Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 5

Privacy 1 Accuracy 2

•Collection •Authenticity
•Storage •Fidelity
•Dissemination of information ETHICAL ISSUES •Accuracy of information
about individual (collection and processed)

Accessibility 4 Property 3

•Right to access information •Ownership


•Payment of fees to access it •Value of information
THREATS

ENVIRONME
HUMAN NTAL
COMPUTER
ERROR HAZARDS CRIMES
COMPUTER
CRIME

Destruction of
alteration of
software or
data

Unauthorized use Use of


of computers and computers to
computer embezzle funds
services or assets

Unauthorized
access to and/or
theft of software,
equipment or data
Computer crimes
METHODS OF ATTACK

Data tampering Programming


(data diddling) technique
CANDIDATE
ETHICAL
PRINCIPLES

6 Ethical ‘no
free lunch’
1 Golden
rule rule

5 Risk 2 Immaned
kants
aversion categorical
principle imperatives

3 Descartes
4 Utilitarian
rule of
principle
change

You might also like