Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security and Ethics Privacy Employment Health Crime Working

Similar presentations


Presentation on theme: "Security and Ethics Privacy Employment Health Crime Working"— Presentation transcript:

1 Security and Ethics Privacy Employment Health Crime Working
Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphic to identify the universe of issues that surrounding business/IT security, ethics and society.

2 Security and Ethics Ethical Responsibility Business Ethics
Stockholder Theory Social Contract Theory Stakeholder Theory Begin the discussion of business ethics. Compare and contrast the three alternative theories of ethical obligations to the various constituencies in the business world.

3 Security and Ethics Ethical Responsibility
Use the text graphic to explain some of the ethical issues in the corporate world.

4 Security and Ethics Technology Ethics
Use the text graphic to describe the variables in the principles of technology ethics.

5 Security and Ethics Ethical Guidelines
Use the text graphic to describe and explain the AITP standards of professional conduct.

6 Privacy Issues Privacy on the Internet Right to Privacy
Acxiom, Inc. Challenges to Consumer Privacy Acxiom – 30 Years Amassing Massive Database Sells Data to Subscribers Use by Telemarketers and Credit Firms Introduce the concepts of privacy as it relates to systems and the Internet. Define privacy rights and explain why it is no jealousy guarded. The Acxiom, Inc. mini-case describes the immense volume of data this company possesses after thirty years of development. They sell their data to a wide variety of entities including telemarketers, credit firms, even government entities. The risk of exposure is quite significant.

7 Privacy Issues Right to Privacy Computer Profiling Computer Matching
Privacy Laws Computer Libel and Censorship Spamming Flaming Right to privacy issues should be discussed in view of system usage for profiling, matching and other legitimate uses as well as for negative applications that create enormous nuisance problems.

8 Privacy Issues Other Challenges Employment Challenges
Working Conditions Individuality Issues Health Issues Other challenges to privacy are discussed in the area of employment, individuality, and health issues.

9 Privacy Issues Ergonomics
Use the text graphic to explain ergonomic issues as they impact the user/operator. Cite examples of each where possible. This discussion continues on the next slide...

10 Security Management Security Technology Used Antivirus
96% Virtual Private Networks 86% Intrusion-Detection Systems 85% Content Filtering/Monitoring 77% PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphic to explain and contrast the security technologies in use today. Public-Key Infrastructure 45% Smart Cards 43% Biometrics 19%

11 Security Management Computer Crime Hacking Cyber Theft
Unauthorized Use of Work Piracy of Intellectual Property Computer Viruses and Worms Other forms of computer crime are addressed including hacking, unauthorized use of systems and copyright as well as computer viruses and worms.

12 Security Management Examples of Common Hacking
Use the text graphic to explain the common forms of system hacking.

13 Security Management Internet Abuses in the Workplace
Use the text graphic to define and discuss the nature of Internet abuses in the workplace.

14 Security Management Network Monitoring Software
Most firms use network monitoring software now to exert some control over their system use. The screen shot is an example of such network monitoring software.

15 Security Management Copying Music CDs: Intellectual Property Controversy RIAA Crack Down on Music Piracy Web Sites Fighting Back 140 Million Writable Drives In Use Billions of Blank CDs Sold While Music CD Sales Are Going Down Pirates Reluctant to Go Away The issue of this slide is one of copying music CDs violating intellectual property rights. A discussion is made of the recording industry association crack down on music piracy. Many Websites are fighting back altering techniques to try to avoid being caught. The case states that there are 140 million writable drives in use with billions of blank CDs sold while music CD sales are decreasing.

16 Security Management Facts About Recent Computer Viruses and Worms
Use the text graphic to explain the nature and consequences of the presence of worms and viruses. This discussion continues in a case on the next slide.

17 Security Management of Information Technology
Tools of Security Management Use the text graphic to outline the tools of security management that make up the balance of this chapter.

18 Security Management of Information Technology
Encryption Use the text graphic to conclude the discussion of public key/private key encryption for data security management purposes.

19 Security Management of Information Technology
Firewalls 1 External Firewall Blocks Outsiders 2 Internal Firewall Blocks Restricted Materials 3 4 5 Intranet Server Host System Use of Passwords and Browser Security 3 Firewall Performs Authentication and Encryption 4 Router Router 1 Careful Network Interface Design 5 PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphic to show how appropriately placed and configured firewalls can protect a system from Internet-based intrusion. 2 Internet Firewall 4 Intranet Server

20 Security Management of Information Technology
Defending Against Denial of Service Attacks Use the text graphic to discuss alternatives for defending against Denial of Service attacks.

21 Security Management of Information Technology
Other Security Measures Security Codes Multilevel Password System Smart Cards Backup Files Child, Parent, Grandparent Files System Security Monitors Biometric Security Other security measures are described including the use of security codes, passwords, smartcards, and biometic applications. Multiple backup redundancy is encouraged. The use of system security monitors provide another feedback in case of violation-and example is on the next slide.

22 Security Management of Information Technology
Evaluation of Biometric Security Use the text graphic to lead a discussion evaluating the effectiveness of biometric techniques.

23 Security Management of Information Technology
Computer Failure Controls Fault Tolerant Systems Fail-Over Fail-Safe Fail-Soft Disaster Recovery Discuss and define the alternative types of computer failure controls presented in the text. Stress the importance of a disaster recovery plan in case of crisis.

24 Security Management of Information Technology
Methods of Fault Tolerance Use the text graphic to describe the methods of fault tolerance. Emphasis the threats to each specific layer and the method used to protect the environment.

25 Systems Controls and Audits
Processing Controls Software Controls Hardware Controls Firewalls Checkpoints Input Controls Output Controls Security Codes Encryption Data Entry Screens Error Signals Control Totals Security Codes Encryption Control Totals Control Listings End User Feedback PATIENTLY ALLOW TIME FOR ANIMATIONS TO WORK Use the animated graphics to demonstrate where control systems exist and how they relate to each other. Storage Controls Security Codes Encryption Backup Files Library Procedures Database Administration


Download ppt "Security and Ethics Privacy Employment Health Crime Working"

Similar presentations


Ads by Google