Download presentation
Presentation is loading. Please wait.
Published byMyra Williamson Modified over 9 years ago
1
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security
2
Chapter 4 4-4 SECTION 4.1 ETHICS
3
Chapter 4 ETHICS What is ethics? Legal versus ethical 4-7
4
Chapter 4 TECHNOLOGY AND ETHICS Intellectual property Copyright Fair use doctrine Pirated software Counterfeit software 4-7
5
Chapter 4 PEOPLE AND ETHICS Individuals form the only ethical component of IT Individuals copy, use, and distribute software Search organizational databases for sensitive and personal information Individuals create and spread viruses Individuals hack into computer systems to steal information Employees destroy and steal information 4-10
6
Chapter 4 PRIVACY, CONFIDENTIALITY, & TRUST Privacy Confidentiality 4-8
7
Chapter 4 INFORMATION MANAGEMENT POLICIES Ethical computer use policy Information privacy policy Acceptable use policy email privacy policy Internet use policy Anti-spam policy 4-13
8
Chapter 4 INFORMATION PRIVACY POLICY 1. Notice and disclosure 2. Choice and consent 3. Information security 4. Information quality and access 4-17
9
Chapter 4 EMAIL PRIVACY POLICY 4-21
10
Chapter 4 INTERNET USE POLICY Describes available Internet services Defines the purpose and restriction of Internet access Describes user responsibilities States the ramification for violations 4-23
11
Chapter 4 WORKPLACE MONITORING Workplace monitoring To monitor or not to monitor, that is the question 4-25
12
Chapter 4 MONITORING TECHNOLOGIES Key logger or key trapper software Hardware key logger Cookie Adware 4-26
13
Chapter 4 MONITORING TECHNOLOGIES Spyware Web log 4-26
14
Chapter 4 4-28 SECTION 4.2 INFORMATION SECURITY
15
Chapter 4 PROTECTING INTELLECTUAL ASSETS Information security 4-32
16
Chapter 4 THREATS AND SOURCES People Technologies Techniques eBusiness Downtime
17
Chapter 4 INSIDERS Organizations must enable employees, customers, and partners to access information electronically 33% of security incidents originate within the organization 4-35
18
Chapter 4 HACKERS Hacker Cracker White-hat hacker Black-hat hacker Hactivist Script kiddies or script bunnies Cyberterrorist 4-52
19
Chapter 4 HUMAN FAILURES Social engineering Identity theft Phishing 4-42
20
Chapter 4 MALICIOUS SOFTWARE (MALWARE) Virus Worm Polymorphic virus and worm Trojan-horse virus 4-53
21
Chapter 4 MALICIOUS SOFTWARE (MALWARE) Backdoor program Spyware Sniffer 4-53
22
Chapter 4 DENIAL OF SERVICE Denial-of-service attack (DoS) Distributed denial-of-service attack (DDoS)
23
Chapter 4 EBUSINESS THREATS Elevation of privilege Hoaxes Spoofing Packet tampering 4-54
24
Chapter 4 DOWNTIME How Much Will Downtime Cost Your Business? 4-31
25
Chapter 4 TECHNOLOGY DEFENSES Authentication and authorization Prevention and resistance Detection and response 4-39
26
Chapter 4 AUTHENTICATION AND AUTHORIZATION Authentication Authorization 4-40
27
Chapter 4 AUTHENTICATION Something the user knows Something the user has Tokens and Smart cards Something the user does Something the user is Biometrics
28
Chapter 4 AUTHORIZATION Resource Type(s) of Access Person or Group Least Access Required
29
Chapter 4 PREVENTION AND RESISTANCE Content filtering Encryption Firewalls 4-45
30
Chapter 4 CONTENT FILTERING 4-46 http://www.gta.com/options/contFilterDetails/
31
Chapter 4 ENCRYPTION Encryption Public key encryption (PKE) 4-47
32
Chapter 4 PUBLIC KEY ENCRYPTION 4-48
33
Chapter 4 FIREWALLS 4-49
34
Chapter 4 DETECTION AND RESPONSE Anti-malware tools Backups 4-51
35
Chapter 4 ANTI-MALWARE TOOLS Antivirus software Anti-spyware software 4-51
36
Chapter 4 BACKUPS Data Customized software Type RAID Removable media Streaming Location Offline Offsite Secure 4-51
37
Chapter 4
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.