CST Ethics
1. Activity: Technical analysis – Before the ethical questions can be considered, the students might consider several immediate technical questions that will help inform the discussion on ethical issues. A sample data set or similar technical problem could be used for this analysis. For example: [ Is it possible to ascertain whether a breach has happened , and data has been accessed? ] Detecting the Breach: Check for signs that someone might have accessed information they shouldn't have, like unusual activity in system logs or unexpected data transfers. So, in this situation, if I were investigating a potential breach: E xamine System Logs: Review system logs for any unusual or irregular activities. Look for login attempts from unfamiliar locations or at odd hours, multiple failed login attempts, or any activities outside the ordinary patterns. Monitor Data Transfers: Keep an eye on data transfer log...