{"id":12048,"date":"2022-08-28T13:33:31","date_gmt":"2022-08-28T13:33:31","guid":{"rendered":"https:\/\/highclasswriters.com\/blog\/?p=12048"},"modified":"2022-08-28T13:33:33","modified_gmt":"2022-08-28T13:33:33","slug":"ethics-in-cybersecurity-case-study","status":"publish","type":"post","link":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/","title":{"rendered":"Ethics in Cybersecurity Case Study"},"content":{"rendered":"\n<p>The Department of Homeland Security is interested in using computers to identify suspected of money laundering operations within the United States. It would like to mine databases containing information about purchases and travel to detect patterns that may identify individuals who are engaged in, or at least planning, money laundering activity. It asks a panel of information security professionals to determine the feasibility of this project. A panel members say the most difficult problem will be determining what patterns of transactions to look for. As a panel member you suggest that it might be possible to construct a computer program that uses artificial intelligence to mimic money laundering activity. The program would determine the transactions needed to execute money laundering act. Once these transactions were determined, it would be possible to search databases resources to find evidence of these transactions. However, the major draw back is that there would be no way to narrow the scope of investigation to a few potential money laundering individuals and in fact a large population of individuals would needs to be searched potentially violated many individual&#8217;s privacy. As a information security professional assigned to this project, what would be the ethical and moral issues, from your perspective, of developing a computer program capable of violating a large population of individuals&#8217; privacy in order to identify and potentially catch a few suspected individuals of money laundering? How does this play into what we learned in this course about the issues related to violating an individual&#8217;s privacy? What about the greater good for society by catching these money laundering individuals?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Department of Homeland Security is interested in using computers to identify suspected of money laundering operations within the United [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-12048","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ethics in Cybersecurity Case Study - Highclasswriters<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethics in Cybersecurity Case Study - Highclasswriters\" \/>\n<meta property=\"og:description\" content=\"The Department of Homeland Security is interested in using computers to identify suspected of money laundering operations within the United [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/\" \/>\n<meta property=\"og:site_name\" content=\"Highclasswriters\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-28T13:33:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-28T13:33:33+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/\",\"url\":\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/\",\"name\":\"Ethics in Cybersecurity Case Study - Highclasswriters\",\"isPartOf\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/#website\"},\"datePublished\":\"2022-08-28T13:33:31+00:00\",\"dateModified\":\"2022-08-28T13:33:33+00:00\",\"author\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae\"},\"breadcrumb\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/highclasswriters.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethics in Cybersecurity Case Study\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#website\",\"url\":\"https:\/\/highclasswriters.com\/blog\/\",\"name\":\"Highclasswriters\",\"description\":\"Essay Writing Service\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/highclasswriters.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/highclasswriters.com\/blog\"],\"url\":\"https:\/\/highclasswriters.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethics in Cybersecurity Case Study - Highclasswriters","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/","og_locale":"en_US","og_type":"article","og_title":"Ethics in Cybersecurity Case Study - Highclasswriters","og_description":"The Department of Homeland Security is interested in using computers to identify suspected of money laundering operations within the United [&hellip;]","og_url":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/","og_site_name":"Highclasswriters","article_published_time":"2022-08-28T13:33:31+00:00","article_modified_time":"2022-08-28T13:33:33+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/","url":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/","name":"Ethics in Cybersecurity Case Study - Highclasswriters","isPartOf":{"@id":"https:\/\/highclasswriters.com\/blog\/#website"},"datePublished":"2022-08-28T13:33:31+00:00","dateModified":"2022-08-28T13:33:33+00:00","author":{"@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae"},"breadcrumb":{"@id":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/highclasswriters.com\/blog\/ethics-in-cybersecurity-case-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/highclasswriters.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ethics in Cybersecurity Case Study"}]},{"@type":"WebSite","@id":"https:\/\/highclasswriters.com\/blog\/#website","url":"https:\/\/highclasswriters.com\/blog\/","name":"Highclasswriters","description":"Essay Writing Service","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/highclasswriters.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/highclasswriters.com\/blog"],"url":"https:\/\/highclasswriters.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/12048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/comments?post=12048"}],"version-history":[{"count":1,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/12048\/revisions"}],"predecessor-version":[{"id":12049,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/12048\/revisions\/12049"}],"wp:attachment":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/media?parent=12048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/categories?post=12048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/tags?post=12048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}