Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
Advertisements

Ethics, Privacy and Information Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 13 Security and Ethical Challenges.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Security, Privacy, and Ethics Online Computer Crimes.
Security and Ethical Challenges
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Security and Ethical Challenges
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Chapter 13 Security and Ethical Challenges
McGraw-Hill/Irwin ©2008,The McGraw-Hill Companies, All Rights Reserved Chapter 11 Security and Ethical Challenges.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
PRELIM TOPICS. IS operations management is concerned with the use of hardware, software, network, and personnel resources in data centers Operational.
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
Chapter 11 Security and Privacy: Computers and the Internet.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Security and Ethical Challenges.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1 Ethical Challenges in Management. 2 Ethical Responsibility  The use of IT presents major security challenges, poses serious ethical questions, and.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Security and Ethics Privacy Employment Health Crime Working
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin Copyright © 2008 The McGraw-Hill Companies, Inc.
Security and Ethical Challenges Chapter 11 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Security and Ethical Challenges Chapter 13.
Security And EthicalChallenges of IT Oktalia Juwita, S.Kom., M.MT. Dasar-dasar Sistem Informasi – IKU1102.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Privacy, Security and Ethics
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Security and Ethical Challenges Ethical issues in the use of Information Technology Security Management Chapter 11 McGraw-Hill/Irwin Copyright © 2007 by.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
UNIT V Security Management of Information Technology.
Security and Ethical Challenges
Security and Ethical Challenges
SECURITY & ETHICAL CHALLENGES
Subject Name: MANAGEMENT INFORMATION SYSTEM Subject Code:10IS72
Securing Information Systems
Security and Ethical Challenges
Security and Ethical Challenges
Security and Ethical Challenges
Chapter 13 Security and Ethical Challenges.
– Communication Technology in a Changing World
Communication Technology in a Changing World
Presentation transcript:

Security and Ethical Challenges Chapter 13 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.

13-2 Learning Objectives Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology.

13-3 Learning Objectives Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology.

13-4 RWC 1: Ethics, IT and Compliance IT Challenges –Technical functionality –Business requirements –Ethical standards –Correct behaviors 2 views of Corporate Ethics –Set of legal and minimum standards –Set of values integral to doing business Most companies have ethics and compliance programs Few can truly execute an ethical agenda

13-5 IT Security, Ethics, and Society

13-6 Categories of Ethical Business Issues

13-7 Corporate Social Responsibility Theories Stockholder Theory –Managers are agents of the stockholders –Only responsible to increase profits without violating the law or fraud Social Contract Theory –Responsible to all of society Stakeholder Theory –Responsible to anyone affected by company

13-8 Principles of Technology Ethics Proportionality –Good must outweigh the harm or risk Informed Consent –Those affected should understand and accept risks Justice –Benefits and burdens distributed fairly Minimized Risk –Avoid all unnecessary risk

13-9 AITP Standards of Professional Conduct

13-10 Security from Cyber Crime

13-11 Hacking Obsessive use of computers Unauthorized access and use of networked computer systems Electronic Breaking and Entering –Accessing without stealing nor damaging Cracker (black hat or darkside hacker) –Maintains knowledge of vulnerabilities for private advantage Common Hacking Tactics –Figure 13.7

13-12 Cyber Theft Most involve theft of money “Inside jobs” Unauthorized activity Attacks through the Internet Most companies don’t report

13-13 Cyberterrorism Use IT to attack electronic infrastructure, exchange information or make threats Terror related –More political motivation than criminal Examples –Attempt to disrupt life support at Antarctic research station –Release of untreated sewage in Australia –Shut down of government network and banks in Estonia –Non-deliberate shut down of systems at nuclear reactor

13-14 Unauthorized Use at Work Time and resource theft –Doing private consulting –Doing personal finances –Playing video games –Unauthorized use of the Internet or networks –Recreational surfing –Racist or offensive –Pornographic sites Sniffers –Monitor network traffic or capacity –Find evidence of improper use

13-15 Internet Abuses in the Workplace General abuses Unauthorized usage and access Copyright infringement/plagiarism Newsgroup postings Transmission of confidential data Pornography Hacking Non-work-related download/upload Leisure use of the Internet Use of external ISPs Moonlighting

13-16 Software Piracy Unauthorized copying of computer programs Licensing –Purchase – payment for fair use –Site license – allows a certain number of copies –Shareware – allows copies –Public Domain – not copyrighted Software industry losses –⅓ to ½ of revenues –Millions of copies in educational market –90% pirated software in China Sales negligible

13-17 Theft of Intellectual Property Intellectual Property –Copyrighted material –Music, videos, images, articles, books, software Copyright Infringement is Illegal –Easy to trade pirated intellectual property Publishers Offer Inexpensive Online Music –Illegal downloading is declining

13-18 Viruses and Worms Viruses must be inserted into another program Worms can run unaided Spread annoying or destructive routines Commonly transmitted through –Internet and online services – and file attachments –Disks from contaminated computers –Shareware Top 5 Virus Families of all time –Figure 13.9 Cost of Top 5 Virus Families –Figure 13.9

13-19 Adware and Spyware Adware –Useful software allows ads without consent Spyware –Type of Adware –Can steal private information –Add advertising links to Web pages –Redirect affiliate payments –Change a users home page and search settings –Make modem call premium-rate numbers –Leave security holes that let Trojans in –Degrade system performance Removal often not completely successful

13-20 Privacy Issues IT capability can create negative affect on privacy –Personal information is collected –Confidential information stolen or misused Opt-In –Explicitly consent to allow data to be compiled –Default in Europe Opt-Out –Must request data is not collected –Default in the U.S.

