Presentation on theme: "Ethics, Privacy and Information Security"— Presentation transcript:
1Ethics, Privacy and Information Security CHAPTER 3Ethics, Privacy and Information Security
2CHAPTER OUTLINE3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources
3LEARNING OBJECTIVESDescribe the major ethical issues related to information technology and identify situations in which they occur.Describe the many threats to information security.Understand the various defense mechanisms used to protect information systems.Explain IT auditing and planning for disaster recovery.
5Fundamental Tenets of Ethics ResponsibilityAccountabilityLiability
6Unethical vs. IllegalWhat is unethical is not necessarily illegal.
7The Four Categories of Ethical Issues Privacy IssuesAccuracy IssuesProperty IssuesAccessibility Issues
8PrivacyCourt decisions have followed two rules: (1) The right of privacy is not absolute. Your privacy must be balanced against the needs of society. (2) The public’s right to know is superior to the individual’s right of privacy.
9Threats to Privacy Data aggregators, digital dossiers, and profiling Electronic SurveillancePersonal Information in DatabasesInformation on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
16Factors Increasing the Threats to Information Security Today’s interconnected, interdependent, wirelessly-networked business environmentGovernment legislationSmaller, faster, cheaper computers and storage devicesDecreasing skills necessary to be a computer hacker
17Factors Increasing the Threats to Information Security (continued) Downstream liabilityDue diligenceUnmanaged devicesLack of management support
18Key Information Security Terms ThreatExposureVulnerabilityRiskInformation system controls
19Categories of Threats to Information Systems Unintentional actsNatural disastersTechnical failuresManagement failuresDeliberate acts
20Unintentional Acts Human errors Deviations in quality of service by service providers (e.g., utilities)Environmental hazards (e.g., dirt, dust, humidity)
21Human Errors Tailgating Shoulder surfing Carelessness with laptops and portable computing devicesOpening questionable sCareless Internet surfingPoor password selection and useAnd more