21
IT Security, Ethics and Society

IT Security, Ethics and Society

  • Upload
    gyan

  • View
    134

  • Download
    4

Embed Size (px)

Citation preview

Page 1: IT Security, Ethics and Society

IT Security, Ethics and Society

Page 2: IT Security, Ethics and Society

IT Security, Ethics, and Society

Next : Principles of Technology Ethics

Page 3: IT Security, Ethics and Society

Principles of Technology Ethics

Next : Responsible Professional Guidelines

Page 4: IT Security, Ethics and Society

Responsible Professional Guidelines

A responsible professional

Acts with integrity

Increases personal competence

Sets high standards of personal performance

Accepts responsibility for his/her work

Advances the health, privacy, and general welfare of the public

Next : Computer Crime

Page 5: IT Security, Ethics and Society

Computer Crime

– Unauthorized use, access, modification, or destruction of hardware, software, data, or network resources

– The unauthorized release of information

– The unauthorized copying of software

– Denying an end user access to his/her own hardware, software, data, or network resources

– Using or conspiring to use computer or network resources illegally to obtain information or tangible property

Next : Corporate Protection Mechanisms

Page 6: IT Security, Ethics and Society

Corporate Protection Mechanisms

Next : Hacking

Page 7: IT Security, Ethics and Society

Hacking

Hacking

The obsessive use of computers

Unauthorized access/use of networked computers

Breaking and Entering

Hacking into a computer system and reading files, but neither stealing nor damaging anything

Cracker

A malicious or criminal hacker who maintainsknowledge of vulnerabilities found for private advantage

Next : Cyber Theft

Page 8: IT Security, Ethics and Society

Cyber TheftMany computer crimes involve theft of moneyMany computer crimes involve theft of money

Most are “inside jobs” that involve unauthorized network entry and alteration of databases to cover the

tracks of the employees involved

Many attacks occur through the Internet (E.g. Phishing)

Most companies don’t reveal that they have been targets or victims of cyber crime

Next : Cyber Terrorism

Page 9: IT Security, Ethics and Society

Cyberterrorism

• The leveraging of an organization’s or government’s computers and information– Particularly through the Internet– To cause physical, real-world harm or severe

disruption of infrastructure

• Can have serious, large-scale influence– Can weaken a country’s economy– Can affect Internet-based businesses

Next : Cyber Terrorism

Page 10: IT Security, Ethics and Society

Cyberterrorism

Life-support at Antarctic research station turned off

Release of untreated sewage into waterways

Examples of Cyberterrorism

Systems shut down in nuclear power plants

Website content replacement by Extremist groups

Next : Unauthorized use at work

Page 11: IT Security, Ethics and Society

Unauthorized Use at Work

• Unauthorized use of computer systems and networks is time and resource theft– Doing private consulting– Doing personal finances– Playing video games– Unauthorized use of Internet or company networks

• Sniffers– Monitor network traffic or capacity to find evidence

of improper useNext : Internet Abuses at the Workplace

Page 12: IT Security, Ethics and Society

Internet Abuses in the WorkplaceGeneral email

abuses

Plagiarism

Unauthorizeduse and access

Newsgrouppostings

Copyrightinfringement

Transmission ofconfidential data

Moonlighting

Hacking

Use ofexternal ISPs

Pornography

Leisure useof Internet

Non-work-relateddownloads or

upload

Next : Software Piracy

Page 13: IT Security, Ethics and Society

Software Piracy

• Software Piracy– Unauthorized copying of computer programs

• Licensing– Purchasing software is really a payment

for a license for fair use– Site license allows a certain number of copies– Public domain software is not copyrightedA third of the software industry’s revenues are lost to piracy

Next : Theft of IP

Page 14: IT Security, Ethics and Society

Theft of Intellectual Property• Intellectual Property

– Copyrighted material– Includes music, videos, images, articles, books,

and software

• Copyright Infringement is Illegal– Peer-to-peer networking techniques have made

it easy to trade pirated intellectual property

• Publishers Offer Inexpensive Online Music– Illegal downloading of music and video is

down and continues to drop

Next : Virus and Worms

Page 15: IT Security, Ethics and Society

Viruses and Worms• A virus is a program that cannot work without being inserted

into another program– A worm is a distinct program that can run unaided

• These programs copy annoying or destructive routines into networked computers– Copy routines spread the virus

• Commonly transmitted through– The Internet and online services– Email and file attachments– Disks from contaminated computers– Shareware

Next : Privacy Issues

Page 16: IT Security, Ethics and Society

Privacy Issues

The power of information technology to store and retrieve information can have a negative effect on every individual’s right to privacy– Personal information is collected with every

visit to a Web site

– Confidential information stored by credit bureaus, credit card companies, and the government has been stolen or misused

Next : Privacy Issues

Page 17: IT Security, Ethics and Society

Privacy Issues

• Computer Matching– Using customer information gained from many

sources to market additional business services

• Unauthorized Access of Personal Files– Collecting telephone numbers, email addresses,

credit card numbers, and other information to build customer profiles

Next : Internet Privacy

Page 18: IT Security, Ethics and Society

Protecting Your Privacy on the Internet

• Ways to protect your privacy– Encrypt email

– Ask your ISP not to sell your name and information to mailing list providers and other marketers

– Don’t reveal personal data and interests on online service and website user profiles

Next : IT Act 2000

Page 19: IT Security, Ethics and Society

IT Act 2000

The Information Technology Act was passed in 2000 to have a check on the increasing cyber crimes.Legal validity of e-mails and digital signatures.

Violation leads to Imprisonment and Compensation up to RS.1 Crore

Next : IT Security

Page 20: IT Security, Ethics and Society

IT Security

IT security is a personal obligation.It is a matter of attitude and culture.Power of IT and Social networking is huge and should be put to good use

Next : Ergonomics

Page 21: IT Security, Ethics and Society

Ergonomics

Designing healthy work environments

Safe, comfortable,

pleasant place for

people to work

Safe, comfortable,

pleasant place for

people to work

Increases employee

morale and productivity

Increases employee

morale and productivity

Also called human factors

engineering

Also called human factors

engineering