Protecting People and Information

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Ethics, Privacy and Information Security
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Crime and Security in the Networked Economy Part 4.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Securing Information Systems
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Defining Security Issues
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Unit 19 INTERNET SECURITY
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Managing Information in a Global World
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
Intellectual Property What’s legal?. Discuss Terms  intellectual property, plagiarism, copyright-patent-trademark, public domain, fair use  piracy,
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Securing Information Systems
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 13 Security and Ethical Challenges.
Chapter 9 E-Commerce Security and Fraud Protection
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Protecting People and Information MIS Chapter 8 Jack G. Zheng May 29th 2008

Intellectual Property refers to creations of the mind (inventions, literary and artistic works, and symbols, names, images, and designs) used in commerce Two categories2 Industrial property inventions (patents), trademarks, industrial designs, and geographic indications of source Copyright literary and artistic works such as novels, poems and plays, films, musical works, drawings, paintings, photographs and sculptures, and architectural designs. 1, 2 Source: World Intellectual Property Organization, http://www.wipo.int

Intellectual Property Fair use doctrine may use copyrighted material in certain situations Pirated software the unauthorized use, duplication, distribution or sale of copyrighted software Counterfeit software software that is manufactured to look like the real thing and sold as such Fair use: TV recording Teaching in class

IP and Open Source Which way (protection vs. open sharing) is best to advance software industry?

Privacy "… the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.“ Dr. Alan Westin, “Privacy and Freedom” (book), 1967

Privacy and Web Customer database Adware Cookie Profiles Behavior patterns (purchasing, searching and navigation) Clickstream Adware Example: 180 search assistant Trojan horse Spyware Cookie A small text file containing user information on the local computer Show customer data flash (the Matrix, TIA-total information awareness) Show cookie example

Privacy and Email Email usually are not protected and are left open for potential scanning Gmail scans content of emails and puts in related ads1 July 1st 2004, “Court Limits Privacy Of E-Mail Messages”2 “A company that provides e-mail service has the right to copy and read any message bound for its customers” Spam Unsolicited email 1http://www.privacyrights.org/ar/GmailAGadvisory.htm 2http://www.washingtonpost.com/wp-dyn/articles/A19211-2004Jun30.html

Internet Fraud Identity theft Phishing (fishing) Forging of identity for the purpose of fraud Phishing (fishing) Deceptively to get people’s information Faked website to get user information Advance Fee Fraud Nigeria email scams … Washington mutual customer data update case/ebay … What are other types? How to identify and deal with it? Topic paper.

Privacy and Employees Workplace PC monitoring Read the handout and discuss Legislation had been approved by the state Senate (California) in May 2004, employers would be required to give written notice explaining what types of electronic activities they monitor, from e-mail to the use of GPS locator devices in company cars and phones

Security

Security Threats In-house security Hacking Computer virus and worm Employee misconduct Hacking Unauthorized access to, or use of the computer, information and systems Hacker Computer virus and worm Virus is the software with malicious intent to cause damage Worm is a self-propagating virus DoS (Denial-of-Service Attack) floods a server with so many requests for service that it slows down or crashes Threat sources: see more in extended module H

Security Management Myth Truth Security is about technology: software and hardware Truth Security is also about policy: awareness, alertness and enforcement

Security Precautions (1) Authentication and authorization Authentication is the process to identify a person (who) Authorization is the process to identify privileges (what and how) Authentication methods What you know: Password What you have (loosely): ID cards, Certificate What you have (tightly): Biometrics Show example of certificate And http://news.zdnet.com/2100-1009-5586249.html

Security Precautions (2) Encryption Symmetric encryption Asymmetric (public key) encryption SSL (secure socket layer) Firewall Software/hardware that can selectively block computer communications Anti-virus software Intrusion detection Show example of SSL (https://)

Good Resources Ethics in computing Napster on CNN Special Privacy http://ethics.csc.ncsu.edu/ Napster on CNN Special www.cnn.com/SPECIALS/2001/napster/ Privacy http://www.privacy.org/ Computer virus information http://securityresponse.symantec.com/