51
Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091

Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Embed Size (px)

Citation preview

Page 1: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Chapter 13 Security and Ethical Challenges

James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed.  Boston, MA: McGraw-Hill, Inc., 2007.  ISBN: 13 9780073323091

Page 2: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

IT Security, Ethics, and Society

2Chapter 13 Security and Ethical Challenges

IT has both beneficial and detrimental effects on society and people Manage work

activities to minimize the detrimental effects of IT

Optimize the beneficial effects

Page 3: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Business Ethics Ethics questions that managers confront as part

of their daily business decision making include:EquityRightsHonestyExercise of corporate power

3Chapter 13 Security and Ethical Challenges

Page 4: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Categories of Ethical Business Issues

4Chapter 13 Security and Ethical Challenges

Page 5: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Corporate Social Responsibility Theories Stockholder Theory

Managers are agents of the stockholders Their only ethical responsibility is to increase the profits of

the business without violating the law or engaging in fraudulent practices

Social Contract Theory Companies have ethical responsibilities to all members of

society, who allow corporations to exist Stakeholder Theory

Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders

Stakeholders are all individuals and groups that have a stake in, or claim on, a company

5Chapter 13 Security and Ethical Challenges

Page 6: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Principles of Technology Ethics Proportionality - The good achieved by the technology must

outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk

Informed Consent - Those affected by the technology should understand and accept the risks

Justice The benefits and burdens of the technology should be

distributed fairly Those who benefit should bear their fair share of the risks,

and those who do not benefit should not suffer a significant increase in risk

Minimized Risk - Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk

6Chapter 13 Security and Ethical Challenges

Page 7: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

AITP Standards of Professional Conduct

7Chapter 13 Security and Ethical Challenges

Page 8: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Responsible Professional Guidelines A responsible professional

Acts with integrity Increases personal competenceSets high standards of personal performanceAccepts responsibility for his/her workAdvances the health, privacy, and general

welfare of the public

8Chapter 13 Security and Ethical Challenges

Page 9: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Computer Crime Computer crime includes

Unauthorized use, access, modification, or destruction of hardware, software, data, or network resources

The unauthorized release of informationThe unauthorized copying of softwareDenying an end user access to his/her own

hardware, software, data, or network resourcesUsing or conspiring to use computer or

network resources illegally to obtain information or tangible property

9Chapter 13 Security and Ethical Challenges

Page 10: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Cybercrime Protection Measures

10Chapter 13 Security and Ethical Challenges

Page 11: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Hacking Hacking is

The obsessive use of computersThe unauthorized access and use of networked

computer systems Electronic Breaking and Entering

Hacking into a computer system and reading files, but neither stealing nor damaging anything

CrackerA malicious or criminal hacker who maintains

knowledge of the vulnerabilities found for private advantage

11Chapter 13 Security and Ethical Challenges

Page 12: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Common Hacking Tactics Denial of Service

Hammering a website’s equipment with too many requests for information

Clogging the system, slowing performance, or crashing the site Scans

Widespread probes of the Internet to determine types of computers, services, and connections

Looking for weaknesses Sniffer

Programs that search individual packets of data as they pass through the Internet

Capturing passwords or entire contents Spoofing

Faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers

12Chapter 13 Security and Ethical Challenges

Page 13: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Common Hacking Tactics Trojan House

A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software

Back Doors A hidden point of entry to be used in case the original entry

point is detected or blocked Malicious Applets

Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords

War Dialing Programs that automatically dial thousands of telephone

numbers in search of a way in through a modem connection Logic Bombs

An instruction in a computer program that triggers a malicious act

13Chapter 13 Security and Ethical Challenges

Page 14: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Common Hacking Tactics Buffer Overflow

Crashing or gaining control of a computer by sending too much data to buffer memory

Password Crackers Software that can guess passwords

Social Engineering Gaining access to computer systems by talking unsuspecting

company employees out of valuable information, such as passwords

Dumpster Diving Sifting through a company’s garbage to find information to help

break into their computers

14Chapter 13 Security and Ethical Challenges

Page 15: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Cyber Theft Many computer crimes involve the theft of

money The majority are “inside jobs” that involve

unauthorized network entry and alternation of computer databases to cover the tracks of the employees involved

