Wednesday, July 17, 2019

How Technology Advancement has influenced Computer Ethics Essay

The 21st century has been dubbed the digital climb on because of the monumental achievements witnessed in the tuition, Communication and engine room (ICT) fields, which stimulate impacted every verbal expression of human life. The network has become unmatchable of the most lucrative Information technology (IT) tool which has made communication and substitution of study faster and efficient. Consequently, it has transformed how passel consume information. In spite of its well-beings, the internet has guide to a severe celestial latitude in ethical motive among internet users (Salman, Saad & Ali, 2013).The familiar use of internet has led to change magnitude and sophisticated crimes, terrorism and wars (May, 2004). This essay give be based on a case involving hackers who hold Personal Computers (PC) hostage. It willing outline the potential estimator ethics issues associated with retentivity computers hostage. It will also high spot methods that computer users cou ld use to prevent this cause of bang. Moreover, it will highlight governmental jurisprudences that could be enacted against this type of attack.Ethics is defined as the principles governing both right and terms among free humans (free moral agents), whose actions be influenced by their freedom of choice (Soskolne, n.d). development of technology presents both positive and proscribe impacts to a society. Technological advancements have led to a rapid decline in social and ethical issues regarding to warrantor and hiding of personalised information (Shieh & Tanthuwanit, 2004). One of the major(ip) forms of social ethic violation complicates hackers keeping personal computers hostage, and hence infringing on both cover and security of printed computer users. This in turn compromises information security come to with the protection of information confidentiality, availabilityand lawfulness (Gordon & Loeb, 2002)According to Perlroth (2014), cyber criminals have devised a upstart mechanism of freezing computers through malw bes, and then(prenominal) demanding a steep ransom take over forrader unlocking them. Perlroth (2014) adds that computer owners throughout the man have fallen victims of this vicious attack, which denies them penetration to their personal computers and files stored on them. The hackers instead dispense them with a pop up inwardness demanding some ransom payment before their computers could be unlocked. Hackers holding computers hostage contradict on personal privacy, and gain gravel to sensitive information regarding online bank accounts, security passwords and other highly private information (Perlroth, 2014). protection governances and other general-purpose computers are also vulnerable to this kind of attack because, if these hackers can break into users accounts even from GoDaddy domains to take vicious subdomains through which they send mails to target clients (Perlroth, 2014), then every computer system is vul nerable to such attacks. This means that not solitary(prenominal) is the privacy of the computer users compromised, hardly also the security of their data and the general security of their computer systems (The Canadian loo, 2014).In order to prevent hackers from holding computers hostage, computers users should paradigm check their domain names, user accounts or web crosses before responding to any netmail clicks. In line to this, Perlroth (2014) observes that Hackers were breaking into GoDaddy users accounts with stolen passwords and desktop up what is known as a subdomain hackers would set up the Web address then send emails to customers because it appeared to come from a trusted source was more plausibly to lure clicks.Likewise also, users should either interlocutor an IT professional to help them remove the ransomware close in infected, or they can wipe their computers rifle through formatting them and reinstalling new operate system as well (Perlroth, 2014). In addition, professional network security strength should be consulted in order to figure that passwords, firewalls, authentications and proxy servers among other security utilities are properly set and enhanced to entwine system security (French, 2012)Although the hunting, catching and eventual(prenominal) convicting of these hackers has not yet achieved substantial conquest (Perlroth, 2014), the government should enact privacy laws that chat higher penalty for perpetrators of personal privacy and security infringement so that their benefit is less in value when compared to unfinished punishment. Some of the active laws that have been enacted to mold this tragedy include the Computer guile and Abuse Acts which cover the use of malicious codes including worms, viruses, and other malicious programs intended to manipulate or damage data in a users computer (Title 18 U.S.C instalment 1030). Another legislation that could counter this attack is the National Information Infrastru cture Protection Act (NIIPA) which criminalizes the transmission of a command, program, or code with malicious intentions like holding a compute hostage (Colombell, 2002).In conclusion, when hackers hold computers hostage, they infringe on the personal privacy and security of personal information. During the full stop when the computers are held hostage, computer users not only risk having their sensitive information accessed and sometimes damaged, but they are also financially exploited in order to have their computers unlocked. Some of the feasible strategies of avoiding this attack include exercising a lot of business concern regarding the types of sites visited and clicked, and avoiding sending payments to hackers whenever a computer is hacked. quite seek immediate assistance from a professional who will help you to manually get rid of the ransomware without paying the hackers off.ReferencesColombell, M., R. (2002). The legislative Response to the Evolution of Computer Virus es. 8 RICH. J.L. & TECH. 18. Retrieved from http//jolt.richmond.edu/v8i3/article18.htmlFrench, A., M. (2012). A Case Study on E-Banking Security When Security Becomes Too civilize for the User to Access Their Information. Journal of profits Banking and Commerce, 17(2).Gordon, L., & Loeb, M. (2002). The Economics of Information SecurityInvestment. ACM level-headed proceeding on Information and System Security, 5 (4), 438457.May, M. (2004). Federal Computer Crime Laws. SANS Institute. Retrieved from http//www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws-1446? Show=federal-computer-crime-laws-1446&cat=legal Perlroth, N. (2014, April 22). Hackers holding your PC to ransom. Deccan Herald. Retrieved from http//www.deccanherald.com/content/297460/hackers-holding-your-pc-ransom.html.Salman, A., Saad, S., & Ali, M., N. (2013). Dealing with estimable Issues among Internet Users Do We Need effectual Enforcement? Asian Social Science, 9(8) 3-8.Shieh, M., & Tanth uwanit, K. (2004). Privacy and Security Internet Hacking andSurveillance. Retrieved from http//www.ethicapublishing.com/CH16.pdfTitle 18 U.S.C Section 1030, internet, http//www4.law.cornell.edu/uscode/18/1030.html Soskolne, C., L. (n.d). Workplace Health and resort Information Ethical Issues. Retrieved from http//ilocis.org/documents/chpt19e.htmThe Canadian Press (2014, April 14). Computer hacking expert says more disadvantageously news to come from Heartbleed. Edmonton Journal. Retrieved from

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.