Pertemuan 23 & 24 Security and Ethical Challenges

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Security and Ethical Challenges
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Pertemuan 11 & 12 The Internet and the New Information Technology Infrastructure Matakuliah: J0454 / Sistem Informasi Manajemen Tahun: 2006 Versi: 1.
Risks, Controls and Security Measures
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Pertemuan 25 & 26 Enterprise and Global Management of Information Technology Matakuliah: J0454 / Sistem Informasi Manajemen Tahun: 2006 Versi: 1 / 1.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
1 Tonga Institute of Higher Education IT 245 Management Information Systems Lecture 11 Security, and Ethical Challenges of E- Business.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
McGraw-Hill/Irwin ©2008,The McGraw-Hill Companies, All Rights Reserved Chapter 11 Security and Ethical Challenges.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
1 Pertemuan 11 Understanding Computers Privacy & Health Concerns Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
Cyber crime & Security Prepared by : Rughani Zarana.
Issues Information Systems and Management. Issues Privacy Ethics Health Computer Crime Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security and Ethics Privacy Employment Health Crime Working
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Chap1: Is there a Security Problem in Computing?.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Security and Ethics Safeguards and Codes of Conduct.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
UNIT V Security Management of Information Technology.
Security and Ethical Challenges
Securing Information Systems
Chapter 17 Risks, Security and Disaster Recovery
Security and Ethical Challenges
Chapter 13 Security and Ethical Challenges.
Presentation transcript:

Pertemuan 23 & 24 Security and Ethical Challenges Matakuliah : J0454 / Sistem Informasi Manajemen Tahun : 2006 Versi : 1 / 1 Pertemuan 23 & 24 Security and Ethical Challenges

Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa akan dapat memilih strategi penerapan dan pengembangan manajemen keamanan teknologi informasi  C4

Security, Ethical and Societal Challenges of IT Computer Crime Outline Materi Security, Ethical and Societal Challenges of IT Computer Crime Privacy Issues Security Management of IT Tools of Security Management Internetworked Security Defenses

Security and Ethics Business/IT Security, Ethics, and Society Privacy Employment Privacy Business/IT Security Ethics and Society Health Crime PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphic to identify the universe of issues that surrounding business/IT security, ethics and society. Individuality Working Conditions

Social Contract Theory Stakeholder Theory Security and Ethics Ethical Responsibility Business Ethics Stockholder Theory Social Contract Theory Stakeholder Theory Begin the discussion of business ethics. Compare and contrast the three alternative theories of ethical obligations to the various constituencies in the business world.

Ethical Responsibility Security and Ethics Ethical Responsibility Use the text graphic to explain some of the ethical issues in the corporate world.

Technology Ethics Security and Ethics Use the text graphic to describe the variables in the principles of technology ethics.

Ethical Guidelines Security and Ethics Use the text graphic to describe and explain the AITP standards of professional conduct.

Security Management Security is 6 to 8% of IT Budget in Developing Countries 63% Have or Plan to Have Position of Chief Privacy or Information Officer in the Next Two Years 40% Have a Chief Privacy Officer and Another 6% Intend One in the Next Two Years 39% Acknowledge that their Systems Have Been Compromised in the Past Year 24% Have Cyber Risk Insurance and 5% Intend to Acquire Such Coverage The detailed points of this slide examine some of the statistics presented in the text regarding firms' dealing with security management issues. Some of the statistics are quite dramatic. This discussion continues on the next slide…

Security Technology Used Security Management Security Technology Used Antivirus 96% Virtual Private Networks 86% Intrusion-Detection Systems 85% Content Filtering/Monitoring 77% PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphic to explain and contrast the security technologies in use today. Public-Key Infrastructure 45% Smart Cards 43% Biometrics 19%

PayPal, Inc. Cybercrime on the Internet Security Management PayPal, Inc. Cybercrime on the Internet Online Payment Processing Company Observed Questionable Accounts Being Opened Froze Accounts Used to Buy Expensive Goods For Purchasers in Russia Used Sniffer Software and Located Users Capturing PayPal Ids and Passwords More than $100,000 in Fraudulent Charges Crooks Arrested by FBI The PayPal Incorporated mini-case cites an example of cybercrime on the Internet. This on-line payment processing company used software to observe the opening of questionable accounts. These accounts were used to buy expensive goods being sent to Russia. The accounts were frozen and PayPal used Sniffer Software to identify the criminals. The individuals believed themselves to be safe since they were in Russia, however, the FBI used a ruse to draw them out and arrested them on more than $100,000 in fraudulent charges.

Unauthorized Use of Work Piracy of Intellectual Property Security Management Computer Crime Hacking Cyber Theft Unauthorized Use of Work Piracy of Intellectual Property Computer Viruses and Worms Other forms of computer crime are addressed including hacking, unauthorized use of systems and copyright as well as computer viruses and worms.

