Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting People and Information Threats and Safeguards

Similar presentations


Presentation on theme: "Protecting People and Information Threats and Safeguards"— Presentation transcript:

1 Protecting People and Information Threats and Safeguards
Chapter 8 Protecting People and Information Threats and Safeguards

2 Presentation Overview
Ethics Privacy Information Security

3 Opening Case Study Digital Destruction Beyond All Imagination
One of the lessons learned from 9/11 is that with careful and thorough protection of important information, not even a calamity like the one that occurred in New York can put you out of business. In what ways is information vulnerable and what can you do to protect important information?

4 Ethics Ethics - the _________ and standards that guide our behavior toward other people. Ethics depend on: Your basic ethical _________ , which you developed as you grew up. The set of practical _________ involved in the decision that you’re trying to make – that is, all the shades of gray in what are rarely black or white decisions.

5 Ethics Two Factors That Determine How You Decide Ethical Issues
Consequences _________ Likelihood of effect Time to _________ Relatedness Reach of result

6 Ethics Intellectual Property
_________ - intangible creative work that is embodied in physical form. Copyright - the legal protection afforded an expression of an idea. _________ - says that you may use copyrighted material in certain situations. _________ - the unauthorized use, duplication, distribution or sale of copyrighted software. _________ - software that is manufactured to look like the real thing and sold as such.

7 Privacy Privacy - the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

8 Privacy Privacy and Other Individuals
is completely insecure. Each you send results in at least 3 or 4 copies being stored on different computers.

9 Privacy Privacy and Employees
Companies need information about their employees and customers to be effective in the marketplace. In 2001, 63% of companies monitored employee Internet connections including about two-thirds of the 60 billion electronic messages sent by 40 million users.

10 Privacy Privacy and Consumers
Customers want businesses to: Know who they are, but they want them to leave them alone. _________ what they want, but they don’t want businesses knowing too much about their habits and preferences. Tell them about _________ and _________ they might like to have, but don’t want to be inundated with ads.

11 Privacy Privacy and Consumers
_________ - a small record deposited on your hard disk by a Web site containing information about you and your Web activities. _________ - software to generate ads that installs itself on your computer when you download some other (usually free) program from the Web. _________ - software you don’t want hidden inside software you do want.

12 Privacy Privacy and Consumers
Spyware (also called sneakware or stealthware) - software that comes hidden in _________ _________ software and tracks your online movements, mines the information stored on your computer, or uses your computer’s CPU and storage for some task you know nothing about.

13 Privacy Privacy and Government Agencies
Government agencies have about 2,000 databases containing personal information on individuals. For example, The National Crime Information Center (NCIC) database contains information on the criminal records of more than 20 million people. Team Work What Are The Biggest Internet Scams? (p. 387)

14 Privacy Privacy and International Trade
Safe-harbor principles - a set of rules to which U.S. businesses that want to trade with the European Union (EU) must adhere. On Your Own What’s Your Opinion? (p. 388)

15 Information Information as Raw Material
Raw materials are the _________ from which a product is made. Wood, glue, and screws are _________ materials for a chair. Almost everything you buy has _________ as part of the product. The most _________ companies place the highest value on information. ( branding )

16 Information Information as Capital
Capital is the _________ you use to produce a product or service. Buildings, trucks, and machinery are assets. Information is _________ since it is used by companies to provide products and services.

17 The Business Challenge
Security – The Business Challenge Who’s the bad guy? Competitors, foreign governments, network hackers, disgruntled ex-employees, news and media, unauthorized customers, employees, etc? How do I protect my information from the bad guys, without making employees and authorized users less productive? Outsiders 20% Insiders 80% How can I administer security consistently, reliably, and cost effectively across all of my distributed information resources ? Studies show 80% of real security problems are caused by authorized users

18 Security Security and Employees

19 Security Security and Collaboration Partners
If you use collaboration systems, representatives of other companies can gain access to your systems. _________ _________ - harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage.

20 Security Security and Outside Threats
85% of large companies and governmental agencies were broken into during 2002. _________ - very knowledgeable computer users who use their knowledge to invade other people’s computers.

21 What Is Hacking? Unauthorized or Unintended use of information Technology assets for… Personal gain Theft, fraud _________ Revenge

22 Why is hacking a problem?
Hacks mean business…and they hurt Corporate image Customer & Employee Privacy Real $$$$ often in millions

23 Security Threats Interruption _________ Modification Masquerade
Intranet has 3 separate components Secrecy Integrity Availability Participant Network

24 Security Security and Outside Threats
Computer virus (or simply a virus) - is software that is written with malicious intent to cause annoyance or damage. _________ - a type of virus that spreads itself, not just from file to file, but from computer to computer via and other Internet traffic. Denial-of-service attack (DoS) - floods a Web site with so many requests for service that it slows down or crashes.

25 Security Security and Outside Threats
Computer viruses can’t: _________ your hardware (i.e. monitors, printers, or processor.) _________ any files they weren’t designed to attack. Infect files on write-protected disks.

26 Security Security Precautions
Risk management - consists of the identification of risks, security implementation, and effective measures. Risk assessment - measure the risk exposure of IT assets. Risk assessment asks: What can go wrong? How likely is it to go wrong? What are the possible consequences if it does go wrong?

27 Security Security Precautions
Backup - making a copy of computer information. Anti-virus software - detects and removes viruses. Firewall – protects computers from intruders. _________ _________ _________ - looks for people on the network who shouldn’t be there. Security auditing software - checks out your computer or network for potential weaknesses.

28 _________ _________ _________ _________ _________.

29 Security Security Precautions
Biometrics - the use of physical characteristics to provide identification. Encryption – scrambles the contents of a file so that you can’t read it without having the decryption key. Public key encryption (PKE) - an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient. Generally, the study of measurable biological characteristics. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. There are several types of biometric identification schemes: face: the analysis of facial characteristics fingerprint: the analysis of an individual’s unique fingerprints hand geometry: the analysis of the shape of the hand and the length of the fingers retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the colored ring that surrounds the eye’s pupil signature: the analysis of the way a person signs his name. vein: the analysis of pattern of veins in the back if the hand and the wrist voice: the analysis of the tone, pitch, cadence and frequency of a person’s voice. Though the field is still in its infancy, many people believe that biometrics will play a critical role in future computers, and especially in electronic commerce. Personal computers of the future might include a fingerprint scanner where you could place your index finger. The computer would analyze your fingerprint to determine who you are and, based on your identity, authorize you different levels of access. Access levels could include the ability to use credit card information to make electronic purchases. The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.


Download ppt "Protecting People and Information Threats and Safeguards"

Similar presentations


Ads by Google