ETHCS 303 - Ethics and Cybersecurity¶
This section collects the ETHCS 303 study guides in one place. The material focuses on ethical hacking foundations, privacy in cyberspace, Saudi cyber law, network security and privacy, moral theories, and ethical issues in systems analysis and software engineering. The original lecture PDFs are collected in the slides section.
Study Guides¶
-
Introduction to Ethical Hacking
Information security basics, the CIA triad, core attack terms, threat categories, malware, insiders, and information warfare.
-
Privacy Issues in Cyberspace
Privacy concepts, online tracking, cookies, fingerprinting, privacy in cloud, mobile, social media, IoT, e-government, and biometrics.
-
Network Security and Privacy in the Cloud
Cloud privacy and security concepts, cloud risks, protection methods, and review material for privacy issues in cloud computing.
-
Network Security and Privacy
Network security concepts, privacy risks, protection goals, and the relationship between security controls and personal information.
-
Moral Systems, Ethical Concepts, and Theories
Moral systems, ethical reasoning, major ethical concepts, and theories used to analyze decisions in cybertechnology and computing.
-
Kantianism
Duty-based ethics, categorical imperatives, respect for persons, autonomy, and how Kantian reasoning applies to ethical decisions.
-
Utilitarianism
Consequence-based ethics, the principle of utility, greatest happiness, act utilitarianism, rule utilitarianism, and common criticisms.
-
Social Contract Theory
Social agreements, rights and responsibilities, consent, fairness, and how social contracts shape ethical rules in society and technology.
-
Cyber Laws in Saudi Arabia
Saudi anti-cybercrime law, attack categories, legal consequences, and chapter review material.
-
Ethical Issues in Systems Analysis and Software Engineering
Professional ethics, system development responsibilities, software engineering decisions, and ethical risks in analysis and design.
-
Business Ethics
Ethical principles in business, common dilemmas, responsible decision-making, CSR, ethical leadership, and the cost of unethical behavior.
-
Social Engineering
Human-centered attacks, persuasion tactics, phishing, impersonation, and defenses against manipulation-based security threats.
-
Social Media Ethical, Legal, and Security Issues
Ethical, legal, security, hiring, organizational, and marketing issues connected to social media use.
-
Slides
Original ETHCS 303 lecture PDFs for quick reference and review.
-
Quizzes
Exam-prep quizzes for ETHCS 303 topics, including privacy, cloud computing, cyber law, software engineering ethics, and business ethics.
About This Material
These pages are standalone interactive study guides. Use the navigation links above or the course menu to move between them.