Chapter 9 Enhancing Information/Computer Security.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Ethics, Privacy and Information Security
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
Chapter 14 Social and Legal Issues. Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 2 Modern Private Security
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Chapter 11 Security and Privacy: Computers and the Internet.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
The Office Procedures and Technology
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
C8- Securing Information Systems
Unethical use of Computers and Networks
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 5 Our Criminal Laws Lesson 5-1 Criminal Law.
First Look at Security and Privacy Jeremiah Burleson.
Chapter 6 Enhancing Security Through Procedural Controls.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Chapter 5 Our Criminal Laws
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Topic 5: Basic Security.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Drill: Why might this be considered a crime?
Chap1: Is there a Security Problem in Computing?.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
CONTROLLING INFORMATION SYSTEMS
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Security and Ethics Safeguards and Codes of Conduct.
Computer Security Threats
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Securing Information Systems
Chapter 2 Modern Private Security
Add video notes to lecture
Hacking: public policy
LM 8 Data Administration & Database Administration
Societal Issues in Computing (COMP466)
INFORMATION SYSTEMS SECURITY and CONTROL
Database Security &Threats
Ethical Use of Computers
Accounting Information Systems & Computer Fraud
Presentation transcript:

Chapter 9 Enhancing Information/Computer Security

Valuable Proprietary Information  Specific threats to security of proprietary information include:  Employees.  Nondisclosure agreements.  Noncompete agreements.  Secrecy agreements.  Discarded information--in most states, garbage in dumpsters can be legally searched.  Unsecured telecommunication.  Acoustical surveillance.

Telecommunication Security  Telecommunication security includes information communicated by:  Voice, fax and computer.  Using wirelines, microwave links, satellite systems and fiberoptic lines.

Computer Crime Defined  Computer crime includes accessing a computer’s database without authorization or exceeding authorization for the purpose of sabotage or fraud.  It includes theft or destruction of software and hardware as well.

Seriousness of Computer Crime  Computer crimes cost hundreds of millions of dollars annually.  In fact, computer crime or failure might destroy a business.

Threats to Computer Centers  The greatest security threats to computer centers are:  Theft by fraud or embezzlement.  Hackers.  Sabotage.  Employee carelessness or error.  Fire.

Computer Crime Legislation  Most common offenses:  Access to defraud.  Access to obtain money.  Computer fraud.  Offenses against computer users.  Offenses against intellectual property.  Offenses against computer equipment and supplies.  Unauthorized access.  Unauthorized or unlawful computer use.

Electronic Communications Privacy Act of 1986  The Act makes it illegal to intentionally access, without authorization, a facility providing electronic communication services, or to intentionally exceed the authorization of access to such a facility.

Reducing Computer Crime Loss  Security measures for computer systems include:  Logical controls.  Physical access controls.  Administrative controls.  Protecting against fire.  Maintaining a backup system.

Investigating Computer Crime  Factors to consider in investigating computer crime include:  Investigator’s knowledge and whether outside expertise is required.  Likelihood of victim or an employee being involved.  The difficulty in detecting such crimes.

The Computer Criminal  The typical computer “criminal” is:  a young, middle-class technical person.  highly educated.  with no prior criminal record.  employed by the firm reporting the crime.

Prosecuting Perpetrators of Computer Crime  The chance of a computer criminal being caught and going to jail is approximately one in twenty-seven thousand.

Summary Questions  How can valuable proprietary information be obtained by competitors or criminals?  Can trash be legally searched by others?  What does telecommunications security involve?  What constitutes computer crime?  How serious is computer crime?  What are the greatest threats to computer centers?

Summary Questions  What legislation pertains to computer crime?  What security measures can be taken to reduce losses from computer crime?  What factors should be considered when investigating a computer crime?  Who is the typical computer criminal?  What is the probability of computer crime detection and the risk of prosecution?