CSCD Computer Ethics
Project Draft
Submit a 3 – 5 page paper that conveys the research information and well-reasoned interpretation and conclusions about their specific
social or ethical implication about some topic related to computing and/or the Internet. Submit in a format that suites the subject
matter.
This document will be graded on Focus/Content, Organization, and Language. See attached rubric. Papers submitted on time can be
revised and resubmitted to improve their grade. Late papers will not be regraded. Feedback will focus on helping students identify the
limitations of the conclusion they draw.
In this phase of the assignment, students will demonstrate Analytical Thinking by stating conclusions that are logical extractions from
evidence.
In this phase of the assignment, students will demonstrate Written Communication by
conveying meaning throughout the document.
organizing their document logically.
making choices concerning style, tone, and degree of complexity that are appropriate to the audience.
Deliverable:
Submit as a 3 – 5 page, double-spaced Word document and the scanned articles delivered to Canvas.
Submit the articles as pdf files. (You may print the files to a pdf.) Do Not Zip Files.
Writing Rubric-Computing Ethics
Excellent Proficient Non- proficient Poor or Absent
At the
end of
this
course, a
student
should be
able to do
all
of the
following:
Articulate
the purpose
of the
document
(Focus,
Content)
-Responds skillfully articulate
the
purpose of the document
States a claim that adequately
articulates the purpose of the
document
States a claim that weakly
articulates the purpose of the
document
-Does not articulate the
purpose of the document
Convey
meaning
clearly
(Focus,
Content)
-Responds skillfully to all
parts of the
prompt
–
States a claim that
demonstrates an insightful
understanding of topic/text
-Responds to all parts of the
prompt
States a claim that
demonstrates an
understanding of topic/text
Responds to most parts of
the prompt
States a claim that
demonstrates limited
understanding of
topic/text
-Responds to some or no
parts of the prompt
Does not state a claim or
demonstrates little to no
understanding of topic/text
Logical
Organization
-Organizes ideas and
information into purposeful,
coherent paragraphs that
include an elaborated
introduction with clear thesis,
structured body, and insightful
conclusion
Uses a variety of linking
words, phrases, and clauses
skillfully to connect reasons to
claim
-Organizes ideas and
information into logical
structure
including introductory, body,
and concluding paragraphs
Uses linking words,
phrases,
and clauses appropriately to
connect reasons to claim
-Organizes ideas and
information in an attempted
paragraph structure that
missing an introduction, or
conclusion
Uses some linking words,
phrases, or clauses to connect
reasons to claim but
simplistically
Does not organize ideas and
information coherently due
to lack of paragraph structure
and/or a missing introduction,
and conclusion
Uses no linking words,
phrases, or clauses
Style, Tone,
Complexity
Appropriate
-Uses purposeful and varied
sentence structures
Uses precise and
sophisticated academic and
domain-
specific vocabulary
appropriate for the audience
and purpose
-Uses correct and varied
sentence structures
Demonstrates appropriate
conventions; errors are minor
and do not obscure meaning
Uses academic and domain
specific vocabulary
appropriate for the audience
and purpose
-Uses some repetitive yet
correct sentence structure
Demonstrates some
appropriate conventions, but
errors obscure meaning
Uses limited academic
and/or domain-specific
vocabulary for the audience
and purpose
-Does not demonstrate
sentence mastery
Demonstrates limited
understanding of
appropriate conventions, and
errors interfere with the
meaning
Uses no academic or
domain-specific vocabulary
February 13, 2020
5
Cyber Crime and Cyber Attacks
Based on the topics provided in the textbook, I chose to venture into the topic of ethics and implications of computer and network security where the focus is mainly on cyber-crime and cyber-attacks. Mainly, there are several social and ethical concerns regarding cyber-crime and cyber-attacks simply referred are cyber-ethics. In dealing with cyber ethics, some of the issues that ought to be addressed include information leakage, data corruption, spreading false information, cases of hacking as well as the use of malicious malware in cyber ethics (Bendovschi, 2015). Furthermore, it is evident that there is a continuous rise of cyber treats where actions are executed with the intention of stealing data, cause harm to data and even digital harm. Cyber-crimes and cyber-attacks majorly focus on information security matters since is very difficult to visualize how digital signals travel across communication platforms hence the need to visualize the physical cyber-attacks and cyber-crimes.
Accordingly, cyber-crimes and cyber-attacks can be understood as the attacks that are launched against digital device users through cyberspace. Cyberspace refers to a virtual space that is non-existent and is commonly used as a metaphor in understanding digital weaponry and how it is capable of harming digital device users. Moreover, the real aspect of the cyber-attack and cyber-crime is the overall intention of the attacker as well as the potential effects. It should be noted that even though some cyber-attacks are just a nuisance to users, some are relatively harmful and pose a possible human life threat to the victims (Raiyn, 2014). The threats projected from these actions are entirely a big deal since they are capable of causing several impacts. The most common types of cyber-attacks include phishing, malware, Trojan, ransomware, attacks on IoT devices, data breaches and man in the middle attacks. In that, cyber-crimes may result in electrical blackouts, failure of military equipment as well as breaches on national security secrets and may result in national jeopardy.
In understanding the concept of cyber-ethics, it is evident that the internet’s interception in the global community has a first-hand in leading hackers to exploit everything ranging from sophomoric mischiefs to theft and espionage. Some major ethical concerns in cyber-crimes and attacks focus on personal privacy, data access rights, and any malicious activity on the internet capable of causing harm. These issues are truly a bother to online users due to the fact that not effective measures have been deployed to fully curb these misdeeds. In preventing, there are partial strategies through the use of technological approaches including data encryption techniques, SSL, use of digital IDs as well as computer firewalls (Weissbrodt, 2013). Besides, within the corporate sphere, these strategies help in ensuring the organizational data security of the firm, employees, and their client’s financial records as these are the major ethical and social concerns. An information security professional is then required to exhibit their ethical skills as “black-hat hackers” in preventing hackers from committing malicious cyber-attacks.
Virtue approach or virtue theory is an ethical approach that focuses on the character of an individual in developing the key element of ethical thinking instead of emphasizing on the rules governing the real actions executed and their impacts. In relation to cyber-crimes and cyber-attacks, the concept of virtue approach is crucial as it provides an insight into the causes, motives of the hackers as well as the outcomes of the attacks. Since cyberspace is one of the fast-rising concerns, virtue ethics helps create a line between cyber conflicts and conventional kinetic concerns which are gradually erased (Blanken-Webb et al., 2018). Furthermore, in employing the virtue approaches framework, it aids in gradually changing the digital community structure and security through practices that adequately create protection for the general and static cyber-attacks by all means. Therefore, the major focus of the virtue approach or ethics is on achieving specific virtues pertinent to life in the cyber-world majorly in aspects of peaceable-ness.
Overall, technological and digital advancements are developing on a daily basis across the globe and as a result, the concern of cyber-attacks and cyber-crimes is on the rise too. These malicious actions are geared towards achieving or gaining access to specific confidential details which in return can be used to exploit the company’s goal and objectives. For instance, if an organization is hacked and employee details exposed, it poses a serious threat to the overall structure of the firm since the hacker is capable of diverting the main mission of the company. Cyberspace is the major platform employed in executing cyber-attacks and cyber-crimes and in curbing this, cyber ethics ought to be evaluated. Through the virtue approach, an individual will be able to evaluate their actions rather than the outcomes of the action and this significantly helps in reducing cyber-attacks and hacking concerns.
References
Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24-31.
Blanken-Webb, J., Palmer, I., Deshaies, S. E., Burbules, N. C., Campbell, R. H., & Bashir, M. (2018). A Case Study-based Cybersecurity Ethics Curriculum. In 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18).
Raiyn, J. (2014). A survey of cyber-attack detection strategies. International Journal of Security and Its Applications, 8(1), 247-256.
Weissbrodt, D. (2013). Cyber-conflict, Cyber-crime, and Cyber-espionage. Minn. J. Int’l L., 22, 347.
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 1/5
You Better Look Out for Holiday
Scams!
‘Tis the season for scammers who prey on those looking for last-minute
shopping deals! FBI Denver Division reminds local shoppers to beware of scams
and stay vigilant of thieves who steal their money and personal information.
