Fundamentals of Information Systems

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Chapter 9: Privacy, Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Policies and procedures must be established to avoid computer waste and mistakes
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Management Information Systems
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Chapter 11 Security and Privacy: Computers and the Internet.
Computer Crime and Information Technology Security
Computer Waste and Security Privacy Computer Health.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BUSINESS B1 Information Security.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Security, Privacy, and Ethics
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Principles of Information Systems, Ninth Edition Chapter 14 The Personal and Social Impact of Computers.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers.
Securing Information Systems
Information Systems Security
Securing Information Systems
Fundamentals & Ethics of Information Systems IS 201
Principles of Information Systems Eighth Edition
BUSINESS DRIVEN TECHNOLOGY
Add video notes to lecture
3.6 Fundamentals of cyber security
Fundamentals of Information Systems, Sixth Edition
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Principles of Information Systems, Ninth Edition
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Principles of Information Systems, Tenth Edition
Fundamentals of Information Systems Fourth Edition
Computer Viruses.
BCT 2.00 Analyze Technology Issues
Information Systems, Ninth Edition
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Policies and procedures must be established to avoid computer waste and mistakes
Principles of Information Systems Eighth Edition
Computer Security.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Technology Mrs. Huddleston
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Principles of Information Systems Eighth Edition
Presentation transcript:

Fundamentals of Information Systems Sixth Edition

Principles and Learning Objectives Policies and procedures must be established to avoid computer waste and mistakes. Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions. Identify policies and procedures useful in eliminating waste and mistakes. Principles of Information Systems, Sixth Edition.

Principles and Learning Objectives (continued) Computer crime is a serious and rapidly growing area of concern requiring management attention. Explain the types and effects of computer crime. Identify specific measures to prevent computer crime. Discuss the principles and limits of an individual’s right to privacy. Principles of Information Systems, Sixth Edition.

Principles and Learning Objectives (continued) Working conditions must be designed to avoid negative ethical consequences. Outline criteria for the ethical use of information systems. Principles of Information Systems, Sixth Edition.

7.1 Computer Waste and Mistakes The inappropriate use of computer technology and resources. Discarding of technology. Unused systems. Personal use of corporate time and technology. Spam. Principles of Information Systems, Sixth Edition.

Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful. A programmer might develop a program that contains errors. A data-entry clerk might enter the wrong data. Principles of Information Systems, Sixth Edition.

Table 7.1: Types of Computer-Related Mistakes Principles of Information Systems, Sixth Edition.

7.2 Preventing Computer-Related Waste and Mistakes Establishing policies and procedures. Implementing policies and procedures. Monitoring policies and procedures. Reviewing policies and procedures. Principles of Information Systems, Sixth Edition.

7.3 Computer Crime Often defies detection. The amount stolen or diverted can be substantial. The crime is “clean” and nonviolent. The number of IT-related security incidents is increasing dramatically. Computer crime is now global. Principles of Information Systems, Sixth Edition.

The Computer as a Tool to Commit Crime Criminals need two capabilities to commit most computer crimes: Knowing how to gain access to the computer system. Knowing how to manipulate the system to produce the desired result. Illegal access and use. Data alteration and destruction. Information and equipment theft. Principles of Information Systems, Sixth Edition.

Cyberterrorism Cyberterrorist: intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them. Homeland Security Department’s Information Analysis and Infrastructure Protection Directorate. Principles of Information Systems, Sixth Edition.

Identity Theft An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else. The information is then used to obtain credit, merchandise, and services in the name of the victim or to provide the thief with false credentials. Identity Theft and Assumption Deterrence Act of 1998. Principles of Information Systems, Sixth Edition.

7.4 Illegal Access and Use Hackers. Criminal hackers (also called crackers). Script bunnies. Insiders. Principles of Information Systems, Sixth Edition.

Table 7.2: How to Respond to a Security Incident. Principles of Information Systems, Sixth Edition.

7.5 Data Alteration and Destruction Virus: a computer program capable of attaching to disks or other files and replicating itself repeatedly, typically without the user’s knowledge or permission. Worm: an independent program that replicates its own program files until it interrupts the operation of networks and computer systems. Trojan horse: a program that appears to be useful but actually masks a destructive program. Logic bomb: an application or system virus designed to “explode” or execute at a specified time and date. Principles of Information Systems, Sixth Edition.

7.6 Using Antivirus Programs Antivirus program: program or utility that prevents viruses and recovers from them if they infect a computer. An antivirus software should be run and updated often. Principles of Information Systems, Sixth Edition.

7.7 Preventing Computer-Related Crime Crime prevention by state and federal agencies. Crime prevention by corporations: Public key infrastructure (PKI): means to enable users of an unsecured public network such as the Internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. Biometrics: the measurement of one of a person’s traits, whether physical or behavioral. Principles of Information Systems, Sixth Edition.

Preventing Computer-Related Crime (continued) Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion. Managed security service provider (MSSP): an organization that monitors, manages, and maintains network security hardware and software for its client companies. Internet laws for libel and protection of decency. Principles of Information Systems, Sixth Edition.

Preventing Crime on the Internet Develop effective Internet usage and security policies. Use a stand-alone firewall with network monitoring capabilities. Deploy intrusion detection systems, monitor them, and follow up on their alarms. Monitor managers and employees. Use Internet security specialists to perform audits. Principles of Information Systems, Sixth Edition.

7.8 Privacy Issues With information systems, privacy deals with the collection and use or misuse of data. Privacy and the federal government. Privacy at work. E-mail privacy. Privacy and the Internet. Principles of Information Systems, Sixth Edition.

7.9 Privacy Laws and Regulations The Privacy Act of 1974. Gramm-Leach-Bliley Act. USA Patriot Act. Other federal privacy laws. Principles of Information Systems, Sixth Edition.

Self Examination Questions Short Answer Questions (3 marks) 1) What is Computer waste? Name any FOUR types of Computer-related Mistakes. 2) How the Computer-related Wastes and Mistakes can be prevented? 3) What is an Antivirus Program?   Long Answer Questions (5 marks) 4) Explain how the Data Alteration and Destruction occurs. 5) Describe in detail how the Computer-Related crimes can be prevented? 6) Write short notes on: (a)Computer crime (b)Cyberterrorism (c)Identity theft. Principles of Information Systems, Sixth Edition.