What are the ethically significant harms

Assignment Help Basic Computer Science
Reference no: EM132876852

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the six sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. The peer feedback will be incorporated into each team member's assignment grade.Cybersecurity Technologies

The authors of the National Security Strategy (NSS) are looking to address particular technologies that have the opportunity to revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that has the ability to significantly improve cybersecurity.

Ethics in Cybersecurity.

Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability - the C-I-A triad - and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional.

Question 1: What are the ethically significant harms that may result from mass surveillance (including by government and corporations)?

Question 2: What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning.

Reference no: EM132876852

Questions Cloud

How project management will be used by your team to manage : In the previous milestone, Explain how project management will be used by your team to manage the Millennium Health Project.
Is performance appraisal really necessary : 1. Is performance appraisal really necessary? Can't the bene?ts that the system provides to organizations and the people in them be obtained any other way?
Quality improvement for public health services : How we can envision that the healthcare industry to change in the future for continuous quality improvement for public health services?
How the nss should incorporate technology to the public : What you believe should be written in the NSS. Specifically, explain the blockchain technology in layman's terms to nontechnical people
What are the ethically significant harms : What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning
Different data mining algorithms : We focus on deciding whether the results of two different data mining algorithms provides significantly different information
How much should calhoun debit to unrealized holding gain : Calhoun Company appropriately reported a $10,000 debit balance in its Fair Value Adjustment account. How much Calhoun debit to Unrealized holding gain/loss
Write python program to convert temperature : Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.
Happy workers are productive workers : How far do you agree with the statement "happy workers are productive workers"? Please illustrate your reply with reference to an organisation of your choice.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the null and alternative? hypotheses

How do I Determine the null and alternative? hypotheses, then explain what it would mean to make a type I? error, and explain what it would mean to make a type

  Allocation and dynamic memory allocation

What are the differences between static memory allocation and dynamic memory allocation?

  What is the application/service date and applicable release

Does it provide a new application/service, replace an existing application/service, or enhance an existing application/service?

  Who is impacted by cultural competency or the lack thereof

Why is this an important topic? Who is impacted by cultural competency or the lack thereof? Discuss how this topic relates to your studies and how you might apply these ideas in the workplace.

  Similarities and differences of the purchasing strategy

Write a 700- to 1050-word paper that defines the similarities and differences of the purchasing strategy you will use at each stage of the Product Life Cycle of your company's specific product.

  Compress some already compressed files

Given a compression function c as in (a), give a function c ′ such that for all bit strings s, length(c ′ (s)) ≤ min(length(c(s)), length(s)) + 1; that is, in the worst case, compression with c ′ expands the size by only 1 bit.

  Suppose demand is given by qxd

Suppose demand is given by Qxd = 25 - 5Px + 2Py + Ax, where Px = $10, Py = $5, and Ax = $100. What is the advertising elasticity of demand for good x?

  COSO framework of internal controls is practiced

The COSO framework of internal controls is practiced within companies around the world.

  What is the present value of the dividend

What is the present value of the dividend at the end of year 7? What should be the market price of the stock at present?

  What does the term unnormalized relation refer to

What does the term unnormalized relation refer to?

  What is a reasonable lifetime to use for the keys ka and why

For the protocol in Section 173, how might an attacker be able to learn KA before it times out? What bad things would the attacker be able to do with that knowledge? What bad things would the attacker not be able to do with that knowledge?

  What do you work at work to make

What do you work at work to make it seem that your productivity is outstanding even though you are on Facebook, LinkedIn, etc?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd