Главная
Study mode:
on
1
Intro
2
Ethics in Computer Security
3
Example #1: Electronic Car Locks
4
Example #2 - Medical Device Security
5
Possible Solution
6
Ethics is Rarely Black & White
7
Normal Disclosure Process
8
What is Disclosure Timeline?
9
Disclosure Timeline Trickiness
10
Company Side Concerns
11
Typical Result - Disclosure to Consultan
12
Disclosure Example - ECU Bootloader
13
Bug Bounties - being rewarded for disclosure
14
Bug Bounty Issues...
15
Computer Security Ethics
16
Computer Security Laws
17
DMCA Issues
18
Canadian Bill C-11 Copyright Modernizati
19
Security Research (General Caveats)
20
Warning: Embarrassing Governments
21
Ethics - Summary
Description:
Explore the complex intersection of ethics and computer security in this 36-minute lecture from Dalhousie University's ECED4406 course. Delve into real-world examples involving electronic car locks and medical device security, examining potential solutions and the nuanced nature of ethical decision-making in the field. Learn about normal disclosure processes, timelines, and the challenges faced by both researchers and companies. Investigate bug bounty programs, their rewards, and associated issues. Gain insights into computer security ethics, relevant laws, and the impact of legislation like DMCA and Canadian Bill C-11 on security research. Understand the potential risks and considerations when conducting security research, including the sensitive nature of exposing government vulnerabilities.

Ethics and Computer Security

Colin O'Flynn
Add to list
0:00 / 0:00