Cybersecurity

This curated page provides access to all cybersecurity-related videos, articles and education modules listed on the IEEE TechEthics resource pages. Visit often, as new resources are added regularly.

« Back to Resources By Topic

This curated page provides access to all cybersecurity-related videos, articles and education modules listed on the IEEE TechEthics resource pages. Visit often, as new resources are added regularly.

Videos

Digital padlock with text: The Moral Importance of Cybersecurity
Video

The Moral Importance of Cybersecurity

What benefits and harms can cybersecurity bring, either from its implementation or from a lack of it? And who is accountable for these? This panel addresses the ethical benefits and risks associated with cybersecurity technologies.

Articles/Publications

Article/Publication

New IEEE Standard for Securing Biomedical Devices and Data

To help better secure medical devices, equipment, and systems against cyberattacks, IEEE has partnered with Underwriters Laboratories, which tests and certifies products, to develop IEEE/UL 2933, Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS (Trust, Identity, Privacy, Protection, Safety, and Security).
Image of a dissolving lock with text: Emerging AI Cybersecurity Challenges and Solutions
Article/Publication

Emerging AI Cybersecurity: Challenges and Solutions

Did you know that the information you enter into a chatbot could also be used to train AI in the future? This can result in language models that reveal sensitive or private information to third parties. IEEE Impact Creators weigh in on how to defend against data leakage on IEEE Transmitter.
A screenshot of the WannaCry virus demanding bitcoin in exchange of file release and recovery.
Article/Publication

WannaCry Update: Microsoft Pushes a “Geneva Convention” to Thwart Cyberattacks

How a headline-grabbing moment in cybersecurity was used as a call for a “Digital Geneva Convention” to limit and defang future cyberattacks.

Education Modules

Hands are holding a tablet with an image of a padlock and the word Privacy on the screen
Education Module

Digital Privacy: Principles, Regulations, and Ethics

Explore the ethical foundations of privacy, common privacy principles, and the key drivers of digital privacy around the globe, namely seminal laws and regulations, in this new course from IEEE Digital Privacy.
Padlock on a background of cascading numbers.
Education Module

Ethical Hacking: Enumeration

This course reviews the concept of enumeration. Enumeration is the process of identifying resources on a network, and extracting information from a system. Techniques for retrieving information such as usernames, sharenames, network information and other vital pieces of information will be discussed.
Hands on a keyboard against a computer screen cooding.
Education Module

Ethical Hacking: Evasion Techniques

Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions.