0% found this document useful (0 votes)
8 views3 pages

NMDT

The document discusses the ethical implications and practical lessons in cybersecurity, emphasizing the risks associated with advanced technology and malicious software. It highlights notable incidents like the WannaCry ransomware attack and the Facebook-Cambridge Analytica scandal, which raised concerns about data privacy. The text advocates for continuous updates in cybersecurity measures and the importance of individual education on security practices to mitigate risks.

Uploaded by

vochicuong006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

NMDT

The document discusses the ethical implications and practical lessons in cybersecurity, emphasizing the risks associated with advanced technology and malicious software. It highlights notable incidents like the WannaCry ransomware attack and the Facebook-Cambridge Analytica scandal, which raised concerns about data privacy. The text advocates for continuous updates in cybersecurity measures and the importance of individual education on security practices to mitigate risks.

Uploaded by

vochicuong006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ĐẠI HỌC QUỐC GIA THÀNH PHỐ HỒ CHÍ MINH

TRƯỜNG ĐẠI HỌC BÁCH KHOA

BÀI TẬP LỚN 3


NHẬP MÔN ĐIỆN TOÁN

Họ và Tên: VÕ CHÍ CƯƠNG


MSSV: 2410420
LỚP: LO3

1
Thứ tự trích dẫn
[7] → [15] → [5] → [14] → [7]

Bài luận hoàn chỉnh


Thou Shalt Not Use a Computer to Steal: Ethical and Practical Lessons in
Cybersecurity

Anonymous1,2
1 Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology

(HCMUT), Ho Chi Minh City, Vietnam


2 Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam

anonymous@hcmut.edu.vn

"Thou shalt not use a computer to steal" is what the fourth commandment of the Ten Command-
ments of Computer Ethics states. As technology rapidly evolves, computers and software systems
have become in-creasingly powerful. While this offers tremendous potential to improve society, it
also brings significant risks. Malicious programs designed to steal personal data or track user activi-
ties have existed since the start of the digital age, and their sophistication continues to grow [1].
An example is the WannaCry ransomware attack in 2017, which infected hundreds of thousands
of computers across 150 countries. This ransomware exploited vulnerabilities in Microsoft Windows,
causing widespread financial and operational damage. It highlighted the critical risks posed by out-
dated systems and poor security practices [2]. However, malicious software is not the only threat-
trusted platforms can also exploit user data. A prime example is the Facebook-Cambridge Analytica
scandal in 2010, where millions of users’ data were harvested without consent and used to influence
political campaigns, sparking global concerns about privacy and ethics [3].
To address these challenges, significant research has been conducted in cybersecurity. Advanced
technologies, including Artificial Intelligence (AI), are now being explored to protect users and com-
bat cyber threats. For example, AI systems can detect anomalies and respond to potential breaches
faster than traditional methods. Techniques like encryption and multi-factor authentication are increas-
ingly essential in modern cybersecurity frameworks [4]. Yet, attackers continue to exploit loopholes,
often using creative or deceptive tactics. Thus, cybersecurity measures must be continuously updated
to counter new and evolving threats [5].
It is essential for individuals to educate themselves on basic security practices to protect against
potential attacks. Simple measures, such as enabling two-factor authentication and being cautious with
suspicious links or emails, can significantly reduce risks. Cybersecurity is a shared responsibility,
requiring both technological advancements and informed users to create a safer digital environment
for everyone.

References
[1] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Com-
puter and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.

2
[2] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of infec-
tion, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommunica-
tions and Information Technology, no. 1, pp. 113–124, 2019.

[3] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy pro-
tection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.

[4] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional
(CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.

[5] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Com-
puter and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.

You might also like