Add video notes to lecture

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

Crime and Security in the Networked Economy Part 4.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Fundamentals of Information Systems, Third Edition2 Principles and Learning Objectives Policies and procedures must be established to avoid computer waste.
Chapter 9: Privacy, Crime, and Security
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Now What?. MIS 300, Chapter 92 Basic Concepts Waste and mistakes: Is it possible?   Computers and crime: Aiding, abetting?   Ethical behavior: Are.
Systems Design, Implementation, Maintenance, and Review Security, Privacy, and Ethics Chapters 13 & 14.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Policies and procedures must be established to avoid computer waste and mistakes
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Management Information Systems
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Computer Crime and Information Technology Security
Computer Waste and Security Privacy Computer Health.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BUSINESS B1 Information Security.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
in Information Systems and the Internet
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security, Privacy, and Ethics
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
C8- Securing Information Systems
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
IT in Business Issues in Information Technology Lecture – 13.
Principles of Information Systems, Ninth Edition Chapter 14 The Personal and Social Impact of Computers.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Principles of Information Systems Eighth Edition Chapter 14 The Personal and Social Impact of Computers.
Securing Information Systems
Identity Theft It’s a crime!
Securing Information Systems
Fundamentals & Ethics of Information Systems IS 201
Principles of Information Systems Eighth Edition
IT Security  .
Ethical, Social, and Political Issues in E-commerce
Fundamentals of Information Systems, Sixth Edition
Fundamentals of Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Principles of Information Systems, Ninth Edition
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Principles of Information Systems, Tenth Edition
Fundamentals of Information Systems Fourth Edition
BCT 2.00 Analyze Technology Issues
Computer Crime and Security Measures
Information Systems, Ninth Edition
Computer Programming I
Policies and procedures must be established to avoid computer waste and mistakes
Principles of Information Systems Eighth Edition
Computer and Internet Crime Privacy
Chapter # 3 COMPUTER AND INTERNET CRIME
Principles of Information Systems Eighth Edition
Presentation transcript:

Add video notes to lecture

Issues of the information age Computer _______ and mistakes Preventing computer related waste & mistakes Computer crime Computer as tool to commit crime Computer as object of crime Preventing computer related crime Privacy issues _______ issues in information systems Patent & copyright issues Health concerns

Ethical Issues in Information Systems “Old contract” vs “Social contract” of business

Computer Waste Computer waste The inappropriate use of computer technology and resources Discarding of technology Unused systems Personal use of corporate time and technology __________

Computer-Related Mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful Mistakes can be caused by unclear expectations and a lack of feedback A programmer might develop a program that contains errors A data-entry clerk might enter the wrong data .

Preventing Computer-Related Waste and Mistakes Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures

Types of Computer-Related Mistakes Table 9.2: Types of Computer-Related Mistakes

Useful Policies to Eliminate Waste and Mistakes ? Table 9.3: Useful Policies to Eliminate Waste and Mistakes

The Business Challenge Security – The Business Challenge Who’s the bad guy? Competitors, foreign governments, network hackers, disgruntled ex-employees, news and media, unauthorized customers, employees, etc? How do I protect my information from the bad guys, without making employees and authorized users less productive? Outsiders 20% Insiders 80% How can I administer security consistently, reliably, and cost effectively across all of my distributed information resources ? Studies show 80% of real security problems are caused by authorized users

Computer Crime Often defies detection The amount ________ or diverted can be substantial The crime is “clean” and nonviolent number of IT-related security incidents is increasing Computer crime is now __________

The Computer as a Tool to Commit Crime Criminals need two __________ to commit most computer crimes: Knowing how to gain __________ to the computer system Knowing how to __________ the system to produce the desired result __________ engineering Dumpster diving Cyberterroism & Identity Theft

Cyberterrorism Cyberterrorist: intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them

Identity Theft An imposter obtains key pieces of personal identification information, such as Social Security or driver’s license numbers, in order to impersonate someone else The information is then used to obtain credit, merchandise, and services in the name of the victim or to provide the thief with false credentials

The Computer as the Object of Crime Illegal access and use Hackers __________(also called crackers) Script bunnies Insiders Data alteration and destruction Virus Worm Trojan horse Logic bomb Antivirus program

The Computer as the Object of Crime (cont) Information and equipment theft criminal hackers require illegal access to identification numbers and passwords Password sniffer Theft of data and software Theft of computer systems and equipment Software and Internet piracy Software piracy Internet software piracy Computer-related scams Phishing International computer crime

How to Respond to a Security Incident Table 9.4: How to Respond to a Security Incident

How to Respond to a Security Incident (continued) Table 9.4: How to Respond to a Security Incident (continued)

Preventing Computer-Related Crime Crime prevention by corporations Public key infrastructure (PKI Biometrics

Common Methods Used to Commit Computer Crimes Table 9.8: Common Methods Used to Commit Computer Crimes

Common Methods Used to Commit Computer Crimes (continued) Table 9.8: Common Methods Used to Commit Computer Crimes (continued)

How to Protect Your Corporate Data from Hackers Table 9.9: How to Protect Your Corporate Data from Hackers

How to Protect Your Corporate Data from Hackers (continued) Table 9.9: How to Protect Your Corporate Data from Hackers (continued)

Preventing Computer-Related Crime (continued) Intrusion detection system (IDS): __________ that monitors system and network resources and notifies network security personnel when it senses a possible intrusion Managed security service provider (MSSP): an organization that __________ ,manages, and maintains network security hardware and software for its client companies Using

Preventing Crime on the Internet Develop effective __________ usage and security policies Use a stand-alone __________ with network monitoring capabilities Deploy intrusion detection systems, monitor them, and follow up on their alarms Monitor managers and employees Use Internet __________ specialists to perform audits

Privacy Issues With information systems, privacy deals with the collection and use or misuse of data Privacy and the federal government Privacy at work E-mail privacy Privacy and the Internet

Corporate Privacy Policies Should address a customer’s knowledge, control, notice, and consent over the storage and use of information May cover who has access to private data and when it may be used A good database design practice is to assign a single unique identifier to each customer Corporate Privacy Policies Even though privacy laws for private organizations are not very restrictive, most organizations are very sensitive to privacy issues and fairness. They realize that invasions of privacy can hurt their business, turn away customers, and dramatically reduce revenues and profits. Even though they are not required to maintain privacy policies by law, most organizations do so. Some companies even have a privacy bill of rights that specifies how the privacy of employees, clients, and customers will be protected. Individual Efforts to Protect Privacy There are many things that individuals can do to protect their privacy. These include: Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information

Individual Efforts to Protect Privacy Find out what is stored about you in existing databases Be careful when you share information about yourself Be proactive to protect your privacy When purchasing anything from a Web site, make sure that you safeguard your credit card numbers, passwords, and personal information