Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.

Slides:



Advertisements
Similar presentations
Protecting People and Information
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Topic 4: Protecting People & Information Ethics, Privacy & Security MGMD 233-MIS AMN 2012.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
MANAGING IT SYSTEMS Top Things to Keep in Mind to Protect Yourself and Others.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
BUSINESS B1 Information Security.
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Information Security MGMT Summer 2012 Night #4, Lecture Part 2.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
BUSINESS DRIVEN TECHNOLOGY
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security

Chapter SECTION 4.1 ETHICS

Chapter 4 ETHICS What is ethics? Legal versus ethical 4-7

Chapter 4 TECHNOLOGY AND ETHICS Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software 4-7

Chapter 4 PEOPLE AND ETHICS Individuals form the only ethical component of IT  Individuals copy, use, and distribute software  Search organizational databases for sensitive and personal information  Individuals create and spread viruses  Individuals hack into computer systems to steal information  Employees destroy and steal information 4-10

Chapter 4 PRIVACY, CONFIDENTIALITY, & TRUST Privacy Confidentiality 4-8

Chapter 4 INFORMATION MANAGEMENT POLICIES Ethical computer use policy Information privacy policy Acceptable use policy privacy policy Internet use policy Anti-spam policy 4-13

Chapter 4 INFORMATION PRIVACY POLICY 1. Notice and disclosure 2. Choice and consent 3. Information security 4. Information quality and access 4-17

Chapter 4 PRIVACY POLICY 4-21

Chapter 4 INTERNET USE POLICY Describes available Internet services Defines the purpose and restriction of Internet access Describes user responsibilities States the ramification for violations 4-23

Chapter 4 WORKPLACE MONITORING Workplace monitoring To monitor or not to monitor, that is the question 4-25

Chapter 4 MONITORING TECHNOLOGIES Key logger or key trapper software Hardware key logger Cookie Adware 4-26

Chapter 4 MONITORING TECHNOLOGIES Spyware Web log 4-26

Chapter SECTION 4.2 INFORMATION SECURITY

Chapter 4 PROTECTING INTELLECTUAL ASSETS Information security 4-32

Chapter 4 THREATS AND SOURCES People Technologies Techniques eBusiness Downtime

Chapter 4 INSIDERS Organizations must enable employees, customers, and partners to access information electronically 33% of security incidents originate within the organization 4-35

Chapter 4 HACKERS Hacker Cracker White-hat hacker Black-hat hacker Hactivist Script kiddies or script bunnies Cyberterrorist 4-52

Chapter 4 HUMAN FAILURES Social engineering Identity theft Phishing 4-42

Chapter 4 MALICIOUS SOFTWARE (MALWARE) Virus Worm Polymorphic virus and worm Trojan-horse virus 4-53

Chapter 4 MALICIOUS SOFTWARE (MALWARE) Backdoor program Spyware Sniffer 4-53

Chapter 4 DENIAL OF SERVICE Denial-of-service attack (DoS) Distributed denial-of-service attack (DDoS)

Chapter 4 EBUSINESS THREATS Elevation of privilege Hoaxes Spoofing Packet tampering 4-54

Chapter 4 DOWNTIME How Much Will Downtime Cost Your Business? 4-31

Chapter 4 TECHNOLOGY DEFENSES Authentication and authorization Prevention and resistance Detection and response 4-39

Chapter 4 AUTHENTICATION AND AUTHORIZATION Authentication Authorization 4-40

Chapter 4 AUTHENTICATION Something the user knows Something the user has  Tokens and Smart cards Something the user does Something the user is  Biometrics

Chapter 4 AUTHORIZATION Resource Type(s) of Access Person or Group Least Access Required

Chapter 4 PREVENTION AND RESISTANCE Content filtering Encryption Firewalls 4-45

Chapter 4 CONTENT FILTERING

Chapter 4 ENCRYPTION  Encryption  Public key encryption (PKE) 4-47

Chapter 4 PUBLIC KEY ENCRYPTION 4-48

Chapter 4 FIREWALLS 4-49

Chapter 4 DETECTION AND RESPONSE Anti-malware tools Backups 4-51

Chapter 4 ANTI-MALWARE TOOLS Antivirus software Anti-spyware software 4-51

Chapter 4 BACKUPS Data Customized software Type RAID Removable media Streaming Location Offline Offsite Secure 4-51

Chapter 4