Module 2.2 Security, legal and ethical issues Theme: Finding solutions.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

4 Information Security.
Protecting Personal Information Guidance for Business.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Factors to be taken into account when designing ICT Security Policies
SPYWARE  Do you know where your personal information is?
Issues Raised by ICT.
Protecting ICT Systems
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
General Awareness Training
General Purpose Packages
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Computer Security, Ethics and Privacy Chapter 11.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Security Issues, Ethics, & Emerging Technologies in Education
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
RootKit By Parrag Mehta OUTLINE What is a RootKit ? Installation Types How do RootKits work ? Detection Removal Prevention Conclusion References.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Safety and Security issues of using ICT Alys brooks.
Chap1: Is there a Security Problem in Computing?.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Computer Skills and Applications Computer Security.
By Celine and Josh.  A loss caused by customer theft, fraudulent payment, or nonpayment  Shoplifting costs retailers billion dollars a year, according.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Protect Your Good Name Reduce your Risk of Identity Theft.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computer Security Sample security policy Dr Alexei Vernitski.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Securing Information Systems
Legal and ethical issues
COMPUTER CRIMES Presented by THABO.
Reduce Your Risk of Identity Theft
Reduce Your Risk of Identity Theft
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
Reduce Your Risk of Identity Theft
Reduce Your Risk Of Identity Theft
G061 - Network Security.
Presentation transcript:

Module 2.2 Security, legal and ethical issues Theme: Finding solutions

Computer crime Computer crime involves the use of ICT to commit a crime or to assist in the commission of a crime.

Computer crime Examples –Data theft –Identity theft –Pornographic exploitation –Paedophile ‘rings’ –Piracy –Theft of computer resources –Theft from companies and bank accounts

Computer crime Containing and preventing is difficult because –no specially trained police officers –budget not big enough –laws unclear –crime committed across international boundaries.

Activity EXPLORE Activity 1 p 68 1

Security risks –Malware –Unauthorised access –Unauthorised use –Hardware theft –Software theft –Data theft –System failure Security in ICT

TERMINOLOGY Activity 2 p 69 2 Activity

Security in ICT Precautions – Control access Lockable cases Kensington lock cables Key control

Security in ICT Precautions – Backups

APPLY Activity 3 P 71 3 Activity

Precautions – Install malware detection and removal tools Anti-virus software Spyware prevention software Firewall software Security in ICT

EXPLORE Activity 4 p 74 4 Activity

Security in ICT Precautions – Safeguard against system failure UPS

APPLY Activity 5 p 75 5 Activity

Legal issues What rights do you have as worker or employee? What right do you have as consumer of –Hardware –Software EULA

EXPLORE Activity 6 p 77 6 Activity

Ethical issues Ten Commandments of Computer Ethics PLAGIARISM

EXPLORE Activity 7 p 78 7 Activity

CHECKLIST  I can Activity