Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter 10 Privacy and Other Social Issues. Copyright © 2003, Addison-Wesley What Is Privacy? Freedom from observation, intrusion, or attention of others.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
NC1 WETZEL. Purpose  To revise policy and provide guidance for the establishment of a sexual assault prevention/victim assistance program within the.
Chapter 4 Personal Security
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Legal and Ethical Issues. Major Topics Protecting Programs and Data Information and the Law Rights of Employees and Employers Software Failures Computer.
BA J. Galván1 PRIVACY and Other Social Issues.
Computer Legislation The need for computer laws Go to Contents.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Ethical Issues1 Ethics. Ethical Issues2 Modern Problems Change in cost of duplication of information –before xerox & computer disks vs. after Change in.
Lesson 15 : Networks And The Internet
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Information Systems Unit 3.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Unlinking Private Data
Privacy and the Law.
CHAPTER FOUR OVERVIEW SECTION ETHICS
3.6 Fundamentals of cyber security
Chapter 10 Cyberlaw, Social Media, and Privacy
Secure Software Confidentiality Integrity Data Security Authentication
Security.
Chapter # 1 Overview of Ethics
Societal Issues in Computing (COMP466)
Learning Area 1 Information And Communication Technology and Society
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
CHAPTER FOUR OVERVIEW SECTION ETHICS
A Gift of Fire Third edition Sara Baase
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Security in Computing, Fifth Edition
Presentation transcript:

Security in Computing  Privacy in Computing  Legal & Ethical Issues in Computer Security  Information Security Management and Security Controls

I.Privacy in Computing I. What is privacy A.Individual Control of personal information B.Right to declare certain information sensitive C.Privacy has a cost: giving – or not giving – certain information may have affect how we are treated D.Computerization did not invent privacy problems, nor will it solve them...

I.Privacy in Computing E.Basic qualities/dimensions/tenets of privacy 1.Consent of information collection 2.Limited use 3.Limited period of retention 4.Limited disclosure 5.Protection of collected information against inappropriate use 6.Controlled access, logging 7.Monitoring of use, logging 8.Policies cannot be weakened once data items are collected.

I.Privacy in Computing F.Anonymity, pseudonymity, multiple identities

II.Principles and Policies A.Fair information policies B.Privacy laws – which country?

III.Authentication A.Of an: 1.Individual 2.Identity 3.Attribute B.Anonymization 1.Delivering unique identities from anonymized data 2.Work of Anderson, Sweeney

IV.Data Mining A.Privacy-preserving data mining 1.Tradeoff between anonymity and identification for good purpose 2.Joining databases on common data values 3.Aggregating for study of trends, connections

V.Privacy on the Internet A.Finance 1.Web payments 2.Credit cards 3.Anonymous payments 4.Payments in cases of mutual distrust B.Retained relationships A.Cookies B.Site logins C.Impersonation D.Unannounced relationships (tracking)

V.Privacy on the Internet C.Tracking 1.Web bugs 2.Keystrokes logging 3.Spyware 4.Adware 5.hijacking

VI.Secure A.No sender assurance; little ability to track the origin of a message B.Insecure channels C.Monitoring D.Anonymous and r ers E.Spoofing, spam

VII.Emerging technologies (examples) A.RFID – Radio-frequency identification 1.Definition 2.Uses 3.Misuses B.Electronic voting 1.Far election principles 2.Contrast to fairness of paper ballot, mechanical voting techniques 3.Internet voting 4.Voice over IP

I.Legal and Ethical Issues in Computer Security I. This is a very broad topic – some topics for class discussion based on case studies are: A.Determining current and national laws concerning personal privacy and computer records, computer fraud, or hacking, given that laws change frequently B.Review recent prosecutions of computer crime cases to see what laws where used for this prosecution

I.Legal and Ethical Issues in Computer Security C.How to address the international aspect of computer crime – i.e. when a criminal in one country commits a crime against a computer in another country - Whose law is broken? whose police and courts have jurisdiction? how should the crime be investigated? - What if the transaction is passed through a third country or if the criminal uses an ISP in fourth country?

I.Information Security Management and Security Controls I. Key area relating to ISO/IEC code of practice for information security management and security controls in terms of: general principles, best practice recommendations, established guidelines and any specific issues within this area. =39612