Download presentation
Presentation is loading. Please wait.
Published byJocelyn Gallagher Modified over 9 years ago
1
Issues Information Systems and Management
2
Issues Privacy Ethics Health Computer Crime Security
3
Privacy The right to be left alone when you want to be, to have control over your personal possessions and not to be observed without your consent The power of IT to store and retrieve information can have a negative affect on the “right of privacy” of every individual Monitor e-mail Collect data from website visits
4
Privacy and the Internet There are few rules about what is private and what you can store Censorship: Freedom of Information/Speech/The Press Spamming: mass unsolicited e-mail Flaming: critical, derogatory, vulgar e-mail
5
Privacy and Employees Monitoring technology scans both incoming and outgoing e-mail Eastman Kodak has a monitoring policy Computer matching –Mistaken identity –Stolen identity Terrorists use UNSENT e-mail as a virtual drop box
6
Privacy and Consumers Consumers want businesses to know who they are, provide them with what they want, and tell them about their products – BUT leave them alone. Cookies Spyware
7
Privacy and Government Canadians have the right to see all data held by the Federal Government about them –There is a database on who has made a request –Soviet Union 1974
8
Privacy and International Trade Which countries’ laws apply? –Buy –Ship –Destination
9
Ethics The principles and standards that guide our behaviours toward other people. Technology has created many new ethical dilemmas Intellectual property: intangible Copyright: songs Fair use Doctrine: can legally use copyright material for education Pirated Software: unauthorized duplication or sale of copyright software Counterfeit Software: software manufactured to look real.
11
Developing Information Management Policies Ethical Computer Use Information Privacy Acceptable Use Email Privacy Internet Use Anti-Spam
12
Health Issues Repetitive Stress Injury (RSI) Carpal Tunnel Syndrome (CTS) Computer Vision Syndrome (CVS) Techno-stress Response: Ergonomics »Human factors engineering
13
You and Ethical Responsibility As a managerial end user, you have a responsibility to do something about some of the abuses of information and technology in the workplace. As IS Professionals there should be a code of ethics to follow –One that is generally accepted like other professions
14
Computer Crime The commission of illegal acts through the use of a computer or against a computer system
15
Computer Crime Money theft Service theft Software theft Data alteration or theft Computer Viruses Malicious Access – Hacking Crimes against the computer SWP Internal Audit Seminar, 1975-1980
16
Outside the Organization Viruses: destructive software written with the intent to cause annoyance or damage Benign Viruses Malignant Viruses Macro Viruses Worm Denial-of-service (single or distributed) Combinations Hoaxes Stand-alone Viruses Trojan Horse Viruses
17
The Players Hackers White-hat hackers Black-hat hackers Crackers Social Engineering Hactivists Cyber-terrorists Script Kiddies
18
Inside the Company Be careful who you hire and how you investigate potential problems
19
Computer Forensics The gathering, authentication, examination, and analysis of electronic information stored on any type of computer media, such as hard drives, floppy disks, or CD’s.
20
Recovery and Interpretation Places to look for stray information –Deleted files and slack space –Unused space Ways of hiding information –Rename the file –Make the information invisible –Use Windows to hide files –Protect the file with a password –Encrypt the file –Use Steganography –Compress the file
21
Information Security The protection of information from accidental or intentional misuse by persons inside or outside an organization The First Line of Defence –People –Develop and enforce policies –Ontario Hydro – “Can I help you?”
23
Social Engineering Using one’s social skills to trick people into revealing access credentials or other information valuable to the attackers.
24
The Second Line of Defence - Technology Authentication –Confirm user’s identity ID and password Smart card Fingerprint or voice signature Prevention and Resistance Firewalls Encryption Content filters Detection and Response Anti-virus software
25
Risk Management Identify Threats Assess Consequences Select Countermeasures Prepare contingency plans Monitor and review
26
Effective Controls Provide Quality Assurance Keep the information system free from errors and fraud Data Accuracy System Integrity Scan on data integrity within a database
27
Information System Controls 1.Input Controls 2.Processing Controls 3.Output Controls 4.Storage Controls
28
Information Systems Controls Input Controls –Control totals: record count, batch total, hash total –Ensure a valid transaction Processing Controls –Hardware controls: special checks built into the hardware to verify the accuracy of computer processing Parity Re-calculation –Software controls: check internal file labels, check points, audit trails; edits in application programs
29
Information Systems Controls Output Controls –Ensure that information products are correct and complete and are transmitted to authorized users in a timely manner Storage Controls –Program and database library –File back-up and retention
30
Facility Controls 1.Network Security 2.Physical Protection Controls 3.Biometric Controls 4.Computer Failure Controls
31
Facility Controls Network Security –Monitor the use of networks –Protect networks from unauthorized use –Give authorized users access through ID and passwords –Encryption Physical Protection –Security doors –ID badges –Alarms –Closed-circuit TV
32
Facility Controls Biometric Controls –Measure unique physical traits of individuals Signature, retinal scanning Computer Failure Controls –Fault tolerant: multiple CPU, peripherals and system software –Fail Safe: capability to operate at the same level –Fail Soft: capability to operate at a reduced but acceptable level
33
Procedural Controls Methods that specify how the information services organization should be operated for maximum security to facilitate the accuracy and integrity of computer operation and system development activities.
34
Procedural Controls Separation of Duties Standard Operating Procedures Authorization Requirements Disaster Recovery Auditing Information Systems
35
Procedural Controls Disaster Recovery (Business Continuity Planning) –Specifies duties of employees, what hardware, software, and facilities will be used, and the priority of applications that will be processed.
36
Procedural Controls Auditing Information Systems –Auditing around the computer: verify accuracy of output given specific input –Auditing through the computer: detailed verification of the logic of computer programs –Audit trail The presence of documentation that allows a transaction to be traced through all the stages of its information processing RCMP Auditor
37
Issues Information Systems and Management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.