in readings from DePalma? | | | |Article 25 in DePalma talks about the business of spying on the internet. Just like Kizza this article speaks to privacy issues and security | |problems with the internet. These articles could go hand in hand to help the reader understand the threats posed to them.
The internet has | |the ability to ruin a person life if their information is stolen. | | | |List the Unit and Title(s) of the reading: | |Article 25- The Web’s New Gold Mine: Your Secrets | | | |4. List and briefly discuss one of the questions at the end of the chapter. | | | 13. Suggest ways to protect personal identity. | |Some of the ways I makes sure to protect my personal identity is to have a security system that scans my websites before I enter then and that| |blocks threats before they come into my computer. I also have a security system like Norton that is constantly scanning my computer and | |upgrading for the newest threats. Some additional steps I take are checking out websites on the BBB before I do business with them.
Also | |making sure I have a secure connection (https) when doing that business. | | | | | |5. List any examples of bias or faulty reasoning that you found in the chapter: | | | | I think most of the chapter is bias because it points out all of these issues as if they have no positive aspects.
For instance, because we | |have internet all over the world regardless of language differences it is easier for researches to find information and helping people to | |create better technologies and medicine faster because of the research. Many of the things discusses as solely issues may have positive | |effects. All of this said except of course identity theft the only person that gains is the thief. | | |6. List any new terms/concepts that were discussed in the article, and write a short definition: | | | |Internet Detection (ID) – is a new technology based on the fact that software used in the all cyber attacks often leave a characteristic | |signature. |