Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.

Similar presentations


Presentation on theme: "Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9."— Presentation transcript:

1 Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9

2 Fundamentals of Information Systems, Second Edition 2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste and mistakes. –Describe some examples of waste and mistakes in an IS environment, their causes, and possible solutions. –Identify policies and procedures useful in eliminating waste and mistakes.

3 Fundamentals of Information Systems, Second Edition 3 Principles and Learning Objectives Computer crime is a serious and rapidly growing area of concern requiring management attention. –Explain the types and effects of computer crime. –Identify specific measures to prevent computer crime. –Discuss the principles and limits of an individual’s right to privacy.

4 Fundamentals of Information Systems, Second Edition 4 Principles and Learning Objectives Jobs, equipment, and working conditions must be designed to avoid negative health effects. –List the important effects of computers on the work environment. –Identify specific actions that must be taken to ensure the health and safety of employees.

5 Fundamentals of Information Systems, Second Edition 5 Computer Waste & Mistakes

6 Fundamentals of Information Systems, Second Edition 6 Social Issues in Information Systems

7 Fundamentals of Information Systems, Second Edition 7 Computer Waste Discard technology Unused systems Personal use of corporate time and technology

8 Fundamentals of Information Systems, Second Edition 8 Preventing Computer Waste and Mistakes Establish Policies and Procedures Implement Policies and Procedures Monitor Policies and Procedures Review Policies and Procedures

9 Fundamentals of Information Systems, Second Edition 9 Types of Computer-Related Mistakes

10 Fundamentals of Information Systems, Second Edition 10 Useful Policies to Eliminate Waste and Mistakes

11 Fundamentals of Information Systems, Second Edition 11 Computer Crime

12 Fundamentals of Information Systems, Second Edition 12 Number of Incidents Reported to CERT

13 Fundamentals of Information Systems, Second Edition 13 Computer Crime and Security Survey

14 Fundamentals of Information Systems, Second Edition 14 The Computer as a Tool to Commit Crime Social engineering Dumpster diving Identity theft Cyberterrorism

15 Fundamentals of Information Systems, Second Edition 15 Computers as Objects of Crime Illegal access and use –Hackers –Crackers Information and equipment theft Software and Internet piracy Computer-related scams International computer crime

16 Fundamentals of Information Systems, Second Edition 16 How to Respond to a Security Incident

17 Fundamentals of Information Systems, Second Edition 17 Data Alteration and Destruction Virus Worm Logic bomb Trojan horse

18 Fundamentals of Information Systems, Second Edition 18 The Six Computer Incidents with the Greatest Worldwide Economic Impact

19 Fundamentals of Information Systems, Second Edition 19 Top Viruses – July 2002

20 Fundamentals of Information Systems, Second Edition 20 Preventing Computer-Related Crime Crime prevention by state and federal agencies Crime prevention by corporations –Public Key Infrastructure (PKI) –Biometrics Anti-virus programs

21 Fundamentals of Information Systems, Second Edition 21 Preventing Computer-Related Crime Intrusion Detection Software Managed Security Service Providers (MSSPs) Internet Laws for Libel and Protection of Decency

22 Fundamentals of Information Systems, Second Edition 22 Preventing Crime on the Internet Develop effective Internet and security policies Use a stand-alone firewall with network monitoring capabilities Monitor managers and employees Use Internet security specialists to perform audits

23 Fundamentals of Information Systems, Second Edition 23 Common Methods Used to Commit Computer Crimes

24 Fundamentals of Information Systems, Second Edition 24 How to Protect Your Corporate Data from Hackers

25 Fundamentals of Information Systems, Second Edition 25 Antivirus Software

26 Fundamentals of Information Systems, Second Edition 26 Privacy

27 Fundamentals of Information Systems, Second Edition 27 Privacy Issues Privacy and the Federal Government Privacy at work E-mail privacy Privacy and the Internet

28 Fundamentals of Information Systems, Second Edition 28 The Right to Know and the Ability to Decide

29 Fundamentals of Information Systems, Second Edition 29 Federal Privacy Laws and Provisions

30 Fundamentals of Information Systems, Second Edition 30 The Work Environment

31 Fundamentals of Information Systems, Second Edition 31 Health Concerns Repetitive stress injury (RSI) Repetitive motion disorder Carpal tunnel syndrome (CTS) Ergonomics

32 Fundamentals of Information Systems, Second Edition 32 Avoiding Health and Environment Problems Maintain good posture and positioning. Do not ignore pain or discomfort. Use stretching and strengthening exercises. Find a good physician who is familiar with RSI and how to treat it. After treatment, start back slowly and pace yourself.

33 Fundamentals of Information Systems, Second Edition 33 Medical Topics on the Internet

34 Fundamentals of Information Systems, Second Edition 34 Summary Computer waste - the inappropriate use of computer technology and resources in both the public and private sectors Identity theft - a crime in which an imposter obtains key pieces of personal identification information in order to impersonate someone else Software and Internet piracy - represent the most common computer crime


Download ppt "Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9."

Similar presentations


Ads by Google