computer ethics

Please respond to cisco with 150 words no plagiarism, no a i. no chat bots

One of the resources that really stood out to me this week was the CISA Digital Identity and Secure Our World guidance, because it clearly shows how user behavior plays a major role in cybersecurity and ethics.

One of the main concepts emphasized by CISA is that protecting digital identities is not simply a technical task handled by organizations. It also depends on how people interact with technology on a daily basis. Actions such as enabling multi-factor authentication (MFA), using passkeys, and recognizing phishing attempts can all help reduce cyber attacks. This demonstrates that cybersecurity is a shared responsibility between individuals and organizations.

In my own technology use, I rely most on my gaming account, email account, and social media accounts. If any of these were hacked, it would be extremely disruptive, especially since my email account is used for account recovery for almost everything else. I have received phishing emails before, one example was an email that appeared to come from Microsoft, but it was misspelled as Mlcrosoft. Because of experiences like this, I do not open emails unless I am expecting them, and I always carefully read the information before clicking anything. I have also started using second-step verification and passkeys, which has made me feel much more secure.

Regarding my digital identity, I know that some information about me is already online, such as old photos from when I used to hang out with friends. However, the part of my digital identity that I believe is most vulnerable is my passive data, since I dont care about hiding my browsing habits or online activity. When I was younger, I reused passwords across multiple accounts, but I am now transitioning everything to passkeys, and MFA which is much more secure.

From an ethical perspective, I believe responsibility for a compromised account is shared between individuals and companies. Many users assume that a strong password is enough and trust that large corporations are properly protecting their accounts. At the same time, companies have an ethical responsibility to treat user data as a trust rather than just an asset. A real-world example of this is the AT&T data breaches, where sensitive customer information was stolen.

I was personally affected by the AT&T breach. My Social Security number was compromised and used for employment, which I discovered when I applied for a program and nearly lost my eligibility because my SSN was already in use. This experience made the risks of cybersecurity failures very real to me, and it has motivated me to educate my family members who may not fully understand these threats.

After reflecting on this weeks assignments, one security habit I plan to implement is closing old accounts that I no longer use, since unused accounts can still be compromised. The easiest habit for me to follow is enabling MFA because it’s straightforward and effective. The most difficult habit is keeping my systems fully updated because, as a computer and gaming enthusiast, I know updates can sometimes interfere with programs or games that are working perfectly.

Overall, I believe ethical cybersecurity behavior is important for my future career and reputation. I cannot advocate for security if I do not practice it myself. As the digital world continues to grow, maintaining ethical cybersecurity habits helps build a white-hat reputation, which is essential for trust, credibility, and long-term advancement.

WRITE MY PAPER

Comments

Leave a Reply