1 / 7

Cyber-Security

Cyber-Security. Your Privacy and the NSA. Beckstrom Resigns from National Cyber Security Center. March 2009

walter
Download Presentation

Cyber-Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber-Security Your Privacy and the NSA

  2. Beckstrom Resigns fromNational Cyber Security Center • March 2009 • “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”

  3. Dale Meyerrose • Said that while intelligence officials need to be mindful of civil liberties concerns in the cybersecurity debate, the N.S.A. must have a leading role in that effort because of its technical expertise.

  4. Amit Yoran • “There is a tremendous amount of expertise at N.S.A. but I also agree that it would be a significant detriment to the nation to let the N.S.A. be the lead agency running cyberprograms. There is an inherent conflict of interest between their intelligence mission and the mission of the folks doing cyber.”

  5. Privacy versus Security Privacy Security Existential Realistic Idealistic Pragmatic

  6. ACM/IEEE Code of Ethics • Work to develop software and related documents that respect the privacy of those who will be affected by that software. • In all these judgments concern for the health, safety and welfare of the public is primary.

  7. References • ACM/IEEE Code of Ethics • Barger, Robert; Computer Ethics • Risen, James and Lichtblau, Eric; “Control of Cybersecurity Becomes Divisive Issue”; April 16, 2009

More Related