ĐẠI HỌC QUỐC GIA THÀNH PHỐ HỒ CHÍ MINH
TRƯỜNG ĐẠI HỌC BÁCH KHOA
BÀI TẬP LỚN 3
NHẬP MÔN ĐIỆN TOÁN
Họ và Tên: VÕ CHÍ CƯƠNG
MSSV: 2410420
LỚP: LO3
1
Thứ tự trích dẫn
[7] → [15] → [5] → [14] → [7]
Bài luận hoàn chỉnh
Thou Shalt Not Use a Computer to Steal: Ethical and Practical Lessons in
Cybersecurity
Anonymous1,2
1 Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology
(HCMUT), Ho Chi Minh City, Vietnam
2 Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam
anonymous@hcmut.edu.vn
"Thou shalt not use a computer to steal" is what the fourth commandment of the Ten Command-
ments of Computer Ethics states. As technology rapidly evolves, computers and software systems
have become in-creasingly powerful. While this offers tremendous potential to improve society, it
also brings significant risks. Malicious programs designed to steal personal data or track user activi-
ties have existed since the start of the digital age, and their sophistication continues to grow [1].
An example is the WannaCry ransomware attack in 2017, which infected hundreds of thousands
of computers across 150 countries. This ransomware exploited vulnerabilities in Microsoft Windows,
causing widespread financial and operational damage. It highlighted the critical risks posed by out-
dated systems and poor security practices [2]. However, malicious software is not the only threat-
trusted platforms can also exploit user data. A prime example is the Facebook-Cambridge Analytica
scandal in 2010, where millions of users’ data were harvested without consent and used to influence
political campaigns, sparking global concerns about privacy and ethics [3].
To address these challenges, significant research has been conducted in cybersecurity. Advanced
technologies, including Artificial Intelligence (AI), are now being explored to protect users and com-
bat cyber threats. For example, AI systems can detect anomalies and respond to potential breaches
faster than traditional methods. Techniques like encryption and multi-factor authentication are increas-
ingly essential in modern cybersecurity frameworks [4]. Yet, attackers continue to exploit loopholes,
often using creative or deceptive tactics. Thus, cybersecurity measures must be continuously updated
to counter new and evolving threats [5].
It is essential for individuals to educate themselves on basic security practices to protect against
potential attacks. Simple measures, such as enabling two-factor authentication and being cautious with
suspicious links or emails, can significantly reduce risks. Cybersecurity is a shared responsibility,
requiring both technological advancements and informed users to create a safer digital environment
for everyone.
References
[1] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Com-
puter and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
2
[2] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of infec-
tion, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommunica-
tions and Information Technology, no. 1, pp. 113–124, 2019.
[3] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy pro-
tection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
[4] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional
(CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
[5] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Com-
puter and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.