2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Chapter 9: Privacy, Crime, and Security
BUSINESS PLUG-IN B6 Information Security.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
Protecting People and Information Threats and Safeguards
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14 Although information technology has become so valuable most of.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Policies and procedures must be established to avoid computer waste and mistakes
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Management Information Systems
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Computer Crime and Information Technology Security
Computer Waste and Security Privacy Computer Health.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BUSINESS B1 Information Security.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security, Privacy, and Ethics
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
IT in Business Issues in Information Technology Lecture – 13.
Principles of Information Systems, Ninth Edition Chapter 14 The Personal and Social Impact of Computers.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers.
Fundamentals & Ethics of Information Systems IS 201
Principles of Information Systems Eighth Edition
Add video notes to lecture
IT Security  .
Fundamentals of Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Fundamentals of Information Systems Fourth Edition
BCT 2.00 Analyze Technology Issues
Policies and procedures must be established to avoid computer waste and mistakes
Principles of Information Systems Eighth Edition
Chapter # 3 COMPUTER AND INTERNET CRIME
Principles of Information Systems Eighth Edition
Presentation transcript:

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit crime –Computer as object of crime –Preventing computer related crime Privacy issues _______ issues in information systems Patent & copyright issues Health concerns

3 Ethical Issues in Information Systems “Old contract” vs “Social contract” of business

4 Computer Waste Computer waste –The inappropriate use of computer technology and resources Discarding of technology Unused systems Personal use of corporate time and technology __________

5 Computer-Related Mistakes Computer-related mistakes –Errors, failures, and other computer problems that make computer output incorrect or not useful Mistakes can be caused by unclear expectations and a lack of feedback A programmer might develop a program that contains errors A data-entry clerk might enter the wrong data

6 Preventing Computer-Related Waste and Mistakes Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures

7 Types of Computer-Related Mistakes Table 9.2: Types of Computer-Related Mistakes

8 Useful Policies to Eliminate Waste and Mistakes Table 9.3: Useful Policies to Eliminate Waste and Mistakes

9 Security – The Business Challenge Who’s the bad guy? Competitors, foreign governments, network hackers, disgruntled ex-employees, news and media, unauthorized customers, employees, etc? How do I protect my information from the bad guys, without making employees and authorized users less productive? How can I administer security consistently, reliably, and cost effectively across all of my distributed information resources ? Insiders 80% Outsiders 20% Studies show 80% of real security problems are caused by authorized users

10 Computer Crime Often defies detection The amount ________ or diverted can be substantial The crime is “clean” and nonviolent number of IT-related security incidents is increasing Computer crime is now __________

11 The Computer as a Tool to Commit Crime Criminals need two __________ to commit most computer crimes: –Knowing how to gain __________ to the computer system –Knowing how to __________ the system to produce the desired result __________ engineering Dumpster diving –Cyberterroism & Identity Theft

12 Cyberterrorism Cyberterrorist: intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer- based attacks against computers, networks, and the information stored on them

13 Identity Theft An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else The information is then used to obtain credit, merchandise, and services in the name of the victim or to provide the thief with false credentials

14 The Computer as the Object of Crime Illegal access and use –Hackers –__________(also called crackers) –Script bunnies –Insiders Data alteration and destruction –Virus –Worm –Trojan horse –Logic bomb Antivirus program

15 The Computer as the Object of Crime (cont) Information and equipment theft criminal hackers require illegal access to identification numbers and passwords Password sniffer –Theft of data and software –Theft of computer systems and equipment Software and Internet piracy –Software piracy –Internet software piracy Computer-related scams –Phishing International computer crime

16 How to Respond to a Security Incident Table 9.4: How to Respond to a Security Incident

17 How to Respond to a Security Incident (continued) Table 9.4: How to Respond to a Security Incident (continued)

18 Preventing Computer-Related Crime Crime prevention by corporations –Public key infrastructure (PKI –Biometrics

19 Table 9.8: Common Methods Used to Commit Computer Crimes Common Methods Used to Commit Computer Crimes

20 Table 9.8: Common Methods Used to Commit Computer Crimes (continued) Common Methods Used to Commit Computer Crimes (continued)

21 Table 9.9: How to Protect Your Corporate Data from Hackers How to Protect Your Corporate Data from Hackers

22 Table 9.9: How to Protect Your Corporate Data from Hackers (continued) How to Protect Your Corporate Data from Hackers (continued)

23 Preventing Computer-Related Crime (continued) Intrusion detection system (IDS): __________ that monitors system and network resources and notifies network security personnel when it senses a possible intrusion Managed security service provider (MSSP): an organization that __________,manages, and maintains network security hardware and software for its client companies

24 Preventing Crime on the Internet Develop effective __________ usage and security policies Use a stand-alone __________ with network monitoring capabilities Deploy intrusion detection systems, monitor them, and follow up on their alarms Monitor managers and employees Use Internet __________ specialists to perform audits

25 Privacy Issues With information systems, privacy deals with the collection and use or misuse of data Privacy and the federal government Privacy at work privacy Privacy and the Internet

26 Corporate Privacy Policies Should address a customer’s knowledge, control, notice, and consent over the storage and use of information May cover who has access to private data and when it may be used A good database design practice is to assign a single unique identifier to each customer

27 Individual Efforts to Protect Privacy Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information