Presentation is loading. Please wait.

Presentation is loading. Please wait.

11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

Similar presentations


Presentation on theme: "11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved."— Presentation transcript:

1 11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

2 Security and Ethical Challenges Ethical issues in the use of Information Technology Security Management Chapter 11 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.

3 11-3 Ethical Responsibility Business professionals have a responsibility to promote ethical uses of information technology in the workplace.

4 11-4 Computer Crime The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources The unauthorized release of information The unauthorized copying of software Denying an end user access to his or her own hardware, software, data, or network resources Using or conspiring to use computer or network resources illegally to obtain information or tangible property

5 11-5 Hacking The obsessive use of computers, Or the unauthorized access and use of networked computer systems

6 11-6 Cyber Theft Computer crime involving the theft of money Often inside jobs Or use Internet to break in

7 11-7 Unauthorized Use at Work Time and resource theft May range from doing private consulting or personal finances, or playing video games, to unauthorized use of the Internet on company networks

8 11-8 Internet Abuses in the Workplace General e-mail abuses Unauthorized usage and access Copyright infringement/plagiarism Newsgroup postings Transmission of confidential data Pornography – accessing sexually explicit sites Hacking Non-work related download or upload Leisure use of the Internet Usage of external ISPs Moonlighting

9 11-9 Software Piracy Unauthorized copying of computer programs Licensing Purchase of software is really a payment for a license for fair use Site license allow a certain number of copies A third of the software industry’s revenues are lost due to piracy

10 11-10 Theft of Intellectual Property Intellectual property Copyrighted material such as Music, videos, images, articles, books, software Copyright infringement is illegal Peer-to-peer networking techniques have made it easy to trade pirated intellectual property

11 11-11 Viruses and Worms Virus and worms copy annoying or destructive routines into networked computers Often spread via e-mail or file attachments Computer Virus Program code that cannot work without being inserted into another program Worm Distinct program that can run unaided

12 11-12 Cost of viruses and worms Nearly 115 million computers were infected in 2004 As many as 11 million computers are believed to be permanently infected Total economic damage estimated to be between $166 and $292 billion in 2004 Average damage per installed Windows-based machine is between $277 and $366

13 11-13 Adware and Spyware Adware Software that purports to serve a useful purpose But also allows Internet advertisers to display advertisements (pop-up and banner ads) Without the consent of the computer’s user Spyware Adware that employs the user’s Internet connection in the background without your permission or knowledge Captures information about you and sends it over the Internet

14 11-14 Protecting your Privacy on the Internet E-mail can be encrypted Newsgroup postings can be sent through anonymous remailers ISP can be asked not to sell your name and personal information to mailing list providers and other marketers Decline to reveal personal data and interests on online service and website user profiles

15 11-15 Privacy Laws Rules that regulate the collection and use of personal data by businesses and the government

16 11-16 Cyberlaw Laws intended to regulate activities over the Internet or via electronic data communications

17 11-17 Ergonomics Designing healthy work environments That are safe, comfortable, and pleasant for people to work in Thus increasing employee morale and productivity

18 11-18 Security Management The goal of security management is the accuracy, integrity, and safety of all information system processes and resources. Source: Courtesy of Wang Global.

19 11-19 Biometrics Computer devices that measure physical traits that make each individual unique Examples: Voice verification Fingerprints Retina scan

20 11-20 Computer Failure Controls Prevent computer failure or minimize its effects Preventative maintenance Arrange backups with a disaster recovery organization

21 11-21 Fault Tolerant Systems Systems that have redundant processors, peripherals, and software that provide a: Fail-over capability to back up components in the event of system failure Fail-safe capability where the computer system continues to operate at the same level even if there is a major hardware or software failure Fail-soft capability where the computer system continues to operate at a reduced but acceptable level in the event of system failure

22 11-22 Disaster Recovery Plan Formalized procedures to follow in the event a disaster occurs including: Which employees will participate What their duties will be What hardware, software, and facilities will be used Priority of applications that will be processed Use of alternative facilities Offsite storage of an organization’s databases

23 11-23 Information Systems Controls Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities

24 11-24 Auditing IT Security IT security audits By internal or external auditors Review and evaluate whether proper and adequate security measures and management policies have been developed and implemented


Download ppt "11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved."

Similar presentations


Ads by Google