Security And Ethical Challenges Of Infornation Technology

Preview:

DESCRIPTION

 

Citation preview

SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF

INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY

SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF

INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY

Objectives of Ethical challenges

• Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.

Ethical Ethical Responsibility

SecurityEthics andSociety

Employment Privacy

Health Crime

WorkingConditions

Individuality

What is Computer Crime ?

• The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources– Unauthorized release of information– Unauthorized copying of software

Types of Computer Crime

Hacking

UnauthorizedUse at work

CyberTheft

Piracy

ComputerViruses

Computer Crime (cont..)

• Hacking– The obsessive use of computers, or the unauthorized access

and use of networked computer systems• Cyber Theft

– Involves unauthorized network entry and the fraudulent alteration of computer databases

• Unauthorized use at work– Also called time and resource theft– May range from doing private consulting or personal

finances, to playing video games, to unauthorized use of the Internet on company networks

• Piracy of intellectual property– Other forms of intellectual property covered by copyright

laws• Music, Videos, Images, Articles, Books

• Software Piracy– Unauthorized copying of software

• Computer viruses and worms– Virus

• A program that cannot work without being inserted into another program

– Worm• A distinct program that can run unaided

Privacy Issues• Privacy issues are at the top of the list in regards

to ethical use of information. • Loss of control• Misuse of information• Risk to physical privacy• Risk of identity theft • Unwanted intrusions into daily life

• Privacy on the Internet– Users of the Internet are highly visible and open to

violations of privacy– Unsecured with no real rules– Cookies capture information about you every time you

visit a site– That information may be sold to third parties

• Privacy laws– Attempt to enforce the privacy of computer-based files

and communications– Electronic Communications Privacy Act– Computer Fraud and Abuse Act

Employment Challenges

Lost JobOpportunities

ComputerMonitoring

LostIndividuality

HealthIssues

WorkingConditions

EmploymentNew jobs

have been created and productivity

has increased, yet there

has been a significant

reduction in some types of jobs as a result of IT.

Other Challenges• Health Issues - Job stress - Muscle damage - Eye strain - Radiation exposure - Accidents

• Individuality– Computer-based systems criticized as

impersonal systems that dehumanize and depersonalize activities

• Working Conditions– IT has eliminated many monotonous,

obnoxious tasks, but has created others

Factors in the Workplace

Security Security ManagementManagement

Goal of Security Goal of Security ManagementManagement

– Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders

Security Measures

Encryption

Denial of ServiceDefenses

Fire Walls

MonitorE-mail

VirusDefenses

Security Measures (cont..)

SecurityCodes

SecurityMonitors

BackupFiles

BiometricSecurity Controls

Security Measures (cont..)

• Encryption– Passwords, messages, files, and other data is transmitted

in scrambled form and unscrambled for authorized users– Involves using special mathematical algorithms to

transform digital data in scrambled code– Most widely used method uses a pair of public and private

keys unique to each individual• Firewalls

– Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion

• Provides a filter and safe transfer point• Screens all network traffic for proper passwords or other

security codes• Denial of Service Defenses

– These assaults depend on three layers of networked computer systems

• Victim’s website• Victim’s ISP• Sites of “zombie” or slave computers

– Defensive measures and security precautions must be taken at all three levels

Security Measures (cont..)

• E-mail Monitoring– “Spot checks just aren’t good enough anymore. The

tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”

• Virus Defenses– Protection may accomplished through

• Centralized distribution and updating of antivirus software

• Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies

• Security codes– Multilevel password system

• Log onto the computer system, Gain access into the system, Access individual files

Security Measures (cont..)

• Backup Files– Duplicate files of data or programs– File retention measures– Sometimes several generations of files are kept for

control purposes

• Security Monitors– Programs that monitor the use of computer systems

and networks and protect them from unauthorized use, fraud, and destruction

• Biometric Security– Measure physical traits that make each individual

unique• Voice• Fingerprints• Hand geometry• Signature dynamics• Retina scanning• Face recognition and Genetic pattern analysis

System Controls and Audits

• Information System Controls– Methods and devices that attempt to

ensure the accuracy, validity, and propriety of information system activities

– Designed to monitor and maintain the quality and security of input, processing, and storage activities

• Auditing Business Systems– Review and evaluate whether proper and

adequate security measures and management policies have been developed and implemented

– Testing the integrity of an application’s audit trail

Thank Thank you…………!!!!!!!!!!you…………!!!!!!!!!!

Thank Thank you…………!!!!!!!!!!you…………!!!!!!!!!!

By : By :

RashmiRashmi

Ankit Ankit

Rohan Rohan

AkashAkash

SonaliSonali

SabanazSabanaz

ThakurdasThakurdas

Yashdeep Yashdeep

Recommended