Wednesday, July 10, 2013

Portfolio Assignment 2

Scott Hommel
7/9/2013
CMSY-129-N091
Portfolio Assignment 2
Digital Ethics

     The government of Saskatchewan reportedly defended its provincial computer system against "millions of cyber attacks" last year. With 15,000 computers in the network containing sensitive information related to health and finance, the province has made cyber-security a top priority out of necessity. Trying to stay one step ahead of hackers, they are committed to employee education and training which empowers them with the awareness and tools needed to prevent breaches of security. Retired computer security expert Terry Roebuck spent many years at the University of Saskatchewan thwarting hackers and ensuring the province's security. According to him the greatest threats come from "directed attacks", where cybercriminals are looking for specific information in a specific place. They will often cross-reference information from social networking sites with staff lists, gaining personal information that hackers can then use against the company to infiltrate their system. Seemingly one of the leading authorities on cyber-security, Saskatchewan has apparently had no previous security breaches and has yet to prosecute anyone for hacking into the province's system. This article is directly related to digital ethics, and governmental computer ethics in particular. The government is responsible for "defending a country's critical infrastructure from foreign governments, cybercriminals, and terrorist groups" according to this week's reading and that is exactly what Saskatchewan is doing.

In light of what the U.S. is currently going through with Edward Snowden, it was interesting to read about how another country handles cyber-security. While the United States has declared computer hacking by other nations "an act of war", Snowden disclosed that the U.S. government was doing exactly that with other countries. One thing that really grabbed my attention was how Roebuck described some of the tactics that hackers use. Gathering personal information from social networking sites, they are able to cross-reference information with the business that their target works for. The victim may receive an email claiming to be a picture of their son or daughter, yet when they click it there is no picture but now their computer has been compromised.


Works Cited

Baldauf, Ken. "5.3 Governmental Computer Ethics." Emerge with Computer Concepts. Vol. 4.0. Boston:
     Course Technology, 2013. ISS 50. Print.

    
Zakreski, Dan. "Sask. Government Computers Attacked Millions of times Last Year." CBC News. N.p., 9 July
     2013. Web. 10 July 2013. <http://www.cbc.ca/news/canada/saskatoon/story/2013/07/08/saskatoon-

          government-computer-hacking-130708.html>.

No comments:

Post a Comment