This text offers clear and accessible information with reference to its state of the art introduction of the burgeoning area of computer ethics as well as professional responsibility. It covers discussions of lead topics like the social contexts of computing, history of basic computing, techniques and methods of ethical analysis and professional responsibility. This case study also mentions much to do with risks and liabilities, codes of ethics, computer security, computer crime and mostly viruses and hacking. The related issues that emerge from the basic focus o the case include data privacy and protection, intellectual property and ‘open source’ movement, the internet and global ethics (Bynum & Rogerson, 2006). It is on the same grounds that it seeks to introduce important issues and concepts at the beginning of every section as well as features of study questions that are classroom-tested. This paper will in turn provide lists of useful recommendations on computer security based on the Aerowright case. It will also provide a range of relevant suggestions and easy-to learn techniques on case study analysis.
The main objectives and goals of computer security include oaring ample protection of property and information from natural disaster, corruption, or theft. This aspect should not entirely limit the property and information’s accessibility and productivity to its intended users. With respect to ethical behavior, the issue computer system security refers to the collection of processes and mechanisms through which valuable and sensitive services and information earn protection from unwarranted publication, tampering and collapse due to unauthorized activities, untrustworthy individuals or unplanned events (Bynum & Rogerson, 2006). As a result, the strategies and methodologies of computer security usually differ from other computer technologies as of their somewhat elusive goals of avoiding unwanted computer behavior other than enhancing wanted computer behavior. For instance, today most people insist more on checking for Security updates for all software that is running.
In most cases, all software which has encountered security problems has a high likelihood of allowing identity theft as well as other destruction. In this regard, the most appropriate approach is to cultivate a culture that ensures that each person respects the rights to privacy of the other person. One of the reasons why this is very effective is the fact that it not only lowers the costs on seeking and implementing security measures in the long run (Bynum & Rogerson, 2006). Similarly, it ensures that there is a contusive working relationship between the operators therein. Such an ethical behavior goes a long way in improving the productivity and efficiency of information access and productivity therein. According to the Aerowright case, some of the ethical recommendations include using passwords that are more secure as well as practicing safer web browsing trends.
Disabling any open shares on a computer and never accepting unsolicited e-mail attachments are also ways of containing such situations. In addition, the Aerowright case points out topics like memory safety vulnerabilities, sandboxing and isolation, web security, network security, techniques and tools for vulnerability detection, mobile platform security, and malware detection and defense. Authentication techniques could be introduced to ensure that end-points of communication are actually who they claim to be (Bynum & Rogerson, 2006). Automated theorem proving as well as other verification tools will enable critical algorithms to be used in secure systems in mathematically proven approaches towards meeting their specifications. Access and capability control list techniques can be introduced to ensure separation of privilege and mandatory access control and discus their uses.
References:
Bynum, T. W., & Rogerson, S. (2006). Computer ethics and professional responsibility. Malden, MA: Blackwell Publishing.