The threat of cyber war
This presentation is the property of its rightful owner.
Sponsored Links
1 / 5

The Threat of Cyber War PowerPoint PPT Presentation


  • 78 Views
  • Uploaded on
  • Presentation posted in: General

The Threat of Cyber War. The Issue of Cyber Security. A large California water system was tested and deemed to be very vulnerable with holes in security. US officials report that China has already laced the US power grid and other systems with malware ready to be activated.

Download Presentation

The Threat of Cyber War

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


The threat of cyber war

The Threat of Cyber War

The Issue of Cyber Security


The threat of cyber war

  • A large California water system was tested and deemed to be very vulnerable with holes in security.

  • US officials report that China has already laced the US power grid and other systems with malware ready to be activated.

  • Government lacks authority to secure these networks.

  • Most of the responsibility of security relies on the independent industries in charge of their own systems.

  • Ethical issues include government interference to privately owned industries in exchange for safety.


The threat of cyber war

  • 1. Should government interfere with privately owned businesses in exchange for security?

  • 2. The government and possibly some of the public would like to sacrifice these liberties for national security. The other portion of the public may believe in liberties for the businesses, especially the owners of the business themselves.

  • 3. a) The government may do whatever it takes to have appropriate safety measures for the companies at any time.

    • Best case would be that there is never any infringement on national security.

    • Worse case would be the government oversteps their authority and manipulates the companies for their own benefit using security as a probable cause.

      b) The government has no authority to apply safety protocols

      Best case would be the companies themselves apply appropriate safety measures themselves and avoid cases of cyber war.

      Worse case would be the companies leave themselves vulnerable to attacks from the net due to costs of applying security protocols.

      c) The two parties compromise and set a balance of security protocols. Possibly with government monitoring through periodic checks and tests.

      Best case would be the companies comply with these standards and it is enough that it is secure enough to malicious attacks.

      Worst case would be the protocols would be too weak since the two parties must compromise, causing a large risk for cyber attacks.

      I would choose C since it is most likely appropriate enough with a much better best case and less hazardous worst case.

      4. Yes, everybody would be willing since it is very relativistic that it would fit many situations. It may go towards the ends more than the means but it still protects civil liberties fair enough.


The threat of cyber war

  • 5. It is a very realist grounding of the situation. It is unlikely for one of the two parties to completely yield. So it is balanced.

  • 6. Yes, there would be majority agreement since it is a compromise. It may not cause the greatest good since there are so many hypothetical's that could happen.

  • 7. Yes, the solution I chose is personally committed towards my own conscience. I feel like this situation may affect me later in the future.

  • 8. Realism definitely takes precedence here. I feel that a solution that is in accord with logistics will be most effective.


Acm code

ACM Code

  • This solution is conducive to the code since it respects the privacy of the independent company from government breach, mostly.

  • It is also helpful to society to issue security protocols to prevent cyber crimes affecting national security.

  • It is fair in accordance to both sides. A compromise is made, to agreement of both sides.


  • Login