The study of ethics covers the subject of determining what is right and wrong. Ethical judgments drawn by ethicists are based on the moral standards of hypotheses, which embody our moral intuitions about right and wrong. Deontology and consequentialism are two theoretical positions that are commonly applied in moral philosophy. Contrary to consequentialist perspectives, which agree that activities are immoral to the extent that unfavorable consequences occur, deontological techniques assert that persons have moral obligations that exist regardless of the good or bad that may come from their actions. Moral principles influence the policy. Morality, on the other hand, contends that laws cannot take the place of moral character. The morality and legality of actions are typically things that people and organizations need to consider (Brey 21).
When we talk about computer security, we are talking about the measures put in place to give the system the required degree of integrity, confidentiality, and legal protection against misuse and malfunction, as well as any data it might contain. Computer security is divided into system security and information or data security. The former protects against harmful software and hardware infection and alteration of the computer system. On the other hand, the protection of data in a computer system to assure its privacy, accuracy, and availability is the subject of information security (Brey 22).
Computer Security and Ethics
Users are often put in a difficult situation since computer security solutions frequently have advantages and downsides simultaneously. One example is when security measures are triggered to protect users’ privacy; however, the same security feature can also be used to deny access to users authorized to see that content.