Title: Security, Privacy, and Ethical Issues in Information Systems and the Internet
1Security, Privacy, and Ethical Issues in
Information Systems and the Internet
2Computer Crime
3 Number of Incidents Reported to CERT
4Computer Crime and Security Survey
5The Computer as a Tool to Commit Crime
- Social engineering Someone gives away the
password to log into a certain computer - Dumpster diving Search information in garbage
to break into computers - Identity theft Get personal information (SSN)
started happening in Turkey as well - Cyberterrorism Attacking government computers to
get across a point
6Computers as Objects of Crime
- Illegal access and use
- Hackers are good at programming
- Crackers (Criminal hackers) use programming
skills to gain illegal access to a computer
network or file. - Information and equipment theft (2nd to car
theft) - Software and Internet piracy
- Computer-related scams Nigerian lady
- International computer crime
7 How to Respond to a Security Incident
8Data Alteration and Destruction
- Virus Attaches itself to other programs
- Worm Independent program propagates on its own
- Logic bomb Programmed to be activated at a
certain time - Trojan horse Appears to be useful, but hides a
destructive program
9 The Six Computer Incidents with the Greatest
Worldwide Economic Impact
10 Top Viruses July 2002
11Preventing Computer-Related Crime
- Crime prevention by state and federal agencies
- Crime prevention by corporations
- Public Key Infrastructure (PKI)
- Biometrics
- Anti-virus programs
12Preventing Computer-Related Crime
- Intrusion Detection Software
- Managed Security Service Providers (MSSPs)
- Internet Laws for Libel and Protection of Decency
13Preventing Crime on the Internet
- Develop effective Internet and security policies
- Use a stand-alone firewall with network
monitoring capabilities - Monitor managers and employees
- Use Internet security specialists to perform
audits
14 Common Methods Used to Commit Computer Crimes
15 How to Protect Your Corporate Data from Hackers
16Antivirus Software
17Privacy
18Privacy Issues
- Privacy and the Federal Government
- Privacy at work
- E-mail privacy
- Privacy and the Internet
19 The Right to Know and the Ability to Decide
20 Federal Privacy Laws and Provisions
21The Work Environment
22Health Concerns
- Repetitive stress injury (RSI)
- Repetitive motion disorder
- Carpal tunnel syndrome (CTS)
- Ergonomics
23Avoiding Health and Environment Problems
- Maintain good posture and positioning.
- Do not ignore pain or discomfort.
- Use stretching and strengthening exercises.
- Find a good physician who is familiar with RSI
and how to treat it. - After treatment, start back slowly and pace
yourself.
24 Medical Topics on the Internet
25Computer Waste Mistakes
26Social Issues in Information Systems
27Computer Waste
- Discard technology
- Unused systems
- Personal use of corporate time and technology
28Preventing Computer Waste and Mistakes
- Establish Policies and Procedures
- Implement Policies and Procedures
- Monitor Policies and Procedures
- Review Policies and Procedures
29 Types of Computer-Related Mistakes
30 Useful Policies to Eliminate Waste and Mistakes
31Summary
- Computer waste - the inappropriate use of
computer technology and resources in both the
public and private sectors - Identity theft - a crime in which an imposter
obtains key pieces of personal identification
information in order to impersonate someone else - Software and Internet piracy - represent the most
common computer crime
32Principles and Learning Objectives
- Policies and procedures must be established to
avoid computer waste and mistakes. - Describe some examples of waste and mistakes in
an IS environment, their causes, and possible
solutions. - Identify policies and procedures useful in
eliminating waste and mistakes.
33Principles and Learning Objectives
- Computer crime is a serious and rapidly growing
area of concern requiring management attention. - Explain the types and effects of computer crime.
- Identify specific measures to prevent computer
crime. - Discuss the principles and limits of an
individuals right to privacy.
34Principles and Learning Objectives
- Jobs, equipment, and working conditions must be
designed to avoid negative health effects. - List the important effects of computers on the
work environment. - Identify specific actions that must be taken to
ensure the health and safety of employees.