What are the ethically significant harms

Assignment Help Basic Computer Science
Reference no: EM132876852

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the six sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. The peer feedback will be incorporated into each team member's assignment grade.Cybersecurity Technologies

The authors of the National Security Strategy (NSS) are looking to address particular technologies that have the opportunity to revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that has the ability to significantly improve cybersecurity.

Ethics in Cybersecurity.

Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability - the C-I-A triad - and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional.

Question 1: What are the ethically significant harms that may result from mass surveillance (including by government and corporations)?

Question 2: What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning.

Reference no: EM132876852

Questions Cloud

How project management will be used by your team to manage : In the previous milestone, Explain how project management will be used by your team to manage the Millennium Health Project.
Is performance appraisal really necessary : 1. Is performance appraisal really necessary? Can't the bene?ts that the system provides to organizations and the people in them be obtained any other way?
Quality improvement for public health services : How we can envision that the healthcare industry to change in the future for continuous quality improvement for public health services?
How the nss should incorporate technology to the public : What you believe should be written in the NSS. Specifically, explain the blockchain technology in layman's terms to nontechnical people
What are the ethically significant harms : What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning
Different data mining algorithms : We focus on deciding whether the results of two different data mining algorithms provides significantly different information
How much should calhoun debit to unrealized holding gain : Calhoun Company appropriately reported a $10,000 debit balance in its Fair Value Adjustment account. How much Calhoun debit to Unrealized holding gain/loss
Write python program to convert temperature : Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.
Happy workers are productive workers : How far do you agree with the statement "happy workers are productive workers"? Please illustrate your reply with reference to an organisation of your choice.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd