Thursday, March 7, 2019

How Technology Advancement has influenced Computer Ethics Essay

The 21st century has been dubbed the digital age beca habituate of the monumental achievements witnessed in the Information, Communication and Technology (ICT) fields, which have impacted every aspect of human life. The internet has be source one of the more or less lucrative Information Technology (IT) tool which has made communication and supervene upon of entropy faster and efficient. Consequently, it has transformed how people consume information. In enkindle of its benefits, the internet has led to a severe decline in ethics among internet users (Salman, Saad & Ali, 2013).The widespread use of internet has led to increased and in advance(p) crimes, terrorism and wars (May, 2004). This essay will be based on a case involving hackers who hold Personal calculators (PC) hostage. It will outline the potential computing device ethics issues associated with holding computers hostage. It will likewise highlight methods that computer users could use to prevent this oddball of attack. Moreover, it will highlight governmental ordinances that could be decreeed against this type of attack.Ethics is defined as the principles governing both right and vituperate among free humans (free moral agents), whose actions ar influenced by their freedom of weft (Soskolne, n.d). Advancement of technology presents both positive and negative impacts to a society. expert advancements have led to a rapid decline in companionable and ethical issues regarding to protective covering measures and hiding of personal information (Shieh & Tanthuwanit, 2004). One of the major(ip) forms of social ethic violation includes hackers holding personal computers hostage, and hence infringing on both privacy and security of marked computer users. This in turn compromises information security concerned with the protection of information confidentiality, availabilityand integrity (Gordon & Loeb, 2002) check to Perlroth (2014), cyber criminals have devised a new mechanism of freezing computers through malwares, and past demanding a steep ransom pay before unlocking them. Perlroth (2014) adds that computer owners end-to-end the world have fallen victims of this malevolent attack, which denies them access to their personal computers and files stored on them. The hackers instead serve them with a pop up message demanding near ransom payment before their computers could be unlocked. Hackers holding computers hostage contravene on personal privacy, and gain access to sensitive information regarding online swear accounts, security passwords and other(a) highly private information (Perlroth, 2014).Security systems and other general-purpose computers are also vulnerable to this kind of attack because, if these hackers butt break into users accounts even from GoDaddy domains to create malicious subdomains through which they send mails to target clients (Perlroth, 2014), then every computer system is vulnerable to such attacks. This style that not wholly is the privacy of the computer users compromised, but also the security of their data and the general security of their computer systems (The Canadian Press, 2014).In companionship to prevent hackers from holding computers hostage, computers users should double check their domain names, user accounts or web addresses before responding to any email clicks. In line to this, Perlroth (2014) observes that Hackers were interruption into GoDaddy users accounts with stolen passwords and setting up what is known as a subdomain hackers would set up the Web address then send emails to customers because it appeared to come from a sure source was more likely to lure clicks.Likewise also, users should either clutch an IT professional to help them remove the ransomware incase infected, or they can pass over their computers clean through formatting them and reinstalling new Operating system as well (Perlroth, 2014). In addition, professional network security personnel should be consulted in orde r to ensure that passwords, firewalls, authentications and proxy servers among other security utilities are properly set and enhanced to fortify system security (French, 2012)Although the hunting, ancestral and eventual convicting of these hackers has not yet achieved substantial success (Perlroth, 2014), the government should enact privacy laws that pronounce higher penalty for perpetrators of personal privacy and security infringement so that their benefit is less in value when compared to pending punishment. Some of the active laws that have been enacted to curb this tragedy include the Computer Fraud and Abuse titles which cover the use of malicious codes including worms, viruses, and other malicious programs intended to alter or damage data in a users computer (Title 18 U.S.C segmentation 1030). Another legislation that could counter this attack is the National Information Infrastructure Protection Act (NIIPA) which criminalizes the transmission of a command, program, or cod e with malicious intentions like holding a compute hostage (Colombell, 2002).In conclusion, when hackers hold computers hostage, they infringe on the personal privacy and security of personal information. During the period when the computers are held hostage, computer users not only risk having their sensitive information accessed and sometimes damaged, but they are also financially exploited in order to have their computers unlocked. Some of the possible strategies of avoiding this attack include exercising a lot of care regarding the types of sites visited and clicked, and avoiding move payments to hackers whenever a computer is hacked. Instead seek immediate assistance from a professional who will help you to manually get rid of the ransomware without paid the hackers off.ReferencesColombell, M., R. (2002). The Legislative Response to the Evolution of Computer Viruses. 8 RICH. J.L. & TECH. 18. Retrieved from http//jolt.richmond.edu/v8i3/article18.htmlFrench, A., M. (2012). A causal agency Study on E-Banking Security When Security Becomes Too Sophisticated for the exploiter to Access Their Information. Journal of Internet Banking and Commerce, 17(2).Gordon, L., & Loeb, M. (2002). The Economics of Information SecurityInvestment. ACM minutes on Information and System Security, 5 (4), 438457.May, M. (2004). Federal Computer discourtesy Laws. SANS Institute. Retrieved from http//www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446? Show=federal-computer-crime-laws-1446&cat=legal Perlroth, N. (2014, April 22). Hackers holding your PC to ransom. Deccan Herald. Retrieved from http//www.deccanherald.com/ contentedness/297460/hackers-holding-your-pc-ransom.html.Salman, A., Saad, S., & Ali, M., N. (2013). Dealing with Ethical Issues among Internet Users Do We Need Legal Enforcement? Asian Social Science, 9(8) 3-8.Shieh, M., & Tanthuwanit, K. (2004). Privacy and Security Internet Hacking andSurveillance. Retrieved from http//www.ethi capublishing.com/CH16.pdfTitle 18 U.S.C Section 1030, internet, http//www4.law.cornell.edu/uscode/18/1030.html Soskolne, C., L. (n.d). Workplace Health and Safety Information Ethical Issues. Retrieved from http//ilocis.org/documents/chpt19e.htmThe Canadian Press (2014, April 14). Computer hacking expert says more bad news to come from Heartbleed. Edmonton Journal. Retrieved from

No comments:

Post a Comment