100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Other

CP373 - Computer Ethics ASSIGNMENT 6 (IN CLASS ASSIGNMENT FILLED)

Rating
-
Sold
-
Pages
3
Uploaded on
30-08-2022
Written in
2021/2022

In class assignment 6 template filled out for ethics.









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 30, 2022
Number of pages
3
Written in
2021/2022
Type
Other
Person
Unknown

Content preview

CP373: Ethics and Professional Practice Qutaiba Albluwi – Winter 2022


A6: Cybersecurity Ethical Issues
If you attended both sessions type the following sentence in the white box:
“I certify that I attended both sessions of Module 6”
If you attended only one session type the following sentence:
“I certify that I attended one session of Module 6, which was on <day>”
If you were absent in both sessions, then you cannot submit this report.
I certify that I attended both sessions of Module 6
Notes:
- You need to fully complete this sheet, even if you have missed one session.
Part I: Zero day vulnerability
[1] What are zero-day vulnerabilities?
Zero-day vulnerabilities are newly found vulnerabilities in which hackers use a hole in a
computer system to launch a cyberattack. Any virus detection software would miss this
because it only looks for known programs.
[2] List two points that you learnt (or found interesting) from the short documentary
screened in class.
1) Market for holding many individuals’ security hostage
2) Governments trading for zero-day attacks information


[3] If someone discover a zero-day vulnerability, in your opinion what is the most ethical
decision to make (report, not report, sell, …etc).
If someone discovered a zero-day vulnerability, I'd make a judgement on whether to
report based on the impact of the zero-day vulnerability. If it's from a higher scale, I'd
report it, but if it's something minor, I wouldn't.
[4] There are several markets that operate today for selling and buying “zero-day”
vulnerabilities. List one advantage and one disadvantage for such markets.
- Advantage: may allow systems to be safer after trading occurs and the issue is
notified to the right people
- Disadvantage: person can do whatever they want with the information
purchased, and there would be nothing we can do over it



1
CA$12.77
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
dg22
1.0
(1)

Also available in package deal

Thumbnail
Package deal
CP373 - Computer Ethics ENTIRE TERM ASSIGNMENTS FILLED
-
11 2022
CA$ 140.48 More info

Get to know the seller

Seller avatar
dg22 Wilfrid Laurier University
View profile
Follow You need to be logged in order to follow users or courses
Sold
6
Member since
3 year
Number of followers
2
Documents
31
Last sold
1 month ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions