Chapter 3 Ethics, Privacy & Security

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Ethics, Privacy and Information Security
Computer Fraud Chapter 5.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Security+ Guide to Network Security Fundamentals
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 4 Information Security
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
CHAPTER 4 Information Security. Announcements Friday Class Quiz 1 Review Monday Class Quiz 1 – Access Basics Questions/Comments.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
3 Ethics and Privacy.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Securing Information Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Information Systems: Ethics, Privacy and Information Security
CHAPTER 4 Information Security
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Defining Security Issues
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
7 Information Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Security and Ethics Privacy Employment Health Crime Working
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
7 Information Security.
Module 11: Designing Security for Network Perimeters.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
1 PROTECTING ORGANIZATION VALUABLE ASSET CASE STUDY: PT XYZ SYSTEM INFORMATION TECHNOLOGY Group Member :  Adhitya Trisnanda  Dini Dieny  Firmando Satryo.
Security and Ethics Safeguards and Codes of Conduct.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
CHAPTER 7 Information Security. 1.Introduction to Information Security 2.Unintentional Threats to Information Systems 3.Deliberate Threats to Information.
UNIT V Security Management of Information Technology.
Securing Information Systems
Securing Information Systems
TECHNOLOGY GUIDE THREE
CHAPTER 4 Information Security.
Securing Information Systems
Chapter Nine (Part 1).
Unit 7 – Organisational Systems Security
Understanding Security Layers
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity Threat Assessment
Cloud Computing for Wireless Networks
Presentation transcript:

Chapter 3 Ethics, Privacy & Security Describe the major ethical issues related to information technology and identify situations in which they occur. Identify the many threats to information security Understand the various defense mechanisms used to protect information systems. Explain IT auditing and planning for disaster recovery.

Case Study TJX SWOT

Ethical Issues Fundamental tenets of ethics include responsibility, accountability, and liability unethical is not necessarily illegal. Should organizations monitor employees’ Web surfing and e-mail? Should organizations sell customer information to other companies?

Ethical Issues Should organizations audit employees’ computers for unauthorized software or illegally downloaded music or video files? Privacy issues Accuracy issues Property issues Accessibility issues

Protecting Privacy The right of privacy is not absolute. Privacy must be balanced against the needs of society The public’s right to know supersedes the individual’s right of privacy International Aspects of Privacy

IT’s About Business Security Outside the Perimeter: LexisNexis

Threats to Information Security Today’s interconnected, interdependent, wirelessly networked business environment Governmental legislation Smaller, faster, cheaper computers and storage devices Decreasing skills necessary to be a computer hacker International organized crime taking over cybercrime Downstream liability Increased employee use of unmanaged devices Lack of management support

Threats to Information Systems Unintentional acts Natural disasters Technical failures Management failures Deliberate acts

IT’s About Business The “Hack, Pump, and Dump” Scheme

Protecting Information Resources Risk management Risk analysis Risk mitigation Risk acceptance Risk limitation Risk transference

Protecting Information Resources Controls The Difficulties in Protecting Information Resources Physical Controls Access Controls

Protecting Information Resources Authentication Something the User Is Something the User Has Something the User Does Something the User Knows

IT’s About Business Providing Least Privilege at UPS

Protecting Information Resources Communications (network) controls Firewalls. Anti-malware systems.

Protecting Information Resources Whitelisting and Blacklisting Intrusion Detection Systems Encryption. Virtual Private Networking Secure Socket Layer

IT’s About Business Using Encryption to Reduce E-Mail Security Risks at Harvard Pilgrim

Ethics, Privacy, and Information Security

Ethics, Privacy, and Information Security Vulnerability Management Systems Employee Monitoring Systems Application Controls

Business Continuity Planning, Backup, and Recovery hot site warm site cold site off-site data storage

IT’s About Business The Baltimore Ravens Plan for Business Continuity

Information Systems Auditing Types of Auditors and Audits How Is Auditing Executed?