Labs
1
.
Using the Responsible Computing Framework, how will you include guidance for ethical behavior in your company’s architecture? Why does this matter? As you develop the architecture, what ethical behaviors are you most concerned about and why?
2
.
The term “white hat hacker” is used to describe a career field or title in cybersecurity where cyber experts purposefully attack systems in legal and ethical ways to provide feedback to improve cybersecurity. Research the tasks and things that cybersecurity experts do in this role, and explain why it is a crucial part of systems development? Should a system that has already been deployed still have this level of cybersecurity analysis?
3
.
Research a cyber-attack against critical infrastructure and why it is so important for both private organizations who own and operate such networks and why it is also important for government organizations to oversee and ensure proper governance of such cybersecurity measures. Focus on the impact some of the incidents have had on the local communities that depend on these types of infrastructure.