Upload
paramalways
View
15.328
Download
3
Embed Size (px)
DESCRIPTION
Citation preview
SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF
INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY
SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF
INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY
Objectives of Ethical challenges
• Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
Ethical Ethical Responsibility
SecurityEthics andSociety
Employment Privacy
Health Crime
WorkingConditions
Individuality
What is Computer Crime ?
• The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources– Unauthorized release of information– Unauthorized copying of software
Types of Computer Crime
Hacking
UnauthorizedUse at work
CyberTheft
Piracy
ComputerViruses
Computer Crime (cont..)
• Hacking– The obsessive use of computers, or the unauthorized access
and use of networked computer systems• Cyber Theft
– Involves unauthorized network entry and the fraudulent alteration of computer databases
• Unauthorized use at work– Also called time and resource theft– May range from doing private consulting or personal
finances, to playing video games, to unauthorized use of the Internet on company networks
• Piracy of intellectual property– Other forms of intellectual property covered by copyright
laws• Music, Videos, Images, Articles, Books
• Software Piracy– Unauthorized copying of software
• Computer viruses and worms– Virus
• A program that cannot work without being inserted into another program
– Worm• A distinct program that can run unaided
Privacy Issues• Privacy issues are at the top of the list in regards
to ethical use of information. • Loss of control• Misuse of information• Risk to physical privacy• Risk of identity theft • Unwanted intrusions into daily life
• Privacy on the Internet– Users of the Internet are highly visible and open to
violations of privacy– Unsecured with no real rules– Cookies capture information about you every time you
visit a site– That information may be sold to third parties
• Privacy laws– Attempt to enforce the privacy of computer-based files
and communications– Electronic Communications Privacy Act– Computer Fraud and Abuse Act
Employment Challenges
Lost JobOpportunities
ComputerMonitoring
LostIndividuality
HealthIssues
WorkingConditions
EmploymentNew jobs
have been created and productivity
has increased, yet there
has been a significant
reduction in some types of jobs as a result of IT.
Other Challenges• Health Issues - Job stress - Muscle damage - Eye strain - Radiation exposure - Accidents
• Individuality– Computer-based systems criticized as
impersonal systems that dehumanize and depersonalize activities
• Working Conditions– IT has eliminated many monotonous,
obnoxious tasks, but has created others
Factors in the Workplace
Security Security ManagementManagement
Goal of Security Goal of Security ManagementManagement
– Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders
Security Measures
Encryption
Denial of ServiceDefenses
Fire Walls
MonitorE-mail
VirusDefenses
Security Measures (cont..)
SecurityCodes
SecurityMonitors
BackupFiles
BiometricSecurity Controls
Security Measures (cont..)
• Encryption– Passwords, messages, files, and other data is transmitted
in scrambled form and unscrambled for authorized users– Involves using special mathematical algorithms to
transform digital data in scrambled code– Most widely used method uses a pair of public and private
keys unique to each individual• Firewalls
– Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion
• Provides a filter and safe transfer point• Screens all network traffic for proper passwords or other
security codes• Denial of Service Defenses
– These assaults depend on three layers of networked computer systems
• Victim’s website• Victim’s ISP• Sites of “zombie” or slave computers
– Defensive measures and security precautions must be taken at all three levels
Security Measures (cont..)
• E-mail Monitoring– “Spot checks just aren’t good enough anymore. The
tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”
• Virus Defenses– Protection may accomplished through
• Centralized distribution and updating of antivirus software
• Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies
• Security codes– Multilevel password system
• Log onto the computer system, Gain access into the system, Access individual files
Security Measures (cont..)
• Backup Files– Duplicate files of data or programs– File retention measures– Sometimes several generations of files are kept for
control purposes
• Security Monitors– Programs that monitor the use of computer systems
and networks and protect them from unauthorized use, fraud, and destruction
• Biometric Security– Measure physical traits that make each individual
unique• Voice• Fingerprints• Hand geometry• Signature dynamics• Retina scanning• Face recognition and Genetic pattern analysis
System Controls and Audits
• Information System Controls– Methods and devices that attempt to
ensure the accuracy, validity, and propriety of information system activities
– Designed to monitor and maintain the quality and security of input, processing, and storage activities
• Auditing Business Systems– Review and evaluate whether proper and
adequate security measures and management policies have been developed and implemented
– Testing the integrity of an application’s audit trail
Thank Thank you…………!!!!!!!!!!you…………!!!!!!!!!!
Thank Thank you…………!!!!!!!!!!you…………!!!!!!!!!!
By : By :
RashmiRashmi
Ankit Ankit
Rohan Rohan
AkashAkash
SonaliSonali
SabanazSabanaz
ThakurdasThakurdas
Yashdeep Yashdeep