19
SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF INFORMATION INFORMATION TECHNOLOGY TECHNOLOGY

Security And Ethical Challenges Of Infornation Technology

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Security And Ethical Challenges Of Infornation Technology

SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF

INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY

SECURITY AND ETHICAL SECURITY AND ETHICAL CHALLENGES OF CHALLENGES OF

INFORMATION INFORMATION TECHNOLOGYTECHNOLOGY

Page 2: Security And Ethical Challenges Of Infornation Technology

Objectives of Ethical challenges

• Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.

Page 3: Security And Ethical Challenges Of Infornation Technology

Ethical Ethical Responsibility

SecurityEthics andSociety

Employment Privacy

Health Crime

WorkingConditions

Individuality

Page 4: Security And Ethical Challenges Of Infornation Technology

What is Computer Crime ?

• The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources– Unauthorized release of information– Unauthorized copying of software

Page 5: Security And Ethical Challenges Of Infornation Technology

Types of Computer Crime

Hacking

UnauthorizedUse at work

CyberTheft

Piracy

ComputerViruses

Page 6: Security And Ethical Challenges Of Infornation Technology

Computer Crime (cont..)

• Hacking– The obsessive use of computers, or the unauthorized access

and use of networked computer systems• Cyber Theft

– Involves unauthorized network entry and the fraudulent alteration of computer databases

• Unauthorized use at work– Also called time and resource theft– May range from doing private consulting or personal

finances, to playing video games, to unauthorized use of the Internet on company networks

• Piracy of intellectual property– Other forms of intellectual property covered by copyright

laws• Music, Videos, Images, Articles, Books

• Software Piracy– Unauthorized copying of software

• Computer viruses and worms– Virus

• A program that cannot work without being inserted into another program

– Worm• A distinct program that can run unaided

Page 7: Security And Ethical Challenges Of Infornation Technology

Privacy Issues• Privacy issues are at the top of the list in regards

to ethical use of information. • Loss of control• Misuse of information• Risk to physical privacy• Risk of identity theft • Unwanted intrusions into daily life

• Privacy on the Internet– Users of the Internet are highly visible and open to

violations of privacy– Unsecured with no real rules– Cookies capture information about you every time you

visit a site– That information may be sold to third parties

• Privacy laws– Attempt to enforce the privacy of computer-based files

and communications– Electronic Communications Privacy Act– Computer Fraud and Abuse Act

Page 8: Security And Ethical Challenges Of Infornation Technology

Employment Challenges

Lost JobOpportunities

ComputerMonitoring

LostIndividuality

HealthIssues

WorkingConditions

EmploymentNew jobs

have been created and productivity

has increased, yet there

has been a significant

reduction in some types of jobs as a result of IT.

Page 9: Security And Ethical Challenges Of Infornation Technology

Other Challenges• Health Issues - Job stress - Muscle damage - Eye strain - Radiation exposure - Accidents

• Individuality– Computer-based systems criticized as

impersonal systems that dehumanize and depersonalize activities

• Working Conditions– IT has eliminated many monotonous,

obnoxious tasks, but has created others

Page 10: Security And Ethical Challenges Of Infornation Technology

Factors in the Workplace

Page 11: Security And Ethical Challenges Of Infornation Technology

Security Security ManagementManagement

Page 12: Security And Ethical Challenges Of Infornation Technology

Goal of Security Goal of Security ManagementManagement

– Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders

Page 13: Security And Ethical Challenges Of Infornation Technology

Security Measures

Encryption

Denial of ServiceDefenses

Fire Walls

MonitorE-mail

VirusDefenses

Page 14: Security And Ethical Challenges Of Infornation Technology

Security Measures (cont..)

SecurityCodes

SecurityMonitors

BackupFiles

BiometricSecurity Controls

Page 15: Security And Ethical Challenges Of Infornation Technology

Security Measures (cont..)

• Encryption– Passwords, messages, files, and other data is transmitted

in scrambled form and unscrambled for authorized users– Involves using special mathematical algorithms to

transform digital data in scrambled code– Most widely used method uses a pair of public and private

keys unique to each individual• Firewalls

– Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion

• Provides a filter and safe transfer point• Screens all network traffic for proper passwords or other

security codes• Denial of Service Defenses

– These assaults depend on three layers of networked computer systems

• Victim’s website• Victim’s ISP• Sites of “zombie” or slave computers

– Defensive measures and security precautions must be taken at all three levels

Page 16: Security And Ethical Challenges Of Infornation Technology

Security Measures (cont..)

• E-mail Monitoring– “Spot checks just aren’t good enough anymore. The

tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”

• Virus Defenses– Protection may accomplished through

• Centralized distribution and updating of antivirus software

• Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies

• Security codes– Multilevel password system

• Log onto the computer system, Gain access into the system, Access individual files

Page 17: Security And Ethical Challenges Of Infornation Technology

Security Measures (cont..)

• Backup Files– Duplicate files of data or programs– File retention measures– Sometimes several generations of files are kept for

control purposes

• Security Monitors– Programs that monitor the use of computer systems

and networks and protect them from unauthorized use, fraud, and destruction

• Biometric Security– Measure physical traits that make each individual

unique• Voice• Fingerprints• Hand geometry• Signature dynamics• Retina scanning• Face recognition and Genetic pattern analysis

Page 18: Security And Ethical Challenges Of Infornation Technology

System Controls and Audits

• Information System Controls– Methods and devices that attempt to

ensure the accuracy, validity, and propriety of information system activities

– Designed to monitor and maintain the quality and security of input, processing, and storage activities

• Auditing Business Systems– Review and evaluate whether proper and

adequate security measures and management policies have been developed and implemented

– Testing the integrity of an application’s audit trail

Page 19: Security And Ethical Challenges Of Infornation Technology

Thank Thank you…………!!!!!!!!!!you…………!!!!!!!!!!

Thank Thank you…………!!!!!!!!!!you…………!!!!!!!!!!

By : By :

RashmiRashmi

Ankit Ankit

Rohan Rohan

AkashAkash

SonaliSonali

SabanazSabanaz

ThakurdasThakurdas

Yashdeep Yashdeep