Security, Privacy, and Ethical Issues in Information Systems and the Internet - PowerPoint PPT Presentation

About This Presentation
Title:

Security, Privacy, and Ethical Issues in Information Systems and the Internet

Description:

Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9 Computer Crime Number of Incidents Reported to CERT Computer Crime and ... – PowerPoint PPT presentation

Number of Views:219
Avg rating:3.0/5.0
Slides: 35
Provided by: cmpeBoun3
Category:

less

Transcript and Presenter's Notes

Title: Security, Privacy, and Ethical Issues in Information Systems and the Internet


1
Security, Privacy, and Ethical Issues in
Information Systems and the Internet
  • Chapter 9

2
Computer Crime
3
Number of Incidents Reported to CERT
4
Computer Crime and Security Survey
5
The Computer as a Tool to Commit Crime
  • Social engineering Someone gives away the
    password to log into a certain computer
  • Dumpster diving Search information in garbage
    to break into computers
  • Identity theft Get personal information (SSN)
    started happening in Turkey as well
  • Cyberterrorism Attacking government computers to
    get across a point

6
Computers as Objects of Crime
  • Illegal access and use
  • Hackers are good at programming
  • Crackers (Criminal hackers) use programming
    skills to gain illegal access to a computer
    network or file.
  • Information and equipment theft (2nd to car
    theft)
  • Software and Internet piracy
  • Computer-related scams Nigerian lady
  • International computer crime

7
How to Respond to a Security Incident
8
Data Alteration and Destruction
  • Virus Attaches itself to other programs
  • Worm Independent program propagates on its own
  • Logic bomb Programmed to be activated at a
    certain time
  • Trojan horse Appears to be useful, but hides a
    destructive program

9
The Six Computer Incidents with the Greatest
Worldwide Economic Impact
10
Top Viruses July 2002
11
Preventing Computer-Related Crime
  • Crime prevention by state and federal agencies
  • Crime prevention by corporations
  • Public Key Infrastructure (PKI)
  • Biometrics
  • Anti-virus programs

12
Preventing Computer-Related Crime
  • Intrusion Detection Software
  • Managed Security Service Providers (MSSPs)
  • Internet Laws for Libel and Protection of Decency

13
Preventing Crime on the Internet
  • Develop effective Internet and security policies
  • Use a stand-alone firewall with network
    monitoring capabilities
  • Monitor managers and employees
  • Use Internet security specialists to perform
    audits

14
Common Methods Used to Commit Computer Crimes
15
How to Protect Your Corporate Data from Hackers
16
Antivirus Software
17
Privacy
18
Privacy Issues
  • Privacy and the Federal Government
  • Privacy at work
  • E-mail privacy
  • Privacy and the Internet

19
The Right to Know and the Ability to Decide
20
Federal Privacy Laws and Provisions
21
The Work Environment
22
Health Concerns
  • Repetitive stress injury (RSI)
  • Repetitive motion disorder
  • Carpal tunnel syndrome (CTS)
  • Ergonomics

23
Avoiding Health and Environment Problems
  • Maintain good posture and positioning.
  • Do not ignore pain or discomfort.
  • Use stretching and strengthening exercises.
  • Find a good physician who is familiar with RSI
    and how to treat it.
  • After treatment, start back slowly and pace
    yourself.

24
Medical Topics on the Internet
25
Computer Waste Mistakes
26
Social Issues in Information Systems
27
Computer Waste
  • Discard technology
  • Unused systems
  • Personal use of corporate time and technology

28
Preventing Computer Waste and Mistakes
  • Establish Policies and Procedures
  • Implement Policies and Procedures
  • Monitor Policies and Procedures
  • Review Policies and Procedures

29
Types of Computer-Related Mistakes
30
Useful Policies to Eliminate Waste and Mistakes
31
Summary
  • Computer waste - the inappropriate use of
    computer technology and resources in both the
    public and private sectors
  • Identity theft - a crime in which an imposter
    obtains key pieces of personal identification
    information in order to impersonate someone else
  • Software and Internet piracy - represent the most
    common computer crime

32
Principles and Learning Objectives
  • Policies and procedures must be established to
    avoid computer waste and mistakes.
  • Describe some examples of waste and mistakes in
    an IS environment, their causes, and possible
    solutions.
  • Identify policies and procedures useful in
    eliminating waste and mistakes.

33
Principles and Learning Objectives
  • Computer crime is a serious and rapidly growing
    area of concern requiring management attention.
  • Explain the types and effects of computer crime.
  • Identify specific measures to prevent computer
    crime.
  • Discuss the principles and limits of an
    individuals right to privacy.

34
Principles and Learning Objectives
  • Jobs, equipment, and working conditions must be
    designed to avoid negative health effects.
  • List the important effects of computers on the
    work environment.
  • Identify specific actions that must be taken to
    ensure the health and safety of employees.
Write a Comment
User Comments (0)
About PowerShow.com