Introduction to Computer Ethics

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
COMP427 Business Ethics. Objectives 1.To understand ethics and why its important in ways that are consistent with a code of principles. 2.Understand why.
Chapter 1 An Overview of Ethics
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Hands-On Ethical Hacking and Network Defense
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
Introduction to Computer Ethics
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
CYBER CRIME AND SECURITY TRENDS
Network security policy: best practices
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Professional Business Ethics © 2000 South-Western Educational Publishing Introduction to Business Ethics Ethics The principles of right and wrong that.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
ICS 434: Computer and Internet crime Aj. Thoranin Intarajak.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ICS424: Ethics for IT Professionals and IT Users
Professional Ethics in Information Technology By: Romel L. Emperado
PART THREE E-commerce in Action Norton University E-commerce in Action.
© 2007 Carnegie Mellon University Secure Coding Initiative Jason A. Rafail Monday, May 14 th, 2007.
Internet Security facilities for secure communication.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Purchasing Ethics and Vendor Relations
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
Security at NCAR David Mitchell February 20th, 2007.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
ETHICS, POLICY & SECURITY ISSUES
BUSINESS ETHICS Why is Business Ethics important in Business.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Juan Ortega 12/15/09 NTS355. Microsoft Security Advisory (977544) Vulnerability in SMB Could Allow Denial of Service Flaw on SMBv2 supposedly opened two.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Professional Ethics and Responsibilities Part-II
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Threats to computers Andrew Cormack UKERNA.
Chapter # 1 Overview of Ethics
1 Chapter Introduction 1st Week of the Semester.
Cyber Crimes Chunlian QU 9/18/2018.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Forensics Week 12.
David J. Carter, CISO Commonwealth Office of Technology
INFS 452 – Computer Ethics & Society
Chapter # 3 COMPUTER AND INTERNET CRIME
Chapter # 2 Ethics for IT workers & IT Users
Presentation transcript:

Introduction to Computer Ethics Text: George Reynolds, Ethics in Information Technology, Thomson Course Technology

What is Ethics? Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the moral code by which a society lives. Ethics is the set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms, many of which are almost universal. Virtues are habits that incline people to do what is acceptable, and vices are habits of unacceptable behavior People’s virtues and vices help define their value system – the complex scheme of moral values by which they live

Professional Codes of Ethics A professional code of ethics states the principles and core values that are essential to the work of a particular occupational group. Association of Computing Machinery ACM (founded 1947) has a code of ethics and professional conduct. See: http://www.acm.org/constitution/code.html Association of Information Technology Professionals AITP (founded 1996) – provides quality IT-related education, information on relevant IT issues, and forums for networking with experienced peers and other IT professionals. The AITP also has a code of ethics, see: http://www.aitp.org/join/SCOH17CodeEthicsStdsCdt.pdf

Professional Codes of Ethics Computer Society of the Institute of Electrical and Electronics Engineers (IEEE – CS) (founded in 1946). The Software Engineering Code of Ethics and Professional Practice: http://www.acm.org/serving/se/code.htm Project Management Institute (PMI) – established in 1969. PMI Member Code of Ethics: http://www.pmi.org/info/AP_MemEthStandards.pdf

Common Ethical Issues for IT Users Software Piracy: a common violation occurs when employees copy software from their work computers for use at home Inappropriate Use of Computing Resources: some employees use their work computers to surf popular Web sites that have nothing to do with their jobs. Inappropriate Sharing of Information

Supporting The Ethical Practices of IT Users Defining and Limiting the Appropriate Use of IT Resources Establishing Guidelines for Use of Company Software Structuring Information Systems to Protect Data and Information Installing and Maintaining a Corporate Firewall

Computer and Internet Crime IT Security Incidents The security of IT used in business is very important Although, the necessity of security is obvious, it often must be balanced against other business needs and issues

Ethical Decisions Regarding IT Security Business managers, IP professionals, and IT users all face a number of ethical decisions regarding IT security: If their firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low profile to avoid the negative publicity, must they inform their affected customers, or should they take some other actions? How much effort and money should be spent to safeguard against computer crime (how safe is safe enough?)

Ethical Decisions Regarding IT Security If their firm produces software with defects that allow hackers to attack customer data and computers, what actions should they take? What tactics should management ask employees to use to gather competitive intelligence without doing anything illegal? What should be done if recommended computer security safeguards make life more difficult for customers and employees, resulting in lost sales and increasing costs?

What could be done to deal with the increasing number of IT-related security incidents, not only in USA but around the world? To deal with the incidents, the Computer Emergency Response Team Coordination Center (CERT/CC) was established in 1988 at the Software Engineering Institute (SEI) – federally funded research and development center at Carnegie Mellon: Study Internet Security vulnerabilities Handle Computer Security Incidents Publish Security Alerts Research long-term changes in networked systems Develop information and training Conduct ongoing public awareness campaign FBI Cyber Program, Internet Crime Complaint Center http://www.fbi.gov/cyberinvest/cyberhome.htm

Some Statistics The number of security problems reported to CERT/CC grew between 1997 and 2003 from 2134 to 137,529 From 2004 the CERT/CC no longer publishes the number of incidents reported

Challenges Increases reliance on commercial software with known vulnerabilities: Exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often, this attack is due to poor system design or implementation. Once a vulnerability is discovered, software developers create and issue a “fix” or patch to eliminate the problem. Users are responsible for obtaining and installing the patch. Any delay in installing a patch exposes the user to a security breach. A rate of discovering software vulnerabilities exceeds 10 per day, creating a serious work overload for developers who are responsible for security fixes.

Challenges: Increases reliance on commercial software with known vulnerabilities: A zero-day attack take place BEFORE the security community or a software developer knows about a vulnerability or has been able to repair it. Malicious hackers are getting better and faster at exploiting flaws. The SQL Slammer worm appeared in January 2004, eight month after the vulnerability it targeted was disclosed:

Challenges: Increases reliance on commercial software with known vulnerabilities: In August 2005, the ZOTOB computer worm began targeting corporate networks that run Windows 2000, less than a week after Microsoft released a critical patch addressing the vulnerability In an attempt to avoid further attacks and the ultimate zero-day attack, computer security firms and software manufactures are paying hackers to identify vulnerabilities before they can be exploited.

Types of Attacks Security incidents can take many forms, but one of the most frequent is an attack on a networked computer from outside source. Most attacks involve: Viruses Worms Trojan Horses Denial – of – Service (DoS)