13-21 Privacy Issues Violation of Privacy –Accessing conversations and records –Collecting and sharing visits to websites Computer Monitoring –Mobile and paging services can track people Computer Matching –Market additional business services Unauthorized Access of Personal Files –Build profiles of contact and credit information

13-22 Protecting Your Privacy on the Internet Encrypt Send anonymous postings Ask your ISP not to sell your information Don’t reveal personal data and interests

13-23 Privacy Laws Electronic Communications Privacy Act and Computer Fraud and Abuse Act –Prohibit intercepting data communications messages, stealing or destroying data, or trespassing in federal-related computer systems U.S. Computer Matching and Privacy Act –Regulates the matching of data held in federal agency files to verify eligibility for federal programs

13-24 Privacy Laws Sarbanes-Oxley –Positive – strengthens accounting controls –Negative – overly complex and regulatory Health Insurance Portability and Accountability Act (HIPAA) –Safeguards for health-related information Gramm-Leach-Bliley USA Patriot Act California Security Breach Law Securities and Exchange Commission Rule 17a-4

13-25 Computer Libel and Censorship The opposite side of the privacy debate… –Freedom of information, speech, and press Biggest battlegrounds –Bulletin boards – boxes –Online files of Internet and public networks Weapons used in this battle –Spamming –Flame mail –Libel laws –Censorship

13-26 Cyberlaw Regulate activities electronic communications –Wide variety of legal and political issues –Intellectual property, privacy, freedom of expression, and jurisdiction Body of law emerged 1996 Controversy –Some feel the Internet should not be regulated Encryption and cryptography make regulation difficult –Websites work around censorship –Applicability of legal principles Better laws to come

13-27 Other Challenges Employment –Job opportunities changing Computer Monitoring –Effective but controversial Working Conditions –Eliminated monotonous or obnoxious tasks –Eliminated some skilled jobs Individuality –Dehumanizes and depersonalizes

13-28 Health Issues Cumulative Trauma Disorders (CTDs) –Disorders caused by fast-paced repetitive keystroke jobs Carpal Tunnel Syndrome –Painful, crippling ailment of the hand and wrist –Typically requires surgery to cure Ergonomics –Designing healthy work environments

13-29 Ergonomics Factors 13-29

13-30 Societal Solutions Use IT to solve human and social problems –Medical diagnosis –Computer-assisted instruction (CAI) –Computer based training (CBT) –Governmental program planning –Environmental quality control –Law enforcement –Job placement Detrimental effects –Actions without ethical responsibility

13-31 Security Management of IT Security is number 1 problem with the Internet –Internet was developed for inter-operability, not impenetrability –Users responsible for security, quality, and performance –Resources must be protected Goal of security management –Accuracy, integrity, and safety of all information system processes and resources

13-32 RWC 2: End-Point Security Security a complex, moving target Delicate balance between access and security Two approaches –Secure devices –Secure data wherever it lives Encryption HIPAA regulations Classify data, set policies Smartphones ongoing challenges –Balance personal and business use BlackBerries have management infrastructure Phones not secured yet

13-33 Public/Private Key Encryption

13-34 Internet and Intranet Firewalls

13-35 Denial of Service Attacks Depend on three layers of networked computer systems –The victim’s website –The victim’s Internet service provider –Zombie or slave computers commandeered by cybercriminals Defense –At Zombie Machines Set and enforce security policies Scan for vulnerabilities –At the ISP Monitor and block traffic spikes –At the Victim’s Website Create backup servers and network connections

13-36 Internetworked Security Defenses Monitoring Virus Defenses Security Codes Backup Files Security Monitors Biometrics Computer Failure Controls Disaster recovery plan

13-37 Information System Controls Methods and devices to ensure accuracy, validity, and propriety IT Security Audits –Performed by internal or external auditors –Review and evaluation of security measures and management policies –Goal: Ensure proper and adequate measures and policies are in place

13-38 Protecting Yourself from Cybercrime

13-39 RWC 3: Challenges of Working in IT IT presents ethical challenges and dilemmas. To hold workers accountable –Must set ethical policies and guidelines –Make sure that employees know and understand them

13-40 Leakage of sensitive customer data or proprietary information is a new priority Focus on keeping sensitive information Deploy outbound content management tools – messages, –Alternative communication mechanisms –Including instant messaging –Blogs –FTP transfers –Web mail –Message boards RWC 4: Worry About What Goes Out