Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.

Slides:



Advertisements
Similar presentations
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Advertisements

Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
The Internet.
Topic 4: Protecting People & Information Ethics, Privacy & Security MGMD 233-MIS AMN 2012.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Chapter 10 Privacy and Security.
© , David Gadish, Ph.D.1 Management Information Systems CIS 301 Spring 2006 Week 9 Lectures Dr. David Gadish.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 8 Protecting People and Information Threats and Safeguards
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Ethics, Security, and Privacy What's Right, What's Wrong, and How Can You Protect Yourself? Chapter 7.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Chapter 11 Security and Privacy: Computers and the Internet.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Protecting People and Information: Threats and Safeguards.
Protecting People and Information: Threats and Safeguards
Chapter 8 Protecting People and Information: Threats and Safeguards.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
8-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 8 Protecting People.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Privacy and Security (additional readings) McGraw-Hill© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved ©2005 The McGraw-Hill Companies, All rights reserved McGraw-Hill/Irwin.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Protecting People and Information: Threats and Safeguards.
Chapter 8 Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE & INFORMATION Threats and Safeguards Chapter 8.
Privacy, Security and Ethics
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Protecting People and Information
Securing Information Systems
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CHAPTER FOUR OVERVIEW SECTION ETHICS
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE & INFORMATION
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter 8 Protecting People and Information: Threats and Safeguards
Presentation transcript:

Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin

STUDENT LEARNING OUTCOMES 1. Define ethics and describe the two factors that affect how you make a decision concerning an ethical issue. 2. Define and describe intellectual property, copyright, Fair Use Doctrine, and pirated software. 3. Describe privacy and describe ways in which it can be threatened. 4. Describe the ways in which information on your computer or network is vulnerable and list measures you can take to protect it. 8-2

SHE LOST $400,000 TO AN SCAM  “419” s are a popular type of scam  419 scams promise you, in an , that you will get rich if you ante up a small fee  Janella Spears took the bait and spent $400,000 trying to collect her fortune  She even cashed in her husband’s retirement to get the money to send the crooks 8-3

Case Study Questions 1. What do you think about this true story? 2. Have you ever been caught in a scam? How did you feel when you discovered that you had been fooled? 3. What would you do if you knew that your parent was being complicity in his or her own victimization? 8-4

INTRODUCTION  Handling information responsibly means understanding the following issues  Ethics  Personal privacy  Threats to information  Protection of information 8-5

CHAPTER ORGANIZATION 1. Ethics  Learning Outcomes #1 & #2 2. Privacy  Learning Outcome #3 3. Security  Learning Outcome #4 8-6

ETHICS  Ethics 8-7

Factors the Determine How You Decide Ethical Issues  Actions in ethical dilemmas determined by  1.  2.  Your basic ethical structure determines what you consider to be  1.  2. 

Basic Ethical Structure 8-9

Circumstances of the Situation

Intellectual Property  Intellectual property  Copyright  Fair Use Doctrine 8-11

Intellectual Property  Using copyrighted software without permission violates copyright law  Pirated software 8-12

PRIVACY  Privacy  Dimensions of privacy  1. 

Privacy and Other Individuals  Key logger (key trapper) software  Screen capture programs  is stored on many computers as it travels from sender to recipient  Hardware key logger.  Event Data Recorders (EDR) 8-14

An is Stored on Many Computers 8-15

Identity Theft  Identity theft 8-16

Identity Theft  Phishing (carding, brand spoofing)  NEVER  Reply without question to an asking for personal information  Click directly on a Web site provided in such an e- mail 8-17

Identity Theft 8-18

Pharming  Pharming 8-19

Privacy and Employees  Companies need information about their employees to run their business effectively  As of March 2005, 60% of employers monitored employee s  70% of Web traffic occurs during work hours  78% of employers reported abuse  60% employees admitted abuse 8-20

Privacy and Employees  Visiting inappropriate sites  Gaming, chatting, stock trading, social networking, etc. 8-21

Reasons for Monitoring  1.  2. 

Privacy and Consumers  Consumers want businesses to  Know who they are, but not to know too much  Provide what they want, but not gather information on them  Let them know about products, but not pester them with advertising 8-23

Cookies  Cookie 8-24

Spam  Spam  Gets past spam filters by 8-25

Adware and Spyware  Adware  Spyware (sneakware, stealthware) 8-26

Adware in Free Version of Eudora 8-27

Trojan Horse Software  Trojan horse software 8-28

Web Logs  Web log  Clickstream  Anonymous Web browsing (AWB) 8-29

Privacy and Government Agencies  About 2,000 government agencies have databases with information on people  Government agencies need information to operate effectively  Whenever you are in contact with government agency, you leave behind information about yourself 8-30

Government Agencies Storing Personal Information  Law enforcement  NCIC (National Crime Information Center)  FBI  Electronic Surveillance  Carnivore or DCS-1000  Magic Lantern (software key logger)  NSA (National Security Agency)  Echelon collect electronic information by satellite 8-31

Government Agencies Storing Personal Information  IRS  Census Bureau  Student loan services  FICA  Social Security Administration  Social service agencies  Department of Motor Vehicles 8-32

Laws on Privacy  Health Insurance Portability and Accountability Act (HIPAA) protects personal health information  Financial Services Modernization Act requires that financial institutions protect personal customer information  Other laws in Figure 8.6 on page

SECURITY AND EMPLOYEES  Attacks on information and computer resources come from inside and outside the company  Computer sabotage costs about $10 billion per year  In general, employee misconduct is more costly than assaults from outside 8-34

Security and Employees 8-35

Security and Outside Threats  Hackers  Computer virus (virus)  Worm  Denial-of-service (DoS) attack 8-36

Computer Viruses Can’t  1.  2. 

Security Measures 1. Anti-virus software 2. Anti-spyware and anti-adware software 3. Spam protection software – identifies and marks and/or deletes Spam 4. Anti-phishing software – lets you know when phishing attempts are being made 5. Firewall 8-38

Security Measures 5. Anti-rootkit software – stops outsiders taking control of your machine 6. Encryption 7. Public Key Encryption (PKE) 8. Biometrics 8-39