Describe the trade-off of convenience versus security/privacy.
o What are at least two advantages of running the software in the insecure/public mode? o What are at least two risks associated with using the insecure/public mode?
2. Research how to change the settings between secure/private and insecure/public. Give a detailed set of instructions on how to change settings to the secure mode that adheres to the guidelines in Part A.2. 3. Now that you have learned how to change between the secure and insecure modes, describe what mode your software or system was in initially and what mode you decided to leave it in, and explain why you made that choice. Discuss software tradeoffs of security and privacy as an ethical question. Choose one of the tradeoffs you discussed in either Part A or B, and one of the ethical theories we are studying in class (Kantianism, Act Utilitarianism, Rule Utilitarianism, or Social Contract Theory). Describe the choice made by the manufacturer of the system involved, and consider whether it is ethical in accordance with the theory you chose. Analyze and give a final verdict.