Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Ch.5 It Security, Crime, Compliance, and Continuity
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Security Issues and Ethics in Education
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Computer Skills and Applications Computer Security.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Computer Security By Duncan Hall.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MIS323 – Business Telecommunications Chapter 10 Security.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing Information Systems
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
CHAPTER 4 Information Security.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Information Copyright and Fair Use and Network Security
Chapter 9 E-Commerce Security and Fraud Protection
Networking for Home and Small Businesses – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Chapter 12 by Lisa Reeves Bertin Securing Information in a Network

Key Terms Defined Acceptable Use Antivirus Software Authentication Biometrics

Key Terms Defined Confidentiality Copyright Fair Use Firewall

Key Terms Defined Flash Drive Hacker Integrity Intrusion Detection Devices

Key Terms Defined Intrusion Detection System Jump Drive Malicious Code Malicious Insider

Key Terms Defined Mask Network Network Accessibility Network Availability

Key Terms Defined Network Security Password Proxy server Radio Frequency Identity Chip

Key Terms Defined Secure Information Security Breach Shoulder Surfing Social engineering

Key Terms Defined Spyware Thumb Drive Trojan Horse Virus Worm

Fair Use of Information and Sharing Understanding Copyright Laws Copyright Laws cover multiple items Being aware of restrictions Use of Backup Copies

Fair Use of Information and Sharing Technology Advances Illegal Internet Activity Internet Access and Health Care Organizations

Securing Network Information Linking of Computers Together Three Main Areas of Secure Network Information The Risks of Shoulder Surfing Implementing Acceptable Use Policy

Securing Network Information Building Employee Confidence Organizations Roles in Policy Employee Authentication Policy Enforcement

Authentication of Users The Role of ID Cards Available Devices Level of Security Needed Dictates Authentication

Threats to Security Computing Technology Industry Association The First Line of Defense Security Measures Limited Authorization

Threats to Security Additional Precautions Corporate Network Threats The Use of Spyware “Cookies”

Threats to Security The Negative of “Cookies” Spyware A Threat to Corporate Security Malicious Insiders

Threats to Security Tracking Employee Activity The Staffing Needs to Keep up With Security

Security Tools Tools to Protect the Organizational Network Needed Security Tools Software IM Software and Spam Mail Filters

Security Tools Firewalls Why Proxy Servers? What do Proxy Servers do?

Offsite Use of Portable Devices Off Site Uses of Portable Devices Virtual Private Network What a VPN does What is Essential Data

Offsite Use of Portable Devices Who is Responsible for Meeting Requirements? Lost or Stolen Devices The Department of Health and Human Services (2006)

Thought Provoking Questions 1. Jean, a diabetes nurse educator recently read an article in an online journal that she accessed through her health agency’s database subscription. The article provided a comprehensive checklist for managing diabetes in older adults that she prints and distributes to her patients in a diabetes education class. Does this constitute fair use or is this a copyright violation?

Thought Provoking Questions 2. Sue is a COPD clinic nurse enrolled in a Master’s education program. She is interested in writing a paper on the factors that are associated with poor compliance with medical regimens and associated re-hospitalization of COPD patients. She downloads patient information from the clinic database to a thumb drive that she later accesses on her home computer. Sue understands rules about privacy of information and believes that since she is a nurse and needs this information for a graduate school assignment that she is entitled to the information. Is Sue correct in her thinking?