1.2.3 Discuss the social and ethical issues associated with a networked world
Malware infections e.g. viruses, Trojan horses, toolkits, backdoor exploitations, spyware, ransomware, etc.
Automated Denial of Service (DOS) attacks.
Manual attacks by hackers e.g. code injection.
Unauthorized distribution of data by malicious employees.
Using strong firewalls, inbound and outbound.
Using malware scanning tools on incoming network traffic e.g. mail scanners.
Implementing strict security policies and practices e.g. password requirements, two-factor authentication.
Limiting network access to only where it is necessary.
Privacy
Privacy issues arise when computers are networked.
Connecting a computing device to a network creates the potential for access by third parties.
Data theft may include personal or business information.
Examples of privacy issues are:
Leaking of user information by attackers;
Accidentally sharing information with more people than intended;
Companies collecting data on employees;
Identity theft.
Censorship
Censorship issues arise when computers are interconnected because some of the information may be deemed inappropriate by the company administration who could ensure that no other computers could access the information.
Government networks may set up firewalls to block traffic bound for certain destinations or containing content deemed unsuitable.
Digital access restrictions should be placed on users at work.
Addiction
Which networks have made people, communities and groups with shared interests stay more “connected”, internet addiction and social network addiction have been recognized as psychological disorders globally.
Addiction to networks may be a catalyst for an unhealthy lifestyle.
Interpersonal social skills might deteriorate due to too much time spent on social networks instead of talking face to face
Dependency
Since networks are becoming one of the world’s most critical infrastructures, network failure may literally mean business failure.
As organizations continue to become more dependent on networks, they become more vulnerable to possible threats