Chapter 11 Kizza

Chapter 11 Kizza

| | | | |1. Briefly state the main idea of this chapter. |  | | Chapter 11 in Kizza is about the ethical issues that apply to | | |cyberspace, IPR, social networking global ethics.

Kizza describes | | |safeguards and the continual process of security. The global ethics | | |portion of the issue is mostly cultures, language, privacy, IP rights | | |and censorship. In this chapter Kizza gives the reader and | | |understanding of cyberspace and some of the threats posed.

Kizza also| | |explains why the cultural differences brinf forth some issues. | | |  | | | | | | |2.

List three important facts that the author uses to support the main idea: | |     A. The detection and prevention of computer crimes in cyberspace is a daunting job that requires advance techniques and prevention | |methods. | |     B. System and network scanning for vulnerability is an automated process where a scanning program sends network traffic to all computers | |or selected computers in the network and expects receiving return traffic that will indicate whether those computers have known | vulnerabilities. | |     C. As growth of online social networks skyrocketed so did privacy and other social concerns for the user and other innocent bystanders. | |3. What information or ideas discussed in this chapter are also discussed in readings from DePalma? | |  | |Article 25 in DePalma talks about the business of spying on the internet. Just like Kizza this article speaks to privacy issues and security | |problems with the internet. These articles could go hand in hand to help the reader understand the threats posed to them.

The internet has | |the ability to ruin a person life if their information is stolen. | | | |List the Unit and Title(s) of the reading: | |Article 25- The Web’s New Gold Mine: Your Secrets | |  | |4. List and briefly discuss one of the questions at the end of the chapter. |  | | 13. Suggest ways to protect personal identity. | |Some of the ways I makes sure to protect my personal identity is to have a security system that scans my websites before I enter then and that| |blocks threats before they come into my computer. I also have a security system like Norton that is constantly scanning my computer and | |upgrading for the newest threats. Some additional steps I take are checking out websites on the BBB before I do business with them.

Also | |making sure I have a secure connection (https) when doing that business. | |  | |  | |5. List any examples of bias or faulty reasoning that you found in the chapter: | |  | | I think most of the chapter is bias because it points out all of these issues as if they have no positive aspects.

For instance, because we | |have internet all over the world regardless of language differences it is easier for researches to find information and helping people to | |create better technologies and medicine faster because of the research. Many of the things discusses as solely issues may have positive | |effects. All of this said except of course identity theft the only person that gains is the thief. |  | |6. List any new terms/concepts that were discussed in the article, and write a short definition: | |  | |Internet Detection (ID) – is a new technology based on the fact that software used in the all cyber attacks often leave a characteristic | |signature. |