Upload
vineet-dubey
View
2.973
Download
0
Embed Size (px)
Citation preview
Security and Ethical Challenges
Management Information Systems
Presented by:-Section-C (Group-8)
Varun Rai Sood (BM-010162)Vibhav Gupta (BM-010163)
Vijay Kr. Sharma (BM-010164)Vineet Kr. Dubey(BM-010165)
Security challenges
Computer crimes that exist in the present society are:-
Hacking
Cyber Theft
Unauthorized use at work
Software Piracy
Piracy of intellectual property
Computer viruses and worms
Hacking Hacking is the obsessive use of computers, or the
unauthorized access and use of networked computer systems. Hackers usually
Steal or damage data
Get unauthorized access to computer files
Monitor e-mails or web server access
May use remote services that allow one computer to execute programs on another
Plant data that will cause system to welcome intruders
Cyber Theft
Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.
Unauthorized use at WorkUnauthorized use of computer resources especially by
employees
Playing video games
Unauthorized use of internet
Non-work related upload/download
Transmission or confidential data
Moonlighting
Software Piracy
Unauthorized copying of data is called software piracy or software theft
Software is protected by copyright law and user license agreement that allows only limited copies to be made
Piracy of Intellectual Property
Materials other than software are also pirated by making multiple copies
Piracy of music, video, images, articles, books etc.
Dissemination of these material through internet websites
Computer viruses and wormsA virus is a program code that cannot work without being inserted
into another program
A worm is a distinct program that can run unaided
These programs copy annoying or destructive routines into the networked computer systems of anyone who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected computers
They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted external memory.
Privacy Issues
Privacy on the internet
Computer Matching
Privacy Laws
Computer libel and censorship (threats are spamming and flaming)
Other ChallengesEmployment challenges because a lot of tasks have been
automated
Computer monitoring causes intrusion in personal space for workers
Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs
Challenges to individuality as they eliminate the human relationships between people
Health issues
Cumulative trauma disorders
Carpal tunnel syndrome
Radiation caused by cathode ray tubes (CRTs) is also a health concern
BenefitsMedical diagnosis
Crime control
Environmental monitoring
Urban planning
Computer based training
Distance learning
Security management of ITEncryption
Firewalls
Denial of service attacks
E-mail monitoring
Virus defense
Security codes
Backup files
Security monitors
Biometric security
Computer failure controls
Fault tolerant systems
Disaster recovery
System controls and audits
Encryption
The concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations.
Password Authentication protocol
Challenge Handshake authentication Protocol
Extensible Authentication Protocol
Firewall
Firewalls are used to restrict access to one network from another network. Different types of firewalls exist.
Packet Filtering
Stateful firewalls
Proxy Firewalls
Kernel Proxy firewalls
Ethical responsibility of business professionals
Business ethics are concerned with
Equity
Rights
Honesty
Exercise of corporate power
Categories of Ethical Business Issues
Theories of corporate social responsibility
The stockholders theory holds that managers are agents of the stockholders and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent activities.
The social contract theory states that companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
The stakeholders theory states that managers have ethical responsibility to manage a firm for the benefit of all of its stakeholders i.e. stockholders, employees, customers, suppliers and local community.
Principles of technology ethics
Proportionality of benefits to risk
Informed consent to risks
Justice in distribution of risk with benefits derived to each subunit
Minimized risk by the selected option
Ethical guidelineActing with integrity
Increasing your professional competence
Setting high standards of personal performance
Accepting responsibility for your work
Advancing the health, privacy, and general welfare of the public
Case 1 Cyber scams and Cybercriminals
Cyber scams are today’s fastest-growing criminal niche87 percent of companies surveyed reported
a security incidentThe U.S. Federal Trade Commission says
identity theft is its top complainteBay has 60 people combating fraud;
Microsoft has 65Stolen credit card account numbers are
regularly sold online
Case StudyWhat are several reasons why “cyber scams are today’s fastest-growing
criminal niche”?Explain why the reasons you give contribute to the growth of cyber
scams
What are several security measures that could be implemented to combat the spread of cyber scams?Explain why your suggestions would be effective in limiting the
spread of cyber scams
Which one or two of the four top cybercriminals described in this case poses the greatest threat to businesses? To consumers?Explain the reasons for your choices, and how businesses and
consumers can protect themselves from these cyber scammers
Thank You