Dr. Karen A. Forcht Professor of Information and Decision Sciences

Slides:



Advertisements
Similar presentations
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Breaking Trust On The Internet
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
1 Pertemuan 11 & 12 The Internet and the New Information Technology Infrastructure Matakuliah: J0454 / Sistem Informasi Manajemen Tahun: 2006 Versi: 1.
Origins of the Internet The Internet was started as a research project sponsored by the Advanced Research Projects Agency (ARPA) within the U.S. Dept.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 19 Internet Basics.
Internet Basics مهندس / محمد العنزي
Chapter 3 Ethics, Privacy & Security
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Internet Technology I د. محمد البرواني. Project Number 3 Computer crimes in the cybernet Computer crimes in the cybernet Privacy in the cybernet Privacy.
Internet Security for Small & Medium Business Week 6
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
By: Group 1 Andrew (1), Josh (2), Chu Yuan (3), Daryl (4), Davin (5)
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Chapter 2 The Internet and the World Wide Web. 2 Objectives Brief history Internet Access Six Internet Services –Web – –Chat (instant messenger)
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
A Very Brief History of the Internet. The early development of what became the Internet.  In 1957, the Department of Defense founded the Advanced Research.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
WEB SERVER SOFTWARE FEATURE SETS
Topics in Technology and Marketing In The Beginning.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
6/28/ A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
4.01 How Web Pages Work.
Securing Information Systems
TOPIC: HTTPS (Security protocol)
BASIC CONCEPTS ON INTERNET &
Network Security (the Internet Security)
Secure Software Confidentiality Integrity Data Security Authentication
HISTORY OF COMPUTERS AND TECHNOLOGY
Chapter 17 Risks, Security and Disaster Recovery
The World Wide Web and the Internet Extended Learning Module B
Internet.
File Transfer Protocol
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Pooja programmer,cse department
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Unit# 5: Internet and Worldwide Web
A worldwide system of interconnected computer networks.
Internet.
APACHE WEB SERVER.
Unit 8 Network Security.
Electronic Payment Security Technologies
Lesson 19 Internet Basics.
Information Retrieval and Web Design
4.01 How Web Pages Work.
Internet and the world wide web (www)
INTERNET SECURITY.
Presentation transcript:

Privacy, Confidentiality, Security And Control Issues Relating To The Wide-Spread Use Of The

Dr. Karen A. Forcht Professor of Information and Decision Sciences College of Business James Madison University Harrisonburg, VA 22807 Forchtka@jmu.edu

Loyola College in Maryland Baltimore, Maryland April 11,1997 Presentation for: David D. Lattanze Center For Executive Studies in Information Systems Loyola College in Maryland Baltimore, Maryland April 11,1997

Internet . . .

Overview Of Presentation Internet Defined Development of Internet Policies Basic Internet Security Mechanisms Firewalls Cryptographic Techniques Consumer Concerns with Internet Security Doing Business on the Internet Internet Security Tools and Techniques

Network of Networks Over 30,000 Networks 4,000 host computers 40-50 million people worldwide 10,000 users added monthly in U.S. Over 85 countries Relies on Voluntary Cooperation/Respect No responsible governing body

Began in late 1960s - Department of Defense Advanced Research Projects Agency (ARPA) - 1970’s National Science Foundation - 1980’s Late 1980s, became public

Information poor versus information rich Basically free use Maintenance/upkeep becoming burden Commercial sites growing

Growth of Internet Introduces: Issues of Security Reliability Ownership Liability

Uses of Internet E-mail “Surfing” Global Information Transfer File Transfer Protocol (FTP) Chat Groups Bulletin Boards Clubs/Organization Boards Pornography Solicitation Commercial Ventures

Connectivity Problems Include TCP/IP Incompatibility Uniform Resource Locators (URL’s) unreliable Hypertext Markup Language (HTML) slows down systems Name Pages Proliferate Lack of implementation of open systems interconnection (OSI) globally

No one police unit Laws do not apply Anonymous users Responsibility for under-age users Spamming, Cracking E-mail insecurity Password capture

Crimes of Internet Use Pornography Child solicitation Financial data diverted Hacking Data manipulation

Today’s Security Climate Network Use Policies/Protocols Employee Attitude/Training Fair Competitive Practices Clear Organizational Structure Fair use Policies

Personal Credo When Using Internet Integrity - accuracy Reliability - complete Availability - up to date Security - adequate protection measures

Introducing over long time Provide case studies Emphasize improvements Consider employee input Set senior management’s commitment/involvement Describe consequences of security breaches Consider diverse opinions Appoint workgroup security person Develop policies and procedures Enforce standards Monitor compliance

Parameters to Include in Internet Policy Authentication -- proof of identity Access Control - who/what Integrity - pureness of data Confidentiality - keep information private

People Problems Design and implementation of security mechanisms should consider: Complexity of communications networks Counter measures when using algorithms Unique services/procedures not always clear Physical placement of network points/nodes Encryption keys need protection

Attack Points Send Mail Login bypassing authentication Password sniffers Script availability

Internet Security Tools Firewalls Cryptology Authentication settings Secret Keys Public Keys Clipper Chip Secure Socket Layer (SSL) Secured Servers Physical Security

Consumer Concerns Pornography Privacy Racial/Sexual Harassment Credit card/billing issue Password Capture E-mail violations Stalking Diversion of Financial Transactions

The New Internet Talk Work Shop Play Invest

Available Techniques (PGP) Pretty Good Privacy Software E-mail Protection Devices Password Protection Schemes Using Protection Software Chipper Chip Technologies Encryption Devices