Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT...

Preview:

Citation preview

Security and EthicsSecurity and Ethics

Employment

Health

Individuality

Privacy

WorkingConditions

CrimeBusiness/IT

SecurityEthics and

Society

Security and EthicsSecurity and Ethics

• Business Ethics• Stockholder Theory• Social Contract Theory• Stakeholder Theory

Ethical ResponsibilityEthical Responsibility

Security and EthicsSecurity and Ethics

Ethical ResponsibilityEthical Responsibility

Security and EthicsSecurity and Ethics

Technology EthicsTechnology Ethics

Security and EthicsSecurity and EthicsEthical GuidelinesEthical Guidelines

Right to PrivacyRight to Privacy

Privacy on the InternetAcxiom, Inc. Challenges to Acxiom, Inc. Challenges to

Consumer PrivacyConsumer Privacy• Acxiom – 30 Years Amassing

Massive Database• Sells Data to Subscribers• Use by Telemarketers and Credit

Firms

Privacy IssuesPrivacy Issues

Right to PrivacyRight to Privacy

• Computer Profiling• Computer Matching• Privacy Laws• Computer Libel and Censorship• Spamming• Flaming

Privacy IssuesPrivacy Issues

Other ChallengesOther Challenges

• Employment Challenges

• Working Conditions

• Individuality Issues

• Health Issues

Privacy IssuesPrivacy Issues

ErgonomicsErgonomics

Privacy IssuesPrivacy Issues

Antivirus 96%

Virtual Private Networks86%

Intrusion-Detection Systems85%

Content Filtering/Monitoring77%

Public-Key Infrastructure 45%

Smart Cards43%

Biometrics19%

Security Technology UsedSecurity Technology UsedSecurity ManagementSecurity Management

Computer CrimeComputer Crime

• Hacking• Cyber Theft• Unauthorized Use of Work• Piracy of Intellectual Property• Computer Viruses and Worms

Security ManagementSecurity Management

Examples of Common HackingExamples of Common HackingSecurity ManagementSecurity Management

Internet Abuses in the WorkplaceInternet Abuses in the Workplace

Security Management

Network Monitoring SoftwareNetwork Monitoring Software

Security ManagementSecurity Management

Copying Music CDs: Intellectual Copying Music CDs: Intellectual Property ControversyProperty Controversy

• RIAA Crack Down on Music Piracy• Web Sites Fighting Back• 140 Million Writable Drives In Use• Billions of Blank CDs Sold While

Music CD Sales Are Going Down• Pirates Reluctant to Go Away

Security ManagementSecurity Management

Facts About Recent Computer Facts About Recent Computer Viruses and WormsViruses and Worms

Security ManagementSecurity Management

Tools of Security ManagementTools of Security Management

Security Management of Information Technology

EncryptionEncryption

Security Management of Security Management of Information TechnologyInformation Technology

FirewallsFirewalls

Security Management of Security Management of Information TechnologyInformation Technology

Firewall

IