23
Security and Ethical Challenges Management Information Systems Presented by:- Section-C (Group-8) Varun Rai Sood (BM-010162) Vibhav Gupta (BM-010163) Vijay Kr. Sharma (BM-010164) Vineet Kr. Dubey(BM-010165)

security and ethical challenges

Embed Size (px)

Citation preview

Page 1: security and ethical challenges

Security and Ethical Challenges

Management Information Systems

Presented by:-Section-C (Group-8)

Varun Rai Sood (BM-010162)Vibhav Gupta (BM-010163)

Vijay Kr. Sharma (BM-010164)Vineet Kr. Dubey(BM-010165)

Page 2: security and ethical challenges

Security challenges

Computer crimes that exist in the present society are:-

Hacking

Cyber Theft

Unauthorized use at work

Software Piracy

Piracy of intellectual property

Computer viruses and worms

Page 3: security and ethical challenges

Hacking Hacking is the obsessive use of computers, or the

unauthorized access and use of networked computer systems. Hackers usually

Steal or damage data

Get unauthorized access to computer files

Monitor e-mails or web server access

May use remote services that allow one computer to execute programs on another

Plant data that will cause system to welcome intruders

Page 4: security and ethical challenges

Cyber Theft

Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.

Page 5: security and ethical challenges

Unauthorized use at WorkUnauthorized use of computer resources especially by

employees

Playing video games

Unauthorized use of internet

Non-work related upload/download

Transmission or confidential data

Moonlighting

Page 6: security and ethical challenges

Software Piracy

Unauthorized copying of data is called software piracy or software theft

Software is protected by copyright law and user license agreement that allows only limited copies to be made

Page 7: security and ethical challenges

Piracy of Intellectual Property

Materials other than software are also pirated by making multiple copies

Piracy of music, video, images, articles, books etc.

Dissemination of these material through internet websites

Page 8: security and ethical challenges

Computer viruses and wormsA virus is a program code that cannot work without being inserted

into another program

A worm is a distinct program that can run unaided

These programs copy annoying or destructive routines into the networked computer systems of anyone who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected computers

They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted external memory.

Page 9: security and ethical challenges

Privacy Issues

Privacy on the internet

Computer Matching

Privacy Laws

Computer libel and censorship (threats are spamming and flaming)

Page 10: security and ethical challenges

Other ChallengesEmployment challenges because a lot of tasks have been

automated

Computer monitoring causes intrusion in personal space for workers

Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs

Challenges to individuality as they eliminate the human relationships between people

Page 11: security and ethical challenges

Health issues

Cumulative trauma disorders

Carpal tunnel syndrome

Radiation caused by cathode ray tubes (CRTs) is also a health concern

Page 12: security and ethical challenges

BenefitsMedical diagnosis

Crime control

Environmental monitoring

Urban planning

Computer based training

Distance learning

Page 13: security and ethical challenges

Security management of ITEncryption

Firewalls

Denial of service attacks

E-mail monitoring

Virus defense

Security codes

Backup files

Security monitors

Biometric security

Computer failure controls

Fault tolerant systems

Disaster recovery

System controls and audits

Page 14: security and ethical challenges

Encryption

The concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations.

Password Authentication protocol

Challenge Handshake authentication Protocol

Extensible Authentication Protocol

Page 15: security and ethical challenges

Firewall

Firewalls are used to restrict access to one network from another network. Different types of firewalls exist.

Packet Filtering

Stateful firewalls

Proxy Firewalls

Kernel Proxy firewalls

Page 16: security and ethical challenges

Ethical responsibility of business professionals

Business ethics are concerned with

Equity

Rights

Honesty

Exercise of corporate power

Page 17: security and ethical challenges

Categories of Ethical Business Issues

Page 18: security and ethical challenges

Theories of corporate social responsibility

The stockholders theory holds that managers are agents of the stockholders and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent activities.

The social contract theory states that companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract

The stakeholders theory states that managers have ethical responsibility to manage a firm for the benefit of all of its stakeholders i.e. stockholders, employees, customers, suppliers and local community.

Page 19: security and ethical challenges

Principles of technology ethics

Proportionality of benefits to risk

Informed consent to risks

Justice in distribution of risk with benefits derived to each subunit

Minimized risk by the selected option

Page 20: security and ethical challenges

Ethical guidelineActing with integrity

Increasing your professional competence

Setting high standards of personal performance

Accepting responsibility for your work

Advancing the health, privacy, and general welfare of the public

Page 21: security and ethical challenges

Case 1 Cyber scams and Cybercriminals

Cyber scams are today’s fastest-growing criminal niche87 percent of companies surveyed reported

a security incidentThe U.S. Federal Trade Commission says

identity theft is its top complainteBay has 60 people combating fraud;

Microsoft has 65Stolen credit card account numbers are

regularly sold online

Page 22: security and ethical challenges

Case StudyWhat are several reasons why “cyber scams are today’s fastest-growing

criminal niche”?Explain why the reasons you give contribute to the growth of cyber

scams

What are several security measures that could be implemented to combat the spread of cyber scams?Explain why your suggestions would be effective in limiting the

spread of cyber scams

Which one or two of the four top cybercriminals described in this case poses the greatest threat to businesses? To consumers?Explain the reasons for your choices, and how businesses and

consumers can protect themselves from these cyber scammers

Page 23: security and ethical challenges

Thank You