IT in Business Issues in Information Technology Lecture – 13.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 17 Controls and Security Measures
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Security Awareness: Applying Practical Security in Your World
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senn’s Information Technology, 3 rd Edition Chapter 14 Issues in Information.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Securing Information Systems
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
ACM 511 Introduction to Computer Networks. Computer Networks.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Security and Ethics Safeguards and Codes of Conduct.
CPT 123 Internet Skills Class Notes Internet Security Session B.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Computer Security Sample security policy Dr Alexei Vernitski.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
James A. Senn’s Information Technology, 3rd Edition
Securing Information Systems
Securing Information Systems
Add video notes to lecture
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
Computer Ethics.
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

IT in Business Issues in Information Technology Lecture – 13

2 Security What is Security? Breach: A breakdown in security. Security: Safeguarding and protecting an enterprise’s information technology assets. – Site Security – Resource Security – Network Security – Service Security

3 Security Definition Security Program: The policies and protective measures that will be used, the responsibilities of individuals involved in maintaining security, as well as the responsibilities of those who abide by established security policies. Harden: Designing a security program to a potential IT target, making the level of effort greater than the value of breaking into a system, network, or facility.

4 Security Types of Security Breach Intrusion: Forced and unauthorized entry into a system. Interception: Aimed at preventing the capture of data and information transmitted over an enterprise network or other communications link.

5 Security Results of Security Breach Destruction of Resources Corruption of Data and Applications Denial of Services Theft of Services Theft of Resources

6 Security Results of Security Breach (Continued) Denial-of-Services Attack: Depriving, usually intentionally and temporarily, an enterprise or its users of the services they would normally expect to have, usually involving a network service (such as ) or access to a location on the network (such as a Web site).

7 Security Sources of Security Breach Employees – Identify Theft: Loss of personal identity through a security breach. Hacker: A person who gains access to a system illegally.

8 Security Sources of Security Breach (Continued) Terrorist: Someone who conducts a “premeditated, politically motivated attack against information, computer systems, computer programs, and data, which results in violence against non-combatant targets by sub-national groups or clandestine agent.” – Cyber-terrorism: Terrorist attack on computer facilities in companies that rely on IT to produce their services.

9 Security Sources of Security Breach (Continued) Computer Viruses Virus: A hidden program that alters without the user’s knowledge, the way a computer operates or that modifies the data and programs stored on the computer.

10 Security Sources of Security Breach (Continued)

11 Security Security Measures General Security Policies and Procedures – Change access passwords frequently – Restrict system use – Limit access to data – Set up physical access controls – Partition responsibilities – Encrypt data – Establish procedural controls – Institute educational programs – Audit system activities – Log all transactions and user activities

12 Security Security Measures (Continued)

13 Security Security Measures (Continued) Virus Protection Software Digital Signatures – Digital Signature Encryption: Relies on a mathematical coding scheme designed to foil a virus’s attempt to attack programs and data. Encryption

14 Security Security Measures (Continued)

15 Security Methods of Encryption Public Key Infrastructure (PKI): A public key is made available in a directory that all parties can search. Thus a sender wishing to transmit a secured message searches a digital certificate directory to find the recipient’s public key, using it to encrypt the message. – Secure Electronic Transaction (SET): An adaptation of public key encryption and the digital certificate (which the industry calls an electronic wallet) for securing financial transactions over the Internet.

16 Security Methods of Encryption (Continued) Pretty Good Privacy (PGP): A program used to encrypt and decrypt and to encrypt digital signatures, so the recipient knows the transmission was not changed along the way. Virtual Private Network (VPN): A way to use a public telecommunication infrastructure, such as the Internet, to provide secure communication between individuals or client computers at remote locations and an enterprise network.

17 Security Methods of Encryption (Continued) Virtual Private Network – Tunneling Protocols: By encrypting data at the sending end and decrypting it at the receiving end, the protocols send the data (and if an enterprise chooses, the originating and receiving network addresses as well) through a tunnel that cannot be entered by data that is not properly encrypted.

18 Security Security Measures Firewall: A special-purpose software program located at a network gateway server. Proxy Server: Act as an intermediary between a PC and the Internet, separating an enterprise network from an outside network.

19 Security Security Measures

20 Security Security Measures

21 Security Security Measures

22 Security Security Measures

23 Reliability Definition Reliability: The assurance that computers and communications systems will do what they should when they should.

24 Reliability Ensuring IT Service Reliability Fault-tolerant Computer: A computer designed with duplicate components to ensure reliability. Uninterruptible Power Supply (UPS) System: A system that ensures the continued flow of electricity when the primary source of power fails. Disaster Recovery Plan: A procedure for restoring data lost when a system stops functioning.

25 Reliability Ensuring IT Service Reliability Off-site Backup Facility: A backup computer center located away from a company’s main facility. – Hot Site: A fully equipped backup computer center to which a company can take its backup copies of data and software and resume processing. – Cold Site: A backup facility outfitted with electrical power and environmental controls so that it is ready for a company to install a computer system.

26 Reliability Ensuring IT Service Reliability

27 Privacy What is Privacy? Privacy: In IT, the term used to refer to how personal information is collected, used, and protected.

28 Privacy Spam and Privacy Spam: Unsolicited . Opt-in /Permission-based If customers check a box agreeing to receive postings about the company’s products, they have actually given approval for the mailing.

29 Ethics Definition Ethics: The standards of conduct and moral behavior that people are expected to follow.

30 Ethics Ethics and IT Usage in Business Privacy Software Licenses Software Copyrights Hardware Access Intellectual Property Ownership File Access Data Ownership

31 Ethics An Ethics Challenge Developing a Code of Ethics – Informed Consent – The Higher Ethic – Most Restrictive Action – Kantian Universality Rule – Descartes’ Change in Rule – The Owner’s Conservative Rule – The User’s Conservative Rule

32 Ethics An Ethics Challenge Social Responsibility: The concept that businesses need to balance their commitments to investors, employees, customers, other businesses, and the communities in which they operate.

33 Digital Piracy Definition Digital Piracy: The making of illegal copies of copyrighted information.

34 Digital Piracy Protecting Against Software Piracy Software Piracy: The making of illegal copies of software. Software Copyright Protection – Copyright: Legal protection of original works against unauthorized use, including duplication. Copy Protection: A software protection scheme that defeats attempts to copy a program or makes the copies software unreliable.

35 Digital Piracy Protecting Against Software Piracy Software Site Licensing – Site License: An agreement under which a software purchaser pays a fee to the manufacturer to make a specified number of copies of a particular program.

36 Digital Piracy Public Domain Software Public Domain Software: Any non- copyrighted software that can be used by the general public. Shareware: Software that is given away and freely distributed. The developer retains ownership, asks users to register with the owner, and requests a nominal fee for using the program.

The End Thank You