23
Chapter 3 Ethics, Privacy & Security Describe the major ethical issues related to information technology and identify situations in which they occur. Identify the many threats to information security Understand the various defense mechanisms used to protect information systems. Explain IT auditing and planning for disaster recovery.

Chapter 3 Ethics, Privacy & Security

  • Upload
    irving

  • View
    102

  • Download
    4

Embed Size (px)

DESCRIPTION

Chapter 3 Ethics, Privacy & Security. Describe the major ethical issues related to information technology and identify situations in which they occur . Identify the many threats to information security Understand the various defense mechanisms used to protect information systems. - PowerPoint PPT Presentation

Citation preview

Page 1: Chapter 3  Ethics,  Privacy &  Security

Chapter 3 Ethics, Privacy & SecurityDescribe the major ethical issues related to information technology and identify situations in which they occur.

Identify the many threats to information security

Understand the various defense mechanisms used to protect information systems.

Explain IT auditing and planning for disaster recovery.

Page 2: Chapter 3  Ethics,  Privacy &  Security

Case Study TJX SWOT

Page 3: Chapter 3  Ethics,  Privacy &  Security

Ethical Issues

Fundamental tenets of ethics include responsibility, accountability, and liability

unethical is not necessarily illegal. Should organizations monitor employees’ Web surfing

and e-mail? Should organizations sell customer information to

other companies?

Page 4: Chapter 3  Ethics,  Privacy &  Security

Ethical Issues

Should organizations audit employees’ computers for unauthorized software or illegally downloaded music or video files?

Privacy issues

Accuracy issues

Property issues

Accessibility issues

Page 5: Chapter 3  Ethics,  Privacy &  Security

Protecting Privacy

The right of privacy is not absolute. Privacy must be balanced against the needs of society

The public’s right to know supersedes the individual’s right of privacy

International Aspects of Privacy

Page 6: Chapter 3  Ethics,  Privacy &  Security

IT’s About Business

Security Outside the Perimeter: LexisNexis

Page 7: Chapter 3  Ethics,  Privacy &  Security

Threats to Information Security

Today’s interconnected, interdependent, wirelessly networked business environment

Governmental legislation Smaller, faster, cheaper computers and storage devices Decreasing skills necessary to be a computer hacker International organized crime taking over cybercrime Downstream liability Increased employee use of unmanaged devices Lack of management support

Page 8: Chapter 3  Ethics,  Privacy &  Security

Threats to Information Systems

Unintentional acts Natural disasters Technical failures Management failures Deliberate acts

Page 9: Chapter 3  Ethics,  Privacy &  Security

IT’s About Business

The “Hack, Pump, and Dump” Scheme

Page 10: Chapter 3  Ethics,  Privacy &  Security

Protecting Information Resources Risk management

Risk analysis

Risk mitigation

Risk acceptance

Risk limitation

Risk transference

Page 11: Chapter 3  Ethics,  Privacy &  Security

Protecting Information Resources Controls The Difficulties in Protecting Information Resources Physical Controls Access Controls

Page 12: Chapter 3  Ethics,  Privacy &  Security
Page 13: Chapter 3  Ethics,  Privacy &  Security

Protecting Information Resources Authentication

Something the User Is

Something the User Has

Something the User Does

Something the User Knows

Page 14: Chapter 3  Ethics,  Privacy &  Security

IT’s About Business

Providing Least Privilege at UPS

Page 15: Chapter 3  Ethics,  Privacy &  Security

Protecting Information Resources Communications (network) controls

Firewalls.

Anti-malware systems.

Page 16: Chapter 3  Ethics,  Privacy &  Security
Page 17: Chapter 3  Ethics,  Privacy &  Security

Protecting Information Resources Whitelisting and Blacklisting

Intrusion Detection Systems

Encryption.

Virtual Private Networking

Secure Socket Layer

Page 18: Chapter 3  Ethics,  Privacy &  Security

IT’s About Business

Using Encryption to Reduce E-Mail Security Risks at Harvard Pilgrim

Page 19: Chapter 3  Ethics,  Privacy &  Security

Ethics, Privacy, and Information Security

Page 20: Chapter 3  Ethics,  Privacy &  Security

Ethics, Privacy, and Information Security

Vulnerability Management Systems

Employee Monitoring Systems

Application Controls

Page 21: Chapter 3  Ethics,  Privacy &  Security

Business Continuity Planning, Backup, and Recovery

hot site

warm site

cold site

off-site data storage

Page 22: Chapter 3  Ethics,  Privacy &  Security

IT’s About Business

The Baltimore Ravens Plan for Business Continuity

Page 23: Chapter 3  Ethics,  Privacy &  Security

Information Systems Auditing

Types of Auditors and Audits How Is Auditing Executed?