McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.

Slides:



Advertisements
Similar presentations
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
Advertisements

Topic 4: Protecting People & Information Ethics, Privacy & Security MGMD 233-MIS AMN 2012.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 10 Privacy and Security.
© , David Gadish, Ph.D.1 Management Information Systems CIS 301 Spring 2006 Week 9 Lectures Dr. David Gadish.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 8 Protecting People and Information Threats and Safeguards
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Protecting People and Information Threats and Safeguards
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill.
Quiz Review.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Protecting People and Information: Threats and Safeguards.
Protecting People and Information: Threats and Safeguards
Chapter 8 Protecting People and Information: Threats and Safeguards.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Privacy and Security (additional readings) McGraw-Hill© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Protecting People and Information: Threats and Safeguards.
Chapter 8 Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE & INFORMATION Threats and Safeguards Chapter 8.
Privacy, Security and Ethics
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Protecting People and Information
CHAPTER FOUR OVERVIEW SECTION ETHICS
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE & INFORMATION
Networking for Home and Small Businesses – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Chapter 8 Protecting People and Information: Threats and Safeguards
Presentation transcript:

McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards

STUDENT LEARNING OUTCOMES 1.Define ethics and describe the two factors that affect how you make a decision concerning an ethical issue. 2.Define and describe intellectual property, copyright, Fair Use Doctrine, and pirated software. 3.Describe privacy and describe ways in which it can be threatened. 4.Describe the ways in which information on your computer or network is vulnerable and list measures you can take to protect it.

THEY KNOW ABOUT 96% OF AMERICAN HOUSEHOLDS

INTRODUCTION Handling information responsibly means understanding the following issues

CHAPTER ORGANIZATION 1.Ethics –Learning Outcomes #1 & #2 2.Privacy –Learning Outcome #3 3.Security –Learning Outcome #4

ETHICS Ethics

Factors the Determine How You Decide Ethical Issues Actions in ethical dilemmas determined by Your basic ethical structure determines what you consider to be

Basic Ethical Structure

Circumstances of the Situation

Intellectual Property Intellectual property Copyright Fair Use Doctrine

Intellectual Property Using copyrighted software without permission violates copyright law Pirated software

PRIVACY Privacy Dimensions of privacy

Privacy and Other Individuals Key logger (key trapper) software Screen capture programs Hardware key logger Event Data Recorders (EDR)

An is Stored on Many Computers

Identity Theft Identity theft

Identity Theft Phishing (carding, brand spoofing) NEVER –Reply without question to an asking for personal information –Click directly on a Web site provided in such an

Identity Theft

Pharming

Privacy and Employees Companies need information about their employees to run their business effectively As of March 2005, 60% of employers monitored employee s 70% of Web traffic occurs during work hours 78% of employers reported abuse 60% employees admitted abuse

Privacy and Employees Cyberslacking – misuse of company resources Visiting inappropriate sites Gaming, chatting, stock trading, social networking, etc.

Reasons for Monitoring

Privacy and Consumers Consumers want businesses to Let them know about products, but not pester them with advertising

Cookies Cookie Handle cookies by using

Spam Gets past spam filters by

Adware and Spyware Adware Spyware (sneakware, stealthware) –

Adware in Free Version of Eudora

Trojan Horse Software Trojan horse software

Web Logs Web log Clickstream Anonymous Web browsing (AWB)

Privacy and Government Agencies About 2,000 government agencies have databases with information on people Government agencies need information to operate effectively Whenever you are in contact with government agency, you leave behind information about yourself

Government Agencies Storing Personal Information Law enforcement Electronic Surveillance

Government Agencies Storing Personal Information IRS Census Bureau Student loan services FICA Social Security Administration Social service agencies Department of Motor Vehicles

Laws on Privacy Health Insurance Portability and Accountability Act (HIPAA) protects personal health information Financial Services Modernization Act requires that financial institutions protect personal customer information Other laws in Figure 8.6 on page 356

SECURITY AND EMPLOYEES Attacks on information and computer resources come from inside and outside the company Computer sabotage costs about $10 billion per year In general, employee misconduct is more costly than assaults from outside

Security and Employees

Security and Outside Threats Hackers Computer virus (virus) Worm Denial-of-service (DoS) attack

Computer Viruses Can’t Hurt your hardware Hurt any files they weren’t designed to attack Infect files on write-protected media

Security Measures 1.Anti-virus software 2.Anti-spyware and anti-adware software 3.Spam protection software 4.Anti-phishing software 5.Firewall

Security Measures 5.Anti-rootkit software 6.Encryption 7.Public Key Encryption (PKE) 8.Biometrics