Ethical and Social...J.M.Kizza1 Module 4: Anonymity, Security and Privacy  Introduction  Anonymity  Security  Privacy  Ethical and Social Issues.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Computer and Network Security Mini Lecture by Milica Barjaktarovic.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Today’s Strategic Imperative: E-Business Annika Burton Matt Richardson Shantell Howard.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Chapter 10 Privacy and Security McGraw-Hill
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
MJ10/07041 Session 10 Accounting, Security Management Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Discovering Computers 2010
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Anonymity, Security, Privacy and Civil Liberties
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
Security and Privacy Strategic Global Partners, LLC.
Ethical and Social...J.M.Kizza 1 Module 12: New Frontiers for Computer Ethics: Cyberspace Introduction Cyberspace and the Concepts of Telepresence and.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Information Security What is Information Security?
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
Module 11: Designing Security for Network Perimeters.
Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.
Information Security in Distributed Systems Distributed Systems1.
Lesson 15 : Networks And The Internet
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Chapter 9 Networking & Distributed Security (Part C)
Ethical and Social...J.M.Kizza1 Module 9: Ethical and Social Issues in Cyberspace  Cyberspace Access  Intellectual Property Rights  Cyberspace Censorship.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Network Security and Cryptography
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Information Security and Privacy in HRIS
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Privacy and the Law.
CHAPTER FOUR OVERVIEW SECTION ETHICS
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Network security threats
Year 10 ICT ECDL/ICDL IT Security.
COMPUTER PRIVACY.
ISMS Information Security Management System
Modern Windows 10 device 12/2/2018 E3 E3 P E3 P P P P E3 E3 P P P P P
Chapter 1 – Information Security Overview
CHAPTER FOUR OVERVIEW SECTION ETHICS
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
Mohammad Alauthman Computer Security Mohammad Alauthman
Woodland Hills School District
Presentation transcript:

Ethical and Social...J.M.Kizza1 Module 4: Anonymity, Security and Privacy  Introduction  Anonymity  Security  Privacy  Ethical and Social Issues

Ethical and Social...J.M.Kizza2 Introduction  Information has increased in value  The demand for information is high  The danger for misuse is real

Ethical and Social...J.M.Kizza3 Anonymity  Absence of identity  There are two types of identity: –Pseudo –Untraceable  Anonymity on the Internet – –Other postings

Ethical and Social...J.M.Kizza4 Security  Means to prevent unauthorized access  Consists of: –Confidentiality –Integrity –Availability  Physical security – guaranteed by: –Deterrence –Prevention –Detection –Response

Ethical and Social...J.M.Kizza5 Security…  Perimeter security –Fence –Dog –Guards  Firewalls –Proxy –Filter –Gateways  Passwords

Ethical and Social...J.M.Kizza6 Information Security  Encryption –Plaintext –Ciphertext –Encryption standards RSA DES PEMS PGP  Authentication –Authentication Methods (see page 55)

Ethical and Social...J.M.Kizza7 Privacy  Human value consists of: –Right to control external influences on individual information: Solitude - right to be alone Anonymity – right to have no public identity Intimacy – right not to be monitored –Right to control personal information: Reserve – right to control one’s information

Ethical and Social...J.M.Kizza8 Value of Privacy  Safeguard individual identity  Preserve individual autonomy in decision- making –Less known information,more autonomy  Support social relationships  Worthiness

Ethical and Social...J.M.Kizza9 Privacy Violations  Intrusion – wrongful entry ( hacking)  Misuse of information –we involuntarily give off personal information –businesses collect it  Interception of information – eavesdropping  Surveillence –Echelon  Information matching using unrelated databases - usually illegally

Ethical and Social...J.M.Kizza10 Privacy Protection  Is it possible?  Through legal instruments like Acts and statutes (see pp. 50 –60)  Through individual efforts ( be vigilant)

Ethical and Social...J.M.Kizza11 Ethical and Social Issues  The ethics of privacy  The ethics of security