Many attacks occur through the Internet Most companies don’t reveal that they have

been targets or victims of cybercrime

15Chapter 13 Security and Ethical Challenges

Page 16: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Unauthorized Use at Work Unauthorized use of computer systems and

networks is time and resource theftDoing private consultingDoing personal financesPlaying video gamesUnauthorized use of the Internet or company

networks Sniffers

Used to monitor network traffic or capacityFind evidence of improper use

16Chapter 13 Security and Ethical Challenges

Page 17: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Internet Abuses in the WorkplaceGeneral email abusesUnauthorized usage and accessCopyright infringement/plagiarismNewsgroup postingsTransmission of confidential dataPornographyHackingNon-work-related download/uploadLeisure use of the InternetUse of external ISPsMoonlighting

17Chapter 13 Security and Ethical Challenges

Page 18: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Software Piracy Software Piracy

Unauthorized copying of computer programs Licensing

Purchasing software is really a payment for a license for fair use

Site license allows a certain number of copies

18

A third of the software industry’s revenues are

lost to piracy

Chapter 13 Security and Ethical Challenges

Page 19: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Theft of Intellectual Property Intellectual Property

Copyrighted material Includes such things as music, videos,

images, articles, books, and software Copyright Infringement is Illegal

Peer-to-peer networking techniques have made it easy to trade pirated intellectual property

Publishers Offer Inexpensive Online Music Illegal downloading of music and video is

down and continues to drop

19Chapter 13 Security and Ethical Challenges

Page 20: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Viruses and Worms A virus is a program that cannot work without

being inserted into another programA worm can run unaided

These programs copy annoying or destructive routines into networked computersCopy routines spread the virus

Commonly transmitted throughThe Internet and online servicesEmail and file attachmentsDisks from contaminated computersShareware

20Chapter 13 Security and Ethical Challenges

Page 21: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Top Five Virus Families of all Time My Doom, 2004

Spread via email and over Kazaa file-sharing network Installs a back door on infected computers Infected email poses as returned message or one that can’t be

opened correctly, urging recipient to click on attachment Opens up TCP ports that stay open even after termination of

the worm Upon execution, a copy of Notepad is opened, filled with

nonsense characters Netsky, 2004

Mass-mailing worm that spreads by emailing itself to all email addresses found on infected computers

Tries to spread via peer-to-peer file sharing by copying itself into the shared folder

It renames itself to pose as one of 26 other common files along the way

21Chapter 13 Security and Ethical Challenges

Page 22: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Top Five Virus Families of all Time SoBig, 2004

Mass-mailing email worm that arrives asan attachment

Examples: Movie_0074.mpg.pif, Document003.pif Scans all .WAB, .WBX, .HTML, .EML, and .TXT files looking for

email addresses to which it can send itself Also attempts to download updates for itself

Klez, 2002 A mass-mailing email worm that arrives with a randomly named

attachment Exploits a known vulnerability in MS Outlook to auto-execute on

unpatched clients Tries to disable virus scanners and then copy itself to all local

and networked drives with a random file name Deletes all files on the infected machine and any mapped

network drives on the 13th of all even-numbered months

22Chapter 13 Security and Ethical Challenges

Page 23: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Top Five Virus Families of all Time Sasser, 2004

Exploits a Microsoft vulnerability to spread from computer to computer with no user intervention

Spawns multiple threads that scan local subnets for vulnerabilities

23Chapter 13 Security and Ethical Challenges

Page 24: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

The Cost of Viruses, Trojans, Worms Cost of the top five virus families

Nearly 115 million computers in 200 countries were infected in 2004

Up to 11 million computers are believed to be permanently infected

In 2004, total economic damage from virus proliferation was $166 to $202 billion

Average damage per computer is between $277 and $366

24Chapter 13 Security and Ethical Challenges

Page 25: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Adware and Spyware Adware

Software that purports to serve a useful purpose, and often does

Allows advertisers to display pop-up and banner ads without the consent of the computer users

SpywareAdware that uses an Internet connection in the

background, without the user’s permission or knowledge

Captures information about the user and sends it over the Internet

25Chapter 13 Security and Ethical Challenges

Page 26: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Spyware Problems Spyware can steal private information and also

Add advertising links to Web pagesRedirect affiliate paymentsChange a users home page and search settingsMake a modem randomly call premium-rate

phone numbersLeave security holes that let Trojans inDegrade system performance

Removal programs are often not completely successful in eliminating spyware

26Chapter 13 Security and Ethical Challenges

Page 27: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Privacy Issues The power of information technology to store

and retrieve information can have a negative effect on every individual’s right to privacyPersonal information is collected with every

visit to a Web siteConfidential information stored by credit

bureaus, credit card companies, and the government has been stolen or misused

27Chapter 13 Security and Ethical Challenges

Page 28: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Opt-in Versus Opt-out Opt-In

You explicitly consent to allow data to be compiled about you

This is the default in Europe Opt-Out

Data can be compiled about you unless you specifically request it not be

This is the default in the U.S.

28Chapter 13 Security and Ethical Challenges

Page 29: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Privacy Issues Violation of Privacy

Accessing individuals’ private email conversations and computer records

Collecting and sharing information about individuals gained from their visits to Internet websites

Computer Monitoring Always knowing where a person is Mobile and paging services are becoming more closely

associated with people than with places Computer Matching

Using customer information gained from many sources to market additional business services

Unauthorized Access of Personal Files Collecting telephone numbers, email addresses, credit card

numbers, and other information to build customer profiles

29Chapter 13 Security and Ethical Challenges

Page 30: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Protecting Your Privacy on the Internet There are multiple ways to protect your privacy

Encrypt emailSend newsgroup postings through

anonymous remailersAsk your ISP not to sell your name and

information to mailing list providers and other marketers

Don’t reveal personal data and interests on online service and website user profiles

30Chapter 13 Security and Ethical Challenges

Page 31: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Privacy Laws Electronic Communications Privacy Act

and Computer Fraud and Abuse Act Prohibit intercepting data communications messages, stealing or

destroying data, or trespassing in federal-related computer systems

U.S. Computer Matching and Privacy Act Regulates the matching of data held in federal agency files to

verify eligibility for federal programs Other laws impacting privacy and how

much a company spends on compliance Sarbanes-Oxley Health Insurance Portability and Accountability Act (HIPAA) Gramm-Leach-Bliley USA Patriot Act California Security Breach Law Securities and Exchange Commission rule 17a-4

31Chapter 13 Security and Ethical Challenges

Page 32: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Computer Libel and Censorship The opposite side of the privacy debate…

Freedom of information, speech, and press Biggest battlegrounds - bulletin boards, email boxes, and

online files of Internet and public networks Weapons used in this battle – spamming, flame mail,

libel laws, and censorship Spamming - Indiscriminate sending of unsolicited email

messages to many Internet users Flaming

Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the Internet or online services

Especially prevalent on special-interest newsgroups

32Chapter 13 Security and Ethical Challenges

Page 33: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Cyberlaw Laws intended to regulate activities over the Internet or via

electronic communication devices Encompasses a wide variety of legal and political issues Includes intellectual property, privacy, freedom of

expression, and jurisdiction The intersection of technology and the law is controversial

Some feel the Internet should not be regulated Encryption and cryptography make traditional form of

regulation difficult The Internet treats censorship as damage and simply

routes around it Cyberlaw only began to emerge in 1996

Debate continues regarding the applicability of legal principles derived from issues that had nothing to do with cyberspace

33Chapter 13 Security and Ethical Challenges

Page 34: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Other Challenges Employment

IT creates new jobs and increases productivity It can also cause significant reductions in job opportunities, as well as

requiring new job skills Computer Monitoring

Using computers to monitor the productivity and behavior of employees as they work

Criticized as unethical because it monitors individuals, not just work, and is done constantly

Criticized as invasion of privacy because many employees do not know they are being monitored

Working Conditions IT has eliminated monotonous or obnoxious tasks However, some skilled craftsperson jobs have been replaced by jobs

requiring routine, repetitive tasks or standby roles Individuality

Dehumanizes and depersonalizes activities because computers eliminate human relationships

Inflexible systems34Chapter 13 Security and Ethical Challenges

Page 35: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Health Issues Cumulative Trauma Disorders (CTDs)

Disorders suffered by people who sit at a PC or terminal and do fast-paced repetitive keystroke jobs

Carpal Tunnel SyndromePainful, crippling ailment of the hand

and wristTypically requires surgery to cure

35Chapter 13 Security and Ethical Challenges

Page 36: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Ergonomics Designing healthy

work environments Safe, comfortable,

and pleasant for people to work in

Increases employee morale and productivity

Also called human factors engineering

36Chapter 13 Security and Ethical Challenges

Ergonomics Factors

Page 37: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Societal Solutions Using information technologies to solve human

and social problemsMedical diagnosisComputer-assisted instructionGovernmental program planningEnvironmental quality controlLaw enforcementJob placement

The detrimental effects of ITOften caused by individuals or organizations

not accepting ethical responsibility for their actions

37Chapter 13 Security and Ethical Challenges

Page 38: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Security Management of IT The Internet was developed for inter-operability,

not impenetrabilityBusiness managers and professionals alike

are responsible for the security, quality, and performance of business information systems

Hardware, software, networks, and data resources must be protected by a variety of security measures

38Chapter 13 Security and Ethical Challenges

Page 39: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Security Management

The goal of securitymanagement is the accuracy, integrity, and safety of allinformation system processes and resources

39Chapter 13 Security and Ethical Challenges

Page 40: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Internetworked Security Defenses Encryption

Data is transmitted in scrambled form It is unscrambled by computer systems for

authorized users onlyThe most widely used method uses a pair of

public and private keys unique to each individual

40Chapter 13 Security and Ethical Challenges

Page 41: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Public/Private Key Encryption

41Chapter 13 Security and Ethical Challenges

Page 42: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Internetworked Security Defenses Firewalls

A gatekeeper system that protects a company’s intranets and other computer networks from intrusion

Provides a filter and safe transfer point for access to/from the Internet and other networks

Important for individuals who connect to the Internet with DSL or cable modems

Can deter hacking, but cannot prevent it

42Chapter 13 Security and Ethical Challenges

Page 43: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Internet and Intranet Firewalls

43Chapter 13 Security and Ethical Challenges

Page 44: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Denial of Service Attacks Denial of service attacks depend on three

layers of networked computer systemsThe victim’s websiteThe victim’s Internet service providerZombie or slave computers that have been

commandeered by the cybercriminals

44Chapter 13 Security and Ethical Challenges

Page 45: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Defending Against Denial of Service At Zombie Machines

Set and enforce security policiesScan for vulnerabilities

At the ISPMonitor and block traffic spikes

At the Victim’s WebsiteCreate backup servers and network

connections

45Chapter 13 Security and Ethical Challenges

Page 46: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Internetworked Security Defenses Email Monitoring

Use of content monitoring software that scans

for troublesome words that might compromise corporate security

Virus DefensesCentralize the updating and distribution of

antivirus softwareUse a security suite that integrates virus

protection with firewalls, Web security, and content blocking features

46Chapter 13 Security and Ethical Challenges

Page 47: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Other Security Measures Security Codes

Multilevel password system Encrypted passwords Smart cards with microprocessors

Backup Files Duplicate files of data or programs

Security Monitors Monitor the use of computers and networks Protects them from unauthorized use, fraud, and destruction

Biometrics Computer devices measure physical traits that make each

individual unique Voice recognition, fingerprints, retina scan

Computer Failure Controls Prevents computer failures or minimizes its effects Preventive maintenance Arrange backups with a disaster recovery organization

47Chapter 13 Security and Ethical Challenges

Page 48: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Other Security Measures In the event of a system failure, fault-tolerant systems have

redundant processors, peripherals, and software that provide Fail-over capability: shifts to back up components Fail-save capability: the system continues to operate at the

same level Fail-soft capability: the system continues to operate at a

reduced but acceptable level A disaster recovery plan contains formalized procedures to follow

in the event of a disaster Which employees will participate What their duties will be What hardware, software, and facilities will be used Priority of applications that will be processed Use of alternative facilities Offsite storage of databases

48Chapter 13 Security and Ethical Challenges

Page 49: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Information System Controls

Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities

49Chapter 13 Security and Ethical Challenges

Page 50: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Auditing IT Security

IT Security AuditsPerformed by internal or external auditorsReview and evaluation of security measures

and management policiesGoal is to ensure that that proper and

adequate measures and policies are in place

50Chapter 13 Security and Ethical Challenges

Page 51: Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8 th ed. Boston, MA:

Protecting Yourself from Cybercrime

51Chapter 13 Security and Ethical Challenges