Computer Ethics and Logical Security Term Paper by Nicky

A look at current issues in computer security.
# 146251 | 1,303 words | 10 sources | APA | 2010 | US


$19.95 Buy and instantly download this paper now

Description:

This paper discusses recent concerns in computer security and computer ethics, with an emphasis on logical security. First, the paper deals with security issues on the side of software developers who may insert various threats into the software they create for their employer. The paper also considers the impact of hackers who break into individuals' computer systems without their permission and either commit vandalism or steal data. This leads into an analysis of computer privacy, which includes a look at employers monitoring their workers' email. Various sides of this controversy are explored, concluding with the suggestion that companies create policies dealing with Internet usage and email, and then stick by them.

From the Paper:

"There are many malicious types of software out there and these are providing strong challenges for computer security. These include the popular viruses which end up being inserted into various computer programs because they cannot run on their own, worms which travel from machine to other machines throughout networks and Trojan horses which actually look to be a particular type of program but behind the scenes are doing a great deal of damage (Bynum, 1993). There are also software issues called logic bombs which look for specific conditions on a computer and then when those conditions show up they will execute a file . Committing a computer crime such as the planting of a logic bombs or finding a way to embezzle money from the computer are often committed by personnel who have been trusted with the permission to utilize the computer system of the company. Cyber ethics, therefore, does not just deal with individuals who are deemed as criminals but with the actions of those who are trusted to use the computer as well ."

Sample of Sources Used:

  • Boustani, Eric Bakri. (2002). An Employer's Approach to Email Policies. http://www.iplawyers.com/CyberCounsel/an_employer.htm.
  • Bynum, T.W. (1993) Computer Ethics in the Computer Science Curriculum. In Bynum, Terrell Ward, Walter Maner and John L. Fodor, eds. Teaching Computer Ethics, Research Center on Computing & Society.
  • Bynum, T.W. (1999) The Foundation of Computer Ethics. a keynote address at the AICEC99 Conference, Melbourne, Australia. Published in the June 2000 issue of Computers and Society.
  • Conry, S. (1992) Interview on Computer Science Accreditation. In Bynum, Terrell Ward and John L. Fodor, creators, Computer Ethics in the Computer Science Curriculum (a video program), Educational Media Resources.
  • Friedman, B., ed. (1997) Human Values and the Design of Computer Technology, Cambridge University Press.

Cite this Term Paper:

APA Format

Computer Ethics and Logical Security (2010, December 24) Retrieved June 04, 2020, from https://www.academon.com/term-paper/computer-ethics-and-logical-security-146251/

MLA Format

"Computer Ethics and Logical Security" 24 December 2010. Web. 04 June. 2020. <https://www.academon.com/term-paper/computer-ethics-and-logical-security-146251/>

Comments