According to the FBI’s Internet Crime Complaint Center (IC3)
(https://www.ic3.gov (https://www.ic3.gov)), Wyoming victims lost over $4.5
million in Internet scams in 2018. The most vulnerable population in the U.S. are
those over age 60, although people of all ages fell victim to scams last year.
Remember, if it looks too good to be true, it probably is! Last minute shoppers,
stay vigilant for the following red flags and common schemes.
Online Shopping Scams:
Scammers often offer too-good-to-be-true deals via phishing emails or
advertisements. Such schemes may offer brand-name merchandise at
extremely low prices or offer gift cards as an incentive. Other sites may offer
products at a great price, but the products being sold are not the same as
the products advertised.
Consumers should steer clear of untrustworthy sites or ads offering items at
unrealistic discounts or with special coupons. They may pay for an item and
give away personal information and credit card details then receive nothing
in return except a compromised identity.
Social Media Scams:
FBI Denver
Special Agent Amy Meyer
(303) 630-6060
December 17, 2019
https://www.ic3.gov/
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 2/5
Consumers should beware of posts on social media sites that appear to
offer vouchers or gift cards. Some may appear as holiday promotions or
contests. Others may appear to be from known friends who have shared
the link. Often, these scams lead consumers to participate in an online
survey that is designed to steal personal information.
Consumers should not post pictures of event tickets on social media sites.
Fraudsters can create a ticket using the barcode obtained from the photo
and resell the ticket. Consumers should protect ticket barcodes as they
would credit card numbers.
Smartphone App Scams:
Some mobile apps, often disguised as games and offered for free, are
designed to steal personal information. Before downloading an app from an
unknown source, consumers should research the company selling it or
giving it away and look online for third-party reviews of the product.
Work-From-Home Scams
Consumers should beware of sites and posts offering work they can do
from home. These opportunities rely on convenience as a selling point but
may have fraudulent intentions. Consumers should carefully research the
job posting and individuals or company offering employment.
Gift Card Scams
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 3/5
During the holiday season, consumers should be careful if someone asks
them to purchase gift cards for them. In these scams, the victims received
either a spoofed email, a spoofed phone call, or a spoofed text from a
person in authority requesting the victim purchase multiple gift cards for
either personal or business reasons.
As an example, a victim receives a request to purchase gift cards for a
work-related function or as a present for a special personal occasion. The
gift cards are then used to facilitate the purchase of goods and services,
which may or may not be legitimate. Some of these incidents are combined
with additional requests for wire transfer payments, as described in classic
Business email Compromise (BEC) scenarios. The following link to IC3’s
BEC Public Service Announcement provides additional information about
business email compromise and gift card requests
(https://www.ic3.gov/media/2018/181024.aspx
(https://www.ic3.gov/media/2018/181024.aspx)).
Charity Scams
Fraudulent charity scams, where perpetrators set up false charities and
profit from individuals who believe they are making donations to legitimate
charitable organizations, are common after natural disasters or man-made
tragedies. Charity fraud also increases during the holiday season when
individuals seek to make end-of-year tax deductible gifts or are reminded of
those less fortunate and wish to contribute to a good cause. Seasonal
charity scams can pose greater difficulties in monitoring because of their
widespread reach, limited duration and, when done over the Internet,
minimal oversight.
Charity scam solicitations may come through cold calls, email campaigns,
crowdfunding platforms—soliciting money from many people usually over
the Internet—or fake social media accounts and websites. They are
designed to make it easy for victims to give and feel like they’re making a
difference. Perpetrators may divert some or all the funds for their personal
use, and those most in need will never see the donation.
Consumers can do the following to reduce their chances of being victimized:
https://www.ic3.gov/media/2018/181024.aspx
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 4/5
Check credit card statements routinely. If possible, set up credit card
transaction auto alerts, or check balance after every online purchase. It is
important to check statements after the holiday season, as many fraudulent
charges can show up even several weeks later.
If purchasing merchandise, ensure it is from a reputable source.
Ensure a site is secure and reputable before providing credit card number
online. Don’t trust a site just because it claims to be secure.
Beware of purchases or services that require payment with a gift card.
Beware of providing credit card information when requested through
unsolicited emails.
Do not respond to unsolicited emails.
Do not click on links contained within an unsolicited email.
Avoid filling out forms contained in email messages that ask for personal
information.
