computer ethics

Discussion: Week Seven – Group 1

Week Seven

CIS 50 Week 7 discussion banner

This weeks discussion focuses on social engineering and computer ethics. You will be working in small discussion groups to make conversations more manageable and interactive. You will post individually within your group and respond to your group members.

This week, you explored how attackers exploit human behavior through tactics like impersonation, authority, and trust, and how these same techniques can be used ethically in penetration testing. In this discussion, you will apply what you learned by creating a realistic scenario and analyzing both the risks and ethical considerations.

Important Reminder: Posting Deadlines Matter

Because discussions depend on interaction with your classmates, it is important that everyone posts on time. Posting your initial response by the deadline allows others enough time to read your ideas and respond thoughtfully. Late initial posts make it difficult for meaningful discussion to occur.Please no plagiarism no ai no chat bots. Original work only. Should be 500 words.

Discussion Prompt:

Step 1: Choose ONE scenario:

  • College campus
  • Workplace
  • Retail store
  • Hospital
  • Apartment complex

In your post:

  • Describe a social engineering attack:
    • Who is the attacker pretending to be?
    • What tactic is being used? (impersonation, authority, urgency, etc.)
  • Explain why the attack would work:
    • What human behavior is being exploited?
  • Propose one realistic defense:
    • What could prevent this attack?
  • Reflect on ethics:
    • When is this type of behavior acceptable (like in Maxie)?
    • When does it become unethical?

WRITE MY PAPER

Comments

Leave a Reply