Examples of Common Hacking Security Management Examples of Common Hacking Use the text graphic to explain the common forms of system hacking.

Recourse Technologies: Insider Computer Crime Security Management Recourse Technologies: Insider Computer Crime Link Between Company Financial Difficulty and Insider Computer Crimes Use of “Honey Pots” Filled with Phony Data to Attract Hackers Software Catches Criminal Activity in Seconds Crime Exposed and Stopped The Recourse Technologies mini-case addresses a discovered link between financial difficulty or hard times in a company with the level of insider crime. They filled their computer with "Honey Pots" filled with phony data designed to attract hackers. Once a hacker reaches the data software reports the criminal activity in seconds. On many occasions the source of the criminal activity was an insider.

Security Management Internet Abuses in the Workplace Use the text graphic to define and discuss the nature of Internet abuses in the workplace.

Security Management Network Monitoring Software Most firms use network monitoring software now to exert some control over their system use. The screen shot is an example of such network monitoring software.

Copying Music CDs: Intellectual Property Controversy Security Management Copying Music CDs: Intellectual Property Controversy RIAA Crack Down on Music Piracy Web Sites Fighting Back 140 Million Writable Drives In Use Billions of Blank CDs Sold While Music CD Sales Are Going Down Pirates Reluctant to Go Away The issue of this slide is one of copying music CDs violating intellectual property rights. A discussion is made of the recording industry association crack down on music piracy. Many Websites are fighting back altering techniques to try to avoid being caught. The case states that there are 140 million writable drives in use with billions of blank CDs sold while music CD sales are decreasing.

Facts About Recent Computer Viruses and Worms Security Management Facts About Recent Computer Viruses and Worms Use the text graphic to explain the nature and consequences of the presence of worms and viruses. This discussion continues in a case on the next slide.

University of Chicago: The Nimda Worm Security Management University of Chicago: The Nimda Worm Nimda Worm Launch Sept. 18, 2001 Mass Mailing of Malicious Code Attacking MS-Windows Took Advantage of Back Doors Previously Left Behind In Four Hours the University of Chicago’s Web Servers were Scanned by 7,000 Unique IP Addresses Looking for Weaknesses Many Servers Had to Be Disconnected The University of Chicago mini-case describing their experience with Nimda Worm launch Sept. 18,2001. Within hours many servers were seriously impacted and had to be disconnected.

Computer Libel and Censorship Spamming Flaming Privacy Issues Right to Privacy Computer Profiling Computer Matching Privacy Laws Computer Libel and Censorship Spamming Flaming Right to privacy issues should be discussed in view of system usage for profiling, matching and other legitimate uses as well as for negative applications that create enormous nuisance problems.

Employment Challenges Working Conditions Individuality Issues Privacy Issues Other Challenges Employment Challenges Working Conditions Individuality Issues Health Issues Other challenges to privacy are discussed in the area of employment, individuality, and health issues.

Privacy Issues Ergonomics Use the text graphic to explain ergonomic issues as they impact the user/operator. Cite examples of each where possible. This discussion continues on the next slide...

Cumulative Trauma Disorders (CTDs) Carpal Tunnel Syndrome Privacy Issues Ergonomics Job Stress Cumulative Trauma Disorders (CTDs) Carpal Tunnel Syndrome Human Factors Engineering Societal Solutions Continue the discussion of ergonomic issues describing each of the physical ailments presented in the text and how society is attempting to address solutions to the problem.

Security Management of Information Technology Tools of Security Management Use the text graphic to outline the tools of security management that make up the balance of this chapter.

Security Management of Information Technology Providence Health and Cervalis: Security Management Issues Need for Security Management Caused by Increased Use of Links Between Business Units Greater Openness Means Greater Vulnerabilities Better Use of Identifying, Authenticating Users and Controlling Access to Data Theft Should Be Made as Difficult as Possible The Providence Health and Cervalis mini-case addresses security management issues. The emphasis on this case points out that the demand for increased links between business units forces more vulnerabilities to security risk. The conclusion was that access to data theft should be made as difficulty as possible.

Security Management of Information Technology Internetworked Security Defenses Encryption Public Key Private Key Graphically… Begin the discussion of data encryption using public key/private key techniques. Define the terms. Continue the discussion using the graphic on the next slide…

Security Management of Information Technology Encryption Use the text graphic to conclude the discussion of public key/private key encryption for data security management purposes.

Security Management of Information Technology Firewalls External Firewall Blocks Outsiders 1 2 Internal Firewall Blocks Restricted Materials 3 4 5 Intranet Server Host System Use of Passwords and Browser Security 3 Performs Authentication and Encryption Firewall 4 Router Router 1 Careful Network Interface Design 5 PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphic to show how appropriately placed and configured firewalls can protect a system from Internet-based intrusion. 2 Internet Firewall 4 Intranet Server

Security Management of Information Technology MTV Networks: Denial of Service Defenses MTV.com Website Targeted for Distributed Denial of Service (DDOS) Attacks During Fall Peak Periods Some People Try to Crash MTV Sites Parent Viacom Installed Software to Filter out DDOS Attacks Website Downtime Reduced The MTV Network mini-case describes their solution to Denial of Service attacks made on their systems particularly during peak fall periods. MTV parent Viacom installed software to filter out such attacks and Website downtime was significantly reduced.

Security Management of Information Technology Defending Against Denial of Service Attacks Use the text graphic to discuss alternatives for defending against Denial of Service attacks.

Security Management of Information Technology Sonalysts, Inc.: Corporate e-Mail Monitoring e-Sniff Monitoring Device Searches e-Mail by Key Word or Records of Web Sites Visited 82% of Businesses Monitor Web Use Close to 100% of Workers Register Some Improper Use The Sonalysts, Inc. mini-case gives an example of corporate e-mail monitoring. Their e-Sniff monitoring device examined e-mail by key word and also made records of Websites visited. The case states that 82% of businesses monitor Web use. The case reports that close to 100% of workers registered some improper use. It also presented a situation where a particular use appeared to be improper turned out to be quite legitimate. The summary was don't jump to conclusions.

Security Management of Information Technology TrueSecure and 724 Inc.: Limitations of Antivirus Software Much Software Was Unable to Stop Nimda Worm Software Alone is Often Not Enough to Clean System Until Better Software is Developed, A Complete System Disconnect and Purge May Be the Only Solution The TrueSecure and 724 Inc. mini-case discussed limitations of anti-virus software. It states that much software was unable to stop the Nimda Worm and that software alone is not enough to clean the system. In many cases a complete system disconnect and purge may be the only solution.

Security Management of Information Technology Example Security Suite Interface The screen shot is an example of Security Suite Interface-McAfee.com. Functions of the suite can be identified from the screen shot.

Security Management of Information Technology Other Security Measures Security Codes Multilevel Password System Smart Cards Backup Files Child, Parent, Grandparent Files System Security Monitors Biometric Security Other security measures are described including the use of security codes, passwords, smartcards, and biometic applications. Multiple backup redundancy is encouraged. The use of system security monitors provide another feedback in case of violation-and example is on the next slide.

Security Management of Information Technology Example Security Monitor The screen shot is an example of a security monitor system used to monitor system usage.

Security Management of Information Technology Evaluation of Biometric Security Use the text graphic to lead a discussion evaluating the effectiveness of biometric techniques.

Security Management of Information Technology Computer Failure Controls Fault Tolerant Systems Fail-Over Fail-Safe Fail-Soft Disaster Recovery Discuss and define the alternative types of computer failure controls presented in the text. Stress the importance of a disaster recovery plan in case of crisis.

Security Management of Information Technology Methods of Fault Tolerance Use the text graphic to describe the methods of fault tolerance. Emphasis the threats to each specific layer and the method used to protect the environment.

Security Management of Information Technology Visa International: Fault Tolerant Systems Only 100% Uptime is Acceptable Only 98 Minutes of Downtime in 12 Years 1 Billion Transactions Worth $2 Trillion in Transactions a Year 4 Global Processing Centers Multiple Layers of Redundancy and Backup Software Testing and Art Form The Visa International mini-case describes their fault tolerance systems where downtime is totally unacceptable. Visa has experienced only 98 minutes of downtime in 12 years. They process billions of transactions representing trillions of dollars worldwide and have implemented massive backup and redundant systems because their data is so vital. They have developed software testing to an art form.

Systems Controls and Audits Information System Controls Garbage-In, Garbage-Out (GIGO) Auditing IT Security Audit Trails Control Logs Introduce the concept of systems controls and audits. Emphasis should be placed on auditing IT security, development of audit trails, and maintenance of control logs for longitudinal consistency.

Systems Controls and Audits Processing Controls Software Controls Hardware Controls Firewalls Checkpoints Input Controls Output Controls Security Codes Encryption Data Entry Screens Error Signals Control Totals Security Codes Encryption Control Totals Control Listings End User Feedback PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphics to demonstrate where control systems exist and how they relate to each other. Storage Controls Security Codes Encryption Backup Files Library Procedures Database Administration

Ethical and Societal Dimensions Ethical Responsibility in Business Summary Ethical and Societal Dimensions Ethical Responsibility in Business Security Management

Sumber Materi PPT O’Brien, James A. (2005). Introduction to Information Systems (12th Edition). McGraw – Hill. Bab 11. Official PPT.