7
Cyber-Security Cyber-Security Your Privacy and the NSA

Cyber-SecurityCyber-Security Your Privacy and the NSA

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber-SecurityCyber-Security Your Privacy and the NSA

Cyber-SecurityCyber-SecurityCyber-SecurityCyber-SecurityYour Privacy and the NSA

Page 2: Cyber-SecurityCyber-Security Your Privacy and the NSA

Beckstrom Resigns fromNational Cyber Security Center

• March 2009• “I have very serious

concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”

Page 3: Cyber-SecurityCyber-Security Your Privacy and the NSA

Dale Meyerrose

• Said that while intelligence officials need to be mindful of civil liberties concerns in the cybersecurity debate, the N.S.A. must have a leading role in that effort because of its technical expertise.

Page 4: Cyber-SecurityCyber-Security Your Privacy and the NSA

Amit Yoran• “There is a tremendous

amount of expertise at N.S.A. but I also agree that it would be a significant detriment to the nation to let the N.S.A. be the lead agency running cyberprograms. There is an inherent conflict of interest between their intelligence mission and the mission of the folks doing cyber.”

Page 5: Cyber-SecurityCyber-Security Your Privacy and the NSA

Privacy versus Security

Privacy Security

Idealistic PragmaticRealisticExistential

Page 6: Cyber-SecurityCyber-Security Your Privacy and the NSA

ACM/IEEE Code of Ethics

• Work to develop software and related documents that respect the privacy of those who will be affected by that software.

• In all these judgments concern for the health, safety and welfare of the public is primary.

Page 7: Cyber-SecurityCyber-Security Your Privacy and the NSA

References

• ACM/IEEE Code of Ethics• Barger, Robert; Computer Ethics• Risen, James and Lichtblau, Eric; “Control of

Cybersecurity Becomes Divisive Issue”; April 16, 2009