Magazine annually researches, names, reviews corporate citizenship. Also publishes annual socially responsible investing issue. Cornell Researchers Highlight Ethical Lapses in Recent Cybersecurity Failures. The internet is everywhere. From simple dial up connections on bulky computers, the spread of internet access to watches, cameras, printers, refrigerators and televisions demonstrates the progress the computing industry has made. Connectivity is lauded for making our lives convenient and efficient. However, the increasing frequency of malware attacks and data leaks suggests that advancements in cybersecurity are not keeping pace. As a testament to this fact, on Sept. U. S. residents had personal information like their social security and drivers licence numbers compromised from credit reporting agency Equifax. The Sun sat down with Prof. Every patient encounter involves multiple legal and ethical issues. Health care providers who do not know the legal and ethical rules for dealing with patients are at. By Robert A. Barrer. Which of the following statements are true A. Email is a wonderful tool for the successful practice of law. B. Email not only saves time and. Stephen Wicker, electrical and computer engineering, and Prof. Emin Gun Sirer, computer science, to discuss related threats, ethical questions and solutions for the future. A rising threat seems to be coming from malware known as ransomware. This past May, ransomware attacks impacted more than 1. Microsoft Corporations Windows operating system in over 1. The malware responsible, Wanna. Cry, was reportedly stolen from the U. S. National Security Agency in April. Individuals, government agencies, academic institutions and businesses have all been victim to ransomware for nearly a decade. Such malware encrypts files on a computer and threatens to destroy them if a ransom, in bitcoins, is not paid within a certain period of time. Attacks have particularly affected hospitals, where doctors and nurses have lost access to patient records, putting lives at risk. In fact, earlier this year the Hollywood Presbyterian Medical Center in California paid 1. Wanna. Cry originated from software the NSA used for data collection and surveillance that exploited vulnerabilities in Windows. Only after the software was stolen and used to carry out attacks did the NSA inform Microsoft of the vulnerabilities. Incidents like these raise important questions about the origin of malware software and the ethical responsibilities of their creators. Wickers research is primarily focused on information systems and networks, with a particular emphasis on ethics and the law. He said that people misunderstand the NSA lapse as a legal issue when it is actually an ethical issue. Do the individuals and organizations involved have an ethical obligation Wicker said. I think so. Wicker acknowledges that it is obviously important to continue security surveillance, for example, to prevent terror attacks, but the tradeoffs need to be properly considered. There are other ways to do police work, in my opinion, Wicker said. He said he believes the NSA should have informed Microsoft of vulnerabilities in their software earlier. The governments obligation to build a secure computing infrastructure overrides the intelligence communitys desire to collect data, Gun Sirer said. Similar questions arise for those responsible for keeping these devices secure. After becoming aware of the vulnerabilities, Microsoft issued a patch to users to secure the bugs, but not all users complied. Therefore, not all computers were secure due to a phenomenon known as the free rider system. This free rider problem some manufacturers and users choosing to enjoy the benefits of the internet without taking the time and effort to maintain secure computing systems is unethical, and is a problem that will get much worse as the internet of things continues to grow, Wicker said. As opposed to the computers that run Windows, many internet connected devices do not have dedicated engineering teams issuing security patches, leaving them vulnerable to hacks. Gun Sirer believes that vendors should be responsible for security maintained on computers and objects connected to the internet of things. Furthermore, he feels that it is much more important to fix vulnerabilities than to keep them a secret. Finally, important questions have been raised about the regulation of currencies like bitcoin because it seems to be the preferred mode of ransom payment. Since organizations behind ransomware are large and underground, many of them go through the route of encrypting and holding files for ransom but many also outright steal bitcoins, Gun Sirer said. Ransom payments are hard to track because people are very likely to pay them, especially hospitals who need immediate access to patient information. Additionally, without a central regulator that monitors the movement of coins, accurately tracking payments is nearly impossible. Finally, the coins are easily transferable between countries because they bypass traditional banking systems, allowing such attacks to spread easily. Consequently, Gun Sirers research focuses on regulating and securing cryptocurrencies such as bitcoin. His team developed Volt technology, which enables people to override thefts and reclaim stolen tokens. In response to such attacks, Gun Sirer and his team have helped different Cornell entities, including the University Treasurer, develop a disaster preparedness plan to combat such attacks. While the immediate consequences of attacks over the past few months have been severe, they have opened up debates both in the intelligence and computing communities on the ethical questions in cybersecurity. Both Wicker and Gun Sirer specialize in different areas, but agree on some common principles that surveillance, while necessary, cannot override the need to secure the data of average citizens and that those responsible for building computer infrastructure need to keep it secure. Microsoft Visual Fox. Pro Forum Tek Tips. Join your peers on the Internets largest technical computer professional community. Its easy to join and its free. Heres Why Members Love Tek Tips Forums Register now while its still free Already a memberClose this window and log in. Join Us Close.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |