(a) |
Describe legal and ethical issues related to the use of computing devices (e.g., social media, advertising, encryption, malicious software and social engineering). |
(b) |
Explore how issues related to personal rights and privacy such as identity theft, data collection, permanence of information on the Internet and surveillance are affected by technologies. |
(c) |
Identify the role of different layers (e.g., network, operating system, application and data) of digital security, including the responsibility of users. |
(d) |
Discuss the benefits and limitations of user authentication techniques to prevent or allow access to resources |
(e) |
Research data encryption techniques used for storage and transmission. |
(f) |
Explore the role of personal responsibility in the context of access and use of confidential information, including intellectual property rights and plagiarism. |