Describe the trade-off of convenience versus security/privacy.
o What are at least two advantages of running the software in the insecure/public mode?
o What are at least two risks associated with using the insecure/public mode?
2. Research how to change the settings between secure/private and insecure/public. Give a detailed
set of instructions on how to change settings to the secure mode that adheres to the guidelines in Part
3. Now that you have learned how to change between the secure and insecure modes, describe what
mode your software or system was in initially and what mode you decided to leave it in, and explain why
you made that choice.
Discuss software tradeoffs of security and privacy as an ethical question. Choose one of the tradeoffs
you discussed in either Part A or B, and one of the ethical theories we are studying in class
(Kantianism, Act Utilitarianism, Rule Utilitarianism, or Social Contract Theory). Describe the choice
made by the manufacturer of the system involved, and consider whether it is ethical in accordance with
the theory you chose. Analyze and give a final verdict.