BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

BUSINESS B2 Ethics.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Security+ Guide to Network Security Fundamentals
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Business Plug-In B7 Ethics.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Business Plug-In B7 Ethics.
INTERNET and CODE OF CONDUCT
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Protecting People and Information: Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
00870B2F.0/Internet%20Safety.jpg.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
IT in Business Issues in Information Technology Lecture – 13.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Information Systems Unit 3.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
BUSINESS DRIVEN TECHNOLOGY
Add video notes to lecture
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 13 Security and Ethical Challenges.
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1

Ethics and Information Security Learning objectives Ref. Chapter 4 (Text) Explain the ethical issues surrounding information technology. Identify the differences between an ‘ethical computer use policy’ and an ‘acceptable use policy. Describe the relationship between an ‘ privacy policy’ and an ‘Internet use policy’. Describe the relationship between information security policies and an information security plan. Summarise the five steps to creating an information security plan. Provide an example of each of the three primary security areas: a.authentication and authorization, b.prevention and resistance, c.detection and response. Describe the relationships and differences between hackers and viruses.

Ethics and Information Security An organisation’s data and information are a key resource. To lose the data and information or have them used inappropriately or illegally can be disastrous for an organisation. A business manager must understand the ethical and security issues surrounding data and information.

Ethics and Information Security Ethics – the principles and standards that guide our behaviour toward other people. Ethics sit between appropriate behaviour and illegal behaviour.

Ethics and Information Security Acting ethically and legally are not always the same Hopefully you will be making decisions here!

Ethics and Information Security 1.Is it OK to use work time and equipment for private and Internet usage? 2.Should your boss be able to monitor your personal Internet usage on work computers? 3.Should your boss be able to read private s you have sent from or received on work computers? 4.You give up a job to go into business for yourself. Before you leave you print a list of your customers’ contact details. Is it OK to individually contact your previous customers to inform them of your new business? Consider the questions below from an ethical and legal viewpoint.

Ethics and Information Security Ethical issues concerning IT and IS Intellectual property [rights that protect creative and intellectual effort]Intellectual property Copyright [copying, using material illegally] e.g. iiNetCopyright iiNet Fair use doctrine [where it is legal to use copyrighted material]Fair use doctrine Pirated software [unauthorized use of copyrighted software] Counterfeit products [e.g. software that is manufactured to look like the real thing and sold as such]Counterfeit products

Ethics and Information Security Privacy is a major ethical issue, and a right to privacy is the law PrivacyPrivacy : the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality : the assurance that messages and information are available only to those who are authorized to view them

Ethics and Information Security Developing Information Management Policies Organisations should strive to build a corporate culture based on ethical principles that employees can understand and implement e-Policies typically include: Ethical computer use policy Information privacy policy Acceptable use policy privacy policy Internet use policy Anti-spam policy e-policies are policies and procedures that address the ethical use of computers and internet usage in the business environment

Ethics and Information Security Ethical computer use policy : contains general principles to guide computer user behaviour [p. 170] Information privacy policy : contains general principles regarding information privacy [p. 171] The unethical use of information typically occurs “unintentionally” when it is used for new purposes Acceptable use policyAcceptable use policy (AUP) : a policy that a user must agree to follow in order to be provided access to a network or to the Internet [p ] 1.Will not violate any laws 2.Will not break the security 3.Will not post commercial messages 4.Will not send spam 5.Will not send mail bombs

Ethics and Information Security Organisations can mitigate the risks of and instant messaging communication tools by implementing and adhering to an privacy policy privacy policy : details the extent to which messages may be read by others [p ]

Ethics and Information Security Internet use policy : contains general principles to guide the proper use of the Internet within an organization [p ] The policy 1.Describes available Internet services 2.Defines the purpose and restriction of Internet access 3.Complements the ethical computer use policy 4.Describes user responsibilities 5.States the ramification for violations Spam : unsolicited Anti-spam policy : simply states that users will not send unsolicited s (or spam)

Ethics and Information Security Workplace monitoring Workplace monitoring is a concern for many employees Organisations can be held financially responsible for their employees’ actions The dilemma surrounding employee monitoring in the workplace is that an organization is placing itself at risk if it fails to monitor its employees; however, some people feel that monitoring employees is unethical Information Technology Monitoring Monitoring : tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed

Ethics and Information Security Information security : the protection of information from accidental or intentional misuse by persons inside or outside an organization Organizations must enable employees, customers, and partners to access information electronically The biggest issue surrounding information security is not a technical issue, but a people issue 33% of security incidents originate within the organization Insiders : legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

Ethics and Information Security Lines of Defence - [1] People The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan. How do you create an information security plan? 1.Develop the information security policies 2.Communicate the information security policies 3.Identify critical information assets and risks 4.Test and reevaluate risks 5.Obtain stakeholder support [see Tables 4.15, 4.16 Text]

Ethics and Information Security Lines of Defence - [2] Technology The second line of defense involves technology, in particular: 1.Authentication and authorization [p ] 2.Prevention and resistance [p ] 3.Detection and response [p ]

Ethics and Information Security Authentication : a method for confirming users’ identities The most secure type of authentication involves: Something the user knows [e.g. user name & password Something the user has [e.g. a smart card or token] Something that is part of the user [e.g. voice signature, fingerprint] Authorisation : the process of giving someone permission to do or have something e.g. file access, hours of access, amount of storage space

Ethics and Information Security Prevention and resistance Technologies available to help prevent and build resistance to attacks include: 1.Content filtering [e.g. software to filter s for sensitive information, to detect files containing viruses, etc.] 2.Encryption [`scrambling’ of information prior to transmission, `unscrambling’ on receipt of information] 3.Firewalls [hardware/software that `guards’ a private network]

Ethics and Information Security Detection and Response If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage. Antivirus software is the most common type of detection and response technology. Virus : software written with malicious intent to cause annoyance or damage [see table 4.19, Text for a description of virus types]. Hackers : people very knowledgeable about computers who use their knowledge to invade other people’s computers [again, see table 4.19, text for a description of hacker types].