Information Systems Ethics, Computer Crime, and Security

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

1 3. Data Protection and Privacy Reference: Discovering Computers 2003/2004 Course Technology, Thomson Learning Chapter 12 Note: The privacy laws in HK.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 10 Security On The Internet. Agenda Security Cryptography Privacy on Internet Virus & Worm Client-based Security Server-based Security.
Chapter 9: Privacy, Crime, and Security
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Risks, Controls and Security Measures
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Living Online Module Lesson 29 — Security, Privacy, and Ethics Online
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Unit 19 INTERNET SECURITY
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computer Programming I
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
First Look at Security and Privacy Jeremiah Burleson.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CONTROLLING INFORMATION SYSTEMS
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 17 Risks, Security and Disaster Recovery
BCT 2.00 Analyze Technology Issues
Societal Issues in Computing (COMP466)
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Information Systems Ethics, Computer Crime, and Security

Information Systems Ethics Toffler’s three waves of change Agriculture Industrial Revolution Information Age Alvin Toffler’s book, "The Third Wave" in which he articulates three waves of societal change corresponding to the development and rise of the agricultural, industrial and information societies.

Information Systems Ethics Computer Literacy Knowing how to use a computer Digital Divide That gap between those with computer access and those who don’t have it Computer Ethics Standards of conduct as they pertain to the use of information systems

Information Systems Ethics Information Privacy Protecting one’s personal information Information accuracy Deals with authentication and fidelity of information Information property Deals with who owns information about individuals and how information can be sold and exchanged Information accessibility Deals with what information a person has the right to obtain about others and how the information can be used

Information Systems Ethics Issues in information accessibilityhe need for a code of ethical conduct Carnivore Electronic Communications Privacy Act (ECPA) Monitoring e-mail The need for a code of ethical conduct Business ethics Plagiarism Cybersquatting

Computer Crime Definition: the act of using a computer to commit an illegal act Authorized and unauthorized computer access Examples Stealing time on company computers Breaking into government Web sites Stealing credit card information

Computer Crime Federal and State Laws Hacking and Cracking Stealing or compromising data Gaining unauthorized computer access Violating data belonging to banks Intercepting communications Threatening to damage computer systems Disseminating viruses Hacking and Cracking Hacker – one who gains unauthorized computer access, but without doing damage Cracker – one who breaks into computer systems for the purpose of doing damage

Computer Crime Who commits computer crime?

Computer Crime Types of computer crime Data diddling: modifying data Salami slicing: skimming small amounts of money Phreaking: making free long distance calls Cloning: cellular phone fraud using scanners Carding: stealing credit card numbers online Piggybacking: stealing credit card numbers by spying Social engineering: tricking employees to gain access Dumpster diving: finding private info in garbage cans Spoofing: stealing passwords through a false login page

Computer Crime Computer viruses and destructive code Virus – a destructive program that disrupts the normal functioning of computer systems Types: Worm: usually does not destroy files; copies itself Trojan horses: Activates without being detected; does not copy itself Logic or time bombs: A type of Trojan horse that stays dormant for a period of time before activating

Computer Security Computer Security – precautions taken to keep computers and the information they contain safe from unauthorized access Recommended Safeguards Implement a security plan to prevent break-ins Have a plan if break-ins do occur Make backups! Only allow access to key employees Change passwords frequently Keep stored information secure Use antivirus software Use biometrics for access to computing resources Hire trustworthy employees

Computer Security Encryption How encryption works The process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer How encryption works Symmetric secret key system Both sender and recipient use the same key Key management can be a problem Public key technology A private key and a public key Certificate authority A trusted middleman verifies that a Web site is a trusted site (provides public keys to trusted partners) Secure socket layers (SSL)

Symmetric secret key system A symmetric secret key algorithm is a cryptographic algorithm that uses the same key to encrypt and decrypt data. The best known algorithm is the U.S. Department of Defense's Data Encryption Standard (DES). DES, which was developed at IBM in 1977, was thought to be so difficult to break that the U.S. government restricted its exportation.

Public key technology Two large prime numbers Very hard to solve (intractable solution)

Public key technology – Security and Key Length Key Size Possible Key Combinations 2-bit 2^2 2x2= 4 3-bit 2^3 2x2x2= 8 4-bit 2^4 2x2x2x2= 16 5-bit 2^5 2x2x2x2x2= 32 6-bit 2^6 2x2x2x2x2x2= 64 7-bit 2^7 2x2x2x2x2x2x2= 128 8-bit 2^8 2x2x2x2x2x2x2x2= 256 9-bit 2^9 2x2x2x2x2x2x2x2x2= 512 10-bit 2^10 2x2x2x2x2x2x2x2x2x2= 1024 11-bit 2^11 2x2x2x2x2x2x2x2x2x2...= 2048 12-bit 2^12 2x2x2x2x2x2x2x2x2x2...= 4096 16-bit 2^16 2x2x2x2x2x2x2x2x2x2...= 65536 24-bit 2^24 2x2x2x2x2x2x2x2x2x2...= 16.7 million 30-bit 2^30 2x2x2x2x2x2x2x2x2x2...= 1 billion (1,073,741,800) 40-bit 2^40 2x2x2x2x2x2x2x2x2x2...= 1 trillion (1,097,728,000,000) 56-bit 2^56 2x2x2x2x2x2x2x2x2x2....= 72 thousand quadrillion (71,892,000,000,000,000) 128-bit 2^128 2 multiplied by 2 128 times over = 339,000,000,000,000,000,000,000,000,000,000,000    (give or take a couple trillion...)

Computer Security Other encryption approaches Internet Security Pretty good privacy (PGP) Phil Zimmerman Clipper Chip Internet Security Firewall – hardware and software designed to keep unauthorized users out of network systems

Computer Security Virus prevention How to maintain your privacy online Install antivirus software Make backups Avoid unknown sources of shareware Delete e-mails from unknown sources If your computer gets a virus… How to maintain your privacy online Choose Web sites monitored by privacy advocates Avoid “cookies” Visit sites anonymously Use caution when requesting confirming e-mail

Computer Security Avoid getting conned in cyberspace Internet auctions Internet access International modem dialing Web cramming Multilevel marketing (pyramid schemes) Travel/vacations Business opportunities Investments Health-care products