Introduction to MIS Chapter 14 MIS Impact on Society Copyright 1994-1996 by Jerry Post.

Slides:



Advertisements
Similar presentations
Copyright, 1996 © Dale Carnegie & Associates, Inc. BANK ON IT Money Smart Course Indiana Department of Financial Institutions.
Advertisements

2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
Ethics, Privacy and Information Security
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT at Work Banking and Finance.
Module 5: financial services review
Crime and Security in the Networked Economy Part 4.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
1.2.2.G1 © Take Charge Today – Revised May 2010 – Electronic Banking Bonanza – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Basic Banking Services - Activity 1
Chapter 9: Privacy, Crime, and Security
Bank On It Personal Finance Unit. Why Learn About Banking?
Managing a Bank Account Tracking Your Money Test Review.
Security, Privacy, and Ethics Online Computer Crimes.
E-banking.
FIT3105 Security and Identity Management Lecture 1.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
HealthTranz Payment Solutions Total Payment Solutions for Healthcare Practices.
Financial Institutions, Checking Accounts, and Credit Lesson 3.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Cyber Crimes.
E-Commerce Security and Authentication Details Jerry Post
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Bank On It 1. 2 Purpose Bank On It : Is an overview of banking services. Will help you build a positive relationship with banks, thrifts, and credit unions.
E-BANKING E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic,
1 Operations Tactics Strategy Government Consumers Employees Culture Businesses Privacy Education Company The IT Environment INFSY540 Information Resources.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
1 E-Commerce Security Part II – Security Techniques.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Jerry Post Copyright © Database Management Systems Chapter 10 Database Administration.
Types of Electronic Infection
Chapter 10 Banking.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
TAXCO BUSINESS SERVICES INC. Division of Des-Dawn Corporation BOOKKEEPING | PAYROLL | TAX FILING | TAX PLANNING | CONSULTING INTRODUCING TAXCO BILL PAY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
TODAY’S AGENDA 1.Budgeting Project review- they are due electronically tomorrow 2.Budgeting Quiz (DVD) and test questions afterwards 3.Ch. 10 Baking 4.Ch.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Checking account – An account held at a bank, credit union, or other financial institution in which account owners deposit funds. Account owners have the.
Section 3: Banking Services
Electronic Banking & Security Electronic Banking & Security.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Security Issues in Information Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protecting Your Credit Identity
Communicating in the IT Industry
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Introduction to MIS Chapter 14 MIS Impact on Society Copyright by Jerry Post

The IT Environment Operations Tactics Strategy Government Consumers Employees Culture Businesses Privacy Education Company

Horror Stories §Security Pacific--Oct l Stanley Mark Rifkin l Electronic Funds Transfer l $10.2 million l Switzerland l Soviet Diamonds l Came back to U.S. §Equity Funding l The Impossible Dream l Stock Manipulation Insurance Loans Fake computer records

Horror Stories §Clifford Stoll l The Cuckoo’s Egg l Berkeley Labs l Unix--account not balance l Monitor, false information l Track to East German spy §Old Techniques l Salami slice l Bank deposit slips l Trojan Horse l Virus §Robert Morris l Graduate Student l Unix “Worm” l Internet--tied up for 3 days

Privacy credit cards organizations loans & licenses financial permits census transportation data financial regulatory employment environmental subscriptions education purchases phone criminal record complaints finger prints medical records

Privacy Problems §TRW l Norwich, VT l Listed everyone delinquent on property taxes §Terry Dean Rogan l Lost wallet l Impersonator, 2 murders and 2 robberies l NCIC database l Rogan arrested 5 times in 14 months l Sued and won $55,000 from LA §Employees l 26 million monitored electronically l 10 million pay based on statistics

Privacy Problems §San Francisco Chronicle l Person found 12 others using her SSN l Someone got 16 credit cards from another’s SSN, charged $10,000 l Someone discovered unemployment benefits had already been collected by 5 others §Jeffrey McFadden l SSN and DoB for William Kalin from military records l Got fake Kentucky ID l Wrote $6000 in bad checks l Kalin spent 2 days in jail l Sued McFadden, won $10,000

Privacy Laws §Minimal in US l Credit reports Right to add comments 1994 disputes settled in 30 days 1994 some limits on access to data l Bork Bill--can’t release video rental data l Educational data--limited availability l 1994 limits on selling state/local data §Europe l France and some other controls l European Union, controls but undecided l 1995 EU Privacy Controls

Telecommuting Advantages Decreased overhead. Flexibility in part-time workers. Disadvantages Harder to evaluate workers. Harder to manage workers. The Firm Advantages Reduced commuting costs. Flexible schedule. Disadvantages Loss of personal contacts. Distractions. Employees Suburban work centers

Electronic Transactions Consumer Vendor (data) Customer chooses product, sends ID or digital cash number. NetBill (1) Price, product decryption key, customer code are sent to third party. NetBill (2) Accounts are debited and credited. Product key is sent to customer. Trusted Party Conversion to “real” money. Bank Digital Cash (B) “Cash” amount is verified and added to vendor account. Digital Cash (A) Consumer purchases a cash value that can be used only once.

Threats to Information §Accidents & Disasters §Employees §Consultants §Business Partnerships §Outsiders §PCs & Viruses Employees & Consultants Links to business partners Virus hiding in game software Outside hackers

Security Categories §Physical attack & disasters l Backup--off-site l Cold/Shell site l Hot site l Disaster tests l Personal computers! §Logical l Unauthorized disclosure l Unauthorized modification l Unauthorized withholding $$

Virus Game Program A 7F 3C 5D C 2E A E FA EA F 4F 73 9F User runs program that contains hidden virus 2.Virus copies itself into other programs on the computer 3.Virus spreads until a certain date, henit deletes files, etcetera. Virus code Infected Disk

Virus Damage Dataquest, Inc; Computerworld 12/2/91 National Computer Security Association; Computerworld 5/6/96

Manual v Automated Data §Amount of data §Identification of users §Difficult to detect changes §Speed l Search l Copy §Statistical Inference §Communication Lines

User Identification §Passwords l Dial up service found 30% of people used same word l People choose obvious l Post-It notes §Hints l Don’t use real words l Don’t use personal names l Include non-alphabetic l Change often l Use at least 6 characters §Alternatives: Biometrics l Finger/hand print l Voice recognition l Retina/blood vessels l DNA ? §Password generator cards §Comments l Don’t have to remember l Reasonably accurate l Price is dropping l Nothing is perfect

Security Controls §Access Control l Ownership of data l Read, Write, Execute, Delete l Dial-back modems §Security Monitoring l Access logs l Violations l Lock-outs §Alternatives l Audits l Physical Access l Employee screening §Encryption l Single Key (DES) l Dual Key (RSA)

Encryption: Dual Key Makiko Takao Message Public Keys Makiko 29 Takao 17 Message Encrypted Private Key 13 Private Key 37 Use Takao’s Public key Use Takao’s Private key Makiko sends message to Takao that only he can read.

Dual Key: Authentication Makiko Takao Public Keys Makiko 29 Takao 17 Private Key 13 Private Key 37 Use Takao’s Public key Use Takao’s Private key Takao sends message to Makiko: His key guarantees it came from him. Her key prevents anyone else from reading message. Message Encrypt+T Encrypt+T+M Encrypt+M Use Makiko’s Public key Use Makiko’s Private key Transmission

Clipper Chip Encrypted conversation Escrow keys Clipper chip in phones Intercept Decrypted conversation Judicial or government office

Computer Use in Healthcare