Cyber Ethics Name Institution Course Date Introduction It is important to comprehend cyber ethics when browsing over the internet. The reason is because it helps in maintaining the code of conduct among the members. Computer security threats are intentional or accidental dangers that may cause a computer to malfunction and also bring about the loss of important information saved in the computer storage device (Stallings & Brown 2012). The intentional and accidental computer security threats are mainly aimed to either harm the computer system steal important information or money from the computer or to just annoy the computer user. The main cause of the menace is the advancement in technology especially through the use of internet. This paper will explain the cyber ethics as it answers the questions related to security threats. Question 1 (a) Describe and give examples of the 2 most significant computer security threats that are the computer virus. Thirdly the computer user should always ensure that he/she is using the licensed computer software and not fake computer programs that can eventually result to the loss of date from the computer. This can even damage the whole computer system by acting like computer virus and thus resulting to the loss of both information and property of the computer owner. Consequently the computer owner may be forced to purchase a new computer hardware and even software. References Laudon K. C. & Laudon J. P. (2016). Management information system. Pearson Education India. Ritchie J. Lewis J. Nicholls C. M. & Ormston R. (Eds.). (2013). Qualitative research practice: A guide for social science students and researchers. Sage. Stallings W. & Tahiliani M. P. (2014). Cryptography and network security: principles and practice (Vol. 6). London: Pearson. Taylor R. W. Fritsch E. J. & Liederbach J. (2014). Digital crime and digital terrorism. Prentice Hall Press. [...]
Instructions: There are three (3) topic areas listed below that are designed to measure your knowledge level specific to your understanding and ability to analyze the professional, ethical, legal, security and social issues in the global field of computing. You must respond to all three questions by providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements. State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate. Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to each of the topics is a fundamental component of your quiz as well. You must have at least one reference for each topic and you cannot use the same reference to satisfy this requirement. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. References with no date (n.d.) are not acceptable. Each question requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. - Need at least 300 words for each question. - less than 4 years old reference.