Be cautious of emails claiming to contain pictures in attached files, as the
files may contain viruses. Only open attachments from known senders.
Scan all attachments for viruses if possible.
Verify requests for personal information from any business or financial
institution by contacting them using the main contact information on their
official website.
Secure credit card accounts, even rewards accounts, with strong
passwords. Change passwords and check accounts routinely.
Be wary when replying to unsolicited emails for work-at-home employment.
Be cautious of exaggerated claims of possible earnings or profits.
Beware when money is required up front for instructions or products for
employment.
Do not give out personal information when first interacting with a
prospective employer.
Be leery when a job posting claims “no experience necessary.”
Be cautious when dealing with individuals outside of the country.
Only donate to known and trusted charities; legitimate charities do not
solicit donations via money transfer services or ask for donations via gift
cards.
Make contributions directly, rather than through an intermediary, and pay via
credit card or check; avoid cash donations, if possible.
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 5/5
Beware of organizations with copycat names similar to reputable charities;
most legitimate charity websites use .org (NOT .com).
Follow the Federal Trade Commission’s tips for online charity research.
(https://www.consumer.ftc.gov/features/how-donate-wisely-and-avoid-
charity-scams (https://www.consumer.ftc.gov/features/how-donate-wisely-
and-avoid-charity-scams))
Consumers who believe they are the victim of a scam should:
Contact their financial institution immediately upon suspecting or
discovering a fraudulent transfer.
Ask their bank to reach out to the financial institution where the fraudulent
transfer was sent.
Contact law enforcement.
File a complaint with the FBI’s Internet Crime Complaint Center at www.IC3.gov
(http://www.IC3.gov), regardless of dollar loss. Provide all relevant information in
the complaint.
https://www.consumer.ftc.gov/features/how-donate-wisely-and-avoid-charity-scams
http://www.ic3.gov/
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 1/5
You Better Look Out for Holiday
Scams!
‘Tis the season for scammers who prey on those looking for last-minute
shopping deals! FBI Denver Division reminds local shoppers to beware of scams
and stay vigilant of thieves who steal their money and personal information.
According to the FBI’s Internet Crime Complaint Center (IC3)
(https://www.ic3.gov (https://www.ic3.gov)), Wyoming victims lost over $4.5
million in Internet scams in 2018. The most vulnerable population in the U.S. are
those over age 60, although people of all ages fell victim to scams last year.
Remember, if it looks too good to be true, it probably is! Last minute shoppers,
stay vigilant for the following red flags and common schemes.
Online Shopping Scams:
Scammers often offer too-good-to-be-true deals via phishing emails or
advertisements. Such schemes may offer brand-name merchandise at
extremely low prices or offer gift cards as an incentive. Other sites may offer
products at a great price, but the products being sold are not the same as
the products advertised.
Consumers should steer clear of untrustworthy sites or ads offering items at
unrealistic discounts or with special coupons. They may pay for an item and
give away personal information and credit card details then receive nothing
in return except a compromised identity.
Social Media Scams:
FBI Denver
Special Agent Amy Meyer
(303) 630-6060
December 17, 2019
https://www.ic3.gov/
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 2/5
Consumers should beware of posts on social media sites that appear to
offer vouchers or gift cards. Some may appear as holiday promotions or
contests. Others may appear to be from known friends who have shared
the link. Often, these scams lead consumers to participate in an online
survey that is designed to steal personal information.
Consumers should not post pictures of event tickets on social media sites.
Fraudsters can create a ticket using the barcode obtained from the photo
and resell the ticket. Consumers should protect ticket barcodes as they
would credit card numbers.
Smartphone App Scams:
Some mobile apps, often disguised as games and offered for free, are
designed to steal personal information. Before downloading an app from an
unknown source, consumers should research the company selling it or
giving it away and look online for third-party reviews of the product.
Work-From-Home Scams
Consumers should beware of sites and posts offering work they can do
from home. These opportunities rely on convenience as a selling point but
may have fraudulent intentions. Consumers should carefully research the
job posting and individuals or company offering employment.
Gift Card Scams
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 3/5
During the holiday season, consumers should be careful if someone asks
them to purchase gift cards for them. In these scams, the victims received
either a spoofed email, a spoofed phone call, or a spoofed text from a
person in authority requesting the victim purchase multiple gift cards for
either personal or business reasons.
As an example, a victim receives a request to purchase gift cards for a
work-related function or as a present for a special personal occasion. The
gift cards are then used to facilitate the purchase of goods and services,
which may or may not be legitimate. Some of these incidents are combined
with additional requests for wire transfer payments, as described in classic
Business email Compromise (BEC) scenarios. The following link to IC3’s
BEC Public Service Announcement provides additional information about
business email compromise and gift card requests
(https://www.ic3.gov/media/2018/181024.aspx
(https://www.ic3.gov/media/2018/181024.aspx)).
Charity Scams
Fraudulent charity scams, where perpetrators set up false charities and
profit from individuals who believe they are making donations to legitimate
charitable organizations, are common after natural disasters or man-made
tragedies. Charity fraud also increases during the holiday season when
individuals seek to make end-of-year tax deductible gifts or are reminded of
those less fortunate and wish to contribute to a good cause. Seasonal
charity scams can pose greater difficulties in monitoring because of their
widespread reach, limited duration and, when done over the Internet,
minimal oversight.
Charity scam solicitations may come through cold calls, email campaigns,
crowdfunding platforms—soliciting money from many people usually over
the Internet—or fake social media accounts and websites. They are
designed to make it easy for victims to give and feel like they’re making a
difference. Perpetrators may divert some or all the funds for their personal
use, and those most in need will never see the donation.
Consumers can do the following to reduce their chances of being victimized:
https://www.ic3.gov/media/2018/181024.aspx
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 4/5
Check credit card statements routinely. If possible, set up credit card
transaction auto alerts, or check balance after every online purchase. It is
important to check statements after the holiday season, as many fraudulent
charges can show up even several weeks later.
If purchasing merchandise, ensure it is from a reputable source.
Ensure a site is secure and reputable before providing credit card number
online. Don’t trust a site just because it claims to be secure.
Beware of purchases or services that require payment with a gift card.
Beware of providing credit card information when requested through
unsolicited emails.
Do not respond to unsolicited emails.
Do not click on links contained within an unsolicited email.
Avoid filling out forms contained in email messages that ask for personal
information.
Be cautious of emails claiming to contain pictures in attached files, as the
files may contain viruses. Only open attachments from known senders.
Scan all attachments for viruses if possible.
Verify requests for personal information from any business or financial
institution by contacting them using the main contact information on their
official website.
Secure credit card accounts, even rewards accounts, with strong
passwords. Change passwords and check accounts routinely.
Be wary when replying to unsolicited emails for work-at-home employment.
Be cautious of exaggerated claims of possible earnings or profits.
Beware when money is required up front for instructions or products for
employment.
Do not give out personal information when first interacting with a
prospective employer.
Be leery when a job posting claims “no experience necessary.”
Be cautious when dealing with individuals outside of the country.
Only donate to known and trusted charities; legitimate charities do not
solicit donations via money transfer services or ask for donations via gift
cards.
Make contributions directly, rather than through an intermediary, and pay via
credit card or check; avoid cash donations, if possible.
1/16/2020 You Better Look Out for Holiday Scams! — FBI
https://www.fbi.gov/contact-us/field-offices/denver/news/press-releases/you-better-look-out-for-holiday-scams 5/5
Beware of organizations with copycat names similar to reputable charities;
most legitimate charity websites use .org (NOT .com).
Follow the Federal Trade Commission’s tips for online charity research.
(https://www.consumer.ftc.gov/features/how-donate-wisely-and-avoid-
charity-scams (https://www.consumer.ftc.gov/features/how-donate-wisely-
and-avoid-charity-scams))
Consumers who believe they are the victim of a scam should:
Contact their financial institution immediately upon suspecting or
discovering a fraudulent transfer.
Ask their bank to reach out to the financial institution where the fraudulent
transfer was sent.
Contact law enforcement.
File a complaint with the FBI’s Internet Crime Complaint Center at www.IC3.gov
(http://www.IC3.gov), regardless of dollar loss. Provide all relevant information in
the complaint.
https://www.consumer.ftc.gov/features/how-donate-wisely-and-avoid-charity-scams
http://www.ic3.gov/
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.