The Legal System and Ethics in Information Security

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Chapter 1: The Context of SA&D Methods
An Introduction of Multimedia Etiquette Nicole Huang.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
(computer) Ethics CMPT Ethics and Morality Morality and ethics have same roots and meaning: Mores means manner and customs in Latin Ethos (ΗΘ0Σ)
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
What Is Computer Ethics?
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
HUMAN RESOURCES HUMAN = PEOPLE + RESOURCES = SUPPLIES
Computer Ethics for Computer Users
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Computer Ethics Christina McCorkle.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Computers: Tools for an Information Age
Unit 3- Introduction to Computer Ethics
Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Seminar COE 390 Presentations Skills
Introduction to Computer Ethics
Presentation transcript:

The Legal System and Ethics in Information Security Information Assurance The Legal System and Ethics in Information Security By Amna al Jafar.

Author Name, Published year Published by SANS Institute. Copyright SANS Institute Author Retains Full Rights. Author: Amit Raju Philip. Published in: 15 July 2002.

Introduction How to protect new technologies from the evils of crime. The need for laws to protect computer technologies from theft or illegal use. Problems that faced the legal system to keep it fast development of technology. Display few of the laws that have been developed specifically to address computer crime. Author describes the role that ethics have to play in the world of computer security.

What is Ethics in using computer software Define how people live and work. Critically affected culture and values. Assists and extends the ability of mankind to capture, store, process, understand, use, create, and disseminate information at a speed and scale which had never been thought possible before.

Challenges the Legal System Faces Rapid Technological Advancement. Technologically Inept Legal Personnel. Multiple Roles of Computers in Crime. Jurisdiction. Computer Crime kept Quiet. Inadequate Precedence. Motive and Age of Offenders. Anonymity Offered by the Internet.

What is Computer Law? Computer law should cover the following: 1. Copyrights 2. Contracts. 3. Trademarks. 4. Patents. 5. Tort. 6. Computer crime and utilities.

Laws and Statutes that apply to Information Security They determine how computer security intrusions should be handled and investigated. What kind of evidence is required in order to prosecute, perpetrators. Very often security policies will be based on the kinds of laws available.

Ethics in Information Security Formulate laws to enforce all sorts of behaviors acceptable to society. Instead, society depends on ethics to build awareness of socially accepted behavior. Ethics unlike laws, they cannot be forced on individuals. In fact different individuals may have different ethical beliefs. Ethics can be molded and modified to suit the situation much more easily.

Conclusion Computer technology expanded to cover all the world but with its separation it has many drops and challenges facing it. This increases the importance of computer security. It is important that companies develop healthy computer ethics to minimize intrusions from within.

Recommendation People should not: 1. Use a computer to harm other people, to steal or to bear false witness. 2. Interfere with other people's computer work. 3. Snoop around in other people's computer files. 4. Copy or use proprietary software for which you have not paid. 5. Use other people's computer resources without authorization or proper compensation. 6. Appropriate other people's intellectual output.

Recommendation People should: 1.Think about the social consequences of the program you are writing or the system you are designing. 2. Use a computer in ways that insure consideration and respect for your fellow humans.