Chapter 8: Protecting People and Information Threats and Safeguards Management Information Systems for the Information Age.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 8 Protecting People and Information Threats and Safeguards
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Protecting People and Information Threats and Safeguards
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer Ethics, Privacy and Security. Computer Ethics Computers are involved to some extent in almost every aspect of our lives They often perform life-critical.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Digital Citizenship Created By: Kelli Stinson June 2011.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Computer Security By Duncan Hall.
Privacy, Security and Ethics
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 13 Security and Ethical Challenges.
HOW DO I KEEP MY COMPUTER SAFE?
PROTECTING PEOPLE & INFORMATION
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Chapter 8: Protecting People and Information Threats and Safeguards Management Information Systems for the Information Age

Lecture Map Ethics Risk Mgmt Security Capital Asset Privacy Information This chapter focuses on Information as it relates to its use, ownership, role, and protection

Chapter 8: Protecting People & InformationSlide 3 Responsibility for Information To handle information responsibly, you must understand: The importance of ethics in the ownership and use of information. The importance to people of personal privacy and the ways in which it can be compromised. The value of information to an organization. Threats to information and how to protect against them (security). The need to plan for the worst-case scenario (disaster recovery)

Chapter 8: Protecting People & InformationSlide 4 Questionable Computer Use Employees search organizational databanks (i.e., DMV) for information on friends and associates People copy, use, and distribute software as if the only costs are the medium it is stored on Hackers break into computer systems and steal passwords, credit card numbers, and personal account information Spouses can track each other’s Web activities and read each other’s messages and other private documents Organizations base important decisions on information they’ve mined from the Web

Ethics Risk Mgmt Security Capital Asset Privacy Information

Chapter 8: Protecting People & InformationSlide 6 Ethics: Introduction Ethics Defined: Ethics are the principals and standards that guide our behavior toward other people Ethical people have integrity and are trustworthy The Issue: How you deal with information (collect, store, and distribute) depends on your sense of ethics Ethical dilemmas arise from a clash between competing goals, responsibilities, and loyalties What is legal is not always ethical, and vice- versa

Chapter 8: Protecting People & InformationSlide 7 Ethics: Considerations Severity of Consequences Time to Consequences Society’s Perception or Opinion Probability or Likelihood of Effect Relatedness, Empathy, Identification Reach of Result in terms of Scope

Chapter 8: Protecting People & InformationSlide 8 Ethics: Guidelines for Technology Ownership Who owns or has the rights to creative works, information, and other intellectual property? Responsibility Who is accountable for the accuracy and completeness of information? Personal Privacy Who owns personal information? Collector/ee? Access Who can use, view, store, and process what information?

Chapter 8: Protecting People & InformationSlide 9 Ethics: ACM’s Computer Ethics Don’t use a computer to harm other people Don’t interfere with other people’s computer work Don’t snoop around in other people’s computer files Don’t use a computer to steal Don’t use a computer to pretend to be someone other than who you are Don’t copy or use software for which you’ve not paid Don’t use other’s resources without permission Don’t appropriate other people’s intellectual output Always think about the social consequences of IT Always use a computer in ways that ensure respect for your fellow humans

Chapter 8: Protecting People & InformationSlide 10 Ethics: Intellectual Property Intellectual property is intangible, creative work published in physical form, such as music, books, paintings, and software Copyright is the legal protection afforded to intellectual property; patent law is used more for protecting inventions/processes Fair Use Doctrine specifies how you may use (or how much you may use) copyrighted material in the creation of new works or for teaching purposes Pirated software is the unauthorized use, duplication, distribution, and/or sale of software Counterfeit software is re-manufactured software

Privacy Ethics Risk Mgmt Security Capital Asset Privacy Information

Chapter 8: Protecting People & InformationSlide 12 Privacy: Introduction Privacy Defined: The right to be left alone when you want to be; to have control over your personal possessions; and not to be observed without your consent The Issue: There are many ways to invade a person’s privacy using technology!

Chapter 8: Protecting People & InformationSlide 13 Privacy: And Other Individuals Software Surveillance & Monitoring Key Loggers and Key Trappers (Spector Pro) Record keystrokes, mouse clicks, Websites visited, applications run, and passwords entered Webcam control/automation (i.e., babysitters) Combating Software Surveillance

Chapter 8: Protecting People & InformationSlide 14 Privacy: And Employees Corporate monitoring of Companies can be sued for what their employees send to each other and to people outside of the company Cyberslacking Companies want to avoid wasting resources Employer’s Rights Legal right to monitor the use of their resources and that includes the time they’re paying you for No expectation of privacy when using company resources

Chapter 8: Protecting People & InformationSlide 15 Privacy: And Consumers Webmetrics (DoubleClick.net) Cookies Small files placed on your computer that contain information on where you’ve been and what you’ve done; for personalization/customization Spyware Adware (ad-supported software) Can track your online movements, mine your computer for data, and commandeer CPU power A firewall can stop your computer from sending data outside of your network, as well as protecting your network from outside attacks

Chapter 8: Protecting People & InformationSlide 16 Privacy: And the Law Canadian Privacy Law The Privacy Act mandates how information may be collected and disseminated by government Personal Information Protection and Electronic Documents Act (PIPEDA) in effect since 2001 Applies only to personal information collected and disclosed while conducting commercial activities, but exempts names, titles, business addresses, and telephone numbers

Chapter 8: Protecting People & InformationSlide 17 Privacy: Law Enforcement Law enforcement Royal Canadian Mounted Police (RCMP) Canadian Security Intelligence Service (CSIS) Criminal Intelligence Service Canada (CISC) Correctional Service of Canada (CSC) National Crime Prevention Strategy Other Federal agencies Canada Customs and Revenue Agency (CCRA) Statistics Canada Human Resources Development Canada Office of the Privacy Commissioner of Canada

Information Ethics Risk Mgmt Security Capital Asset Privacy Information

Chapter 8: Protecting People & InformationSlide 19 Information: As An Asset As Raw Material: Used in the actual creation or construction of the product or service you market Consider GPS systems, professional and consulting services, and Internet Web access As Capital: Used to produce the product or service you market; consider an eCRM and data warehouse You typically incur a cost in acquiring information (capital), and you expect a return on that investment

Security Ethics Risk Mgmt Security Capital Asset Privacy Information

Chapter 8: Protecting People & InformationSlide 21 Security: Introduction Security Issues: Internal Employee Fraud Industrial Espionage Funds and Data Embezzlement Open Collaborative Systems with Partners Grid Computing and Theft of Resource Power Internet Dot-Cons: Internet Auction Fraud Web Hosting, Design, and ISP Scams Multi-Level Marketing/Pyramid Scams Get-Rich-Quick and Work-at-Home Scams Adult-Oriented Sites and Credit Card Scams

Chapter 8: Protecting People & InformationSlide 22 Security: Outside Threats Hackers, Hacktivists, and Crackers Gaining unauthorized access to computers and information systems through network computing Viruses, Worms, and Denial-of-Service Viruses cannot hurt your hardware or any data on your computer it wasn’t designed to attack Monitoring Network Activity 85% of large companies and governmental agencies were broken into during 2001

Chapter 8: Protecting People & InformationSlide 23 Security: Precautions Backups Incremental versus Full On-site and Off-Site AntiVirus Software Norton and McAfee are the market leaders Firewalls Hardware (routers) and software (ZoneAlarm) Access Authorization Biometrics (i.e., fingerprints, facial recognition) Encryption

Risk Management & Assessment Ethics Risk Mgmt Security Capital Asset Privacy Information

Chapter 8: Protecting People & InformationSlide 25 Risk Management and Assessment Risk Management Identification of risks or threats Implementation of security measures Monitoring of those measures for effectiveness Risk Assessment Evaluate IT assets and what can go wrong? What is the probability that it will go wrong? What are the worst-case scenario consequences? Too much security can hamper ability to do job Too little security can leave you vulnerable

Chapter 8: Protecting People & InformationSlide 26 Disaster Recovery Takes into consideration the following: Customers (reassurance) Facilities (hot/cold) Knowledge workers Business information Computer equipment Communications infrastructure

Chapter 8: Protecting People & InformationSlide 27 XLM E: Internet and Web World Wide Web Search Engines Internet Technologies Connecting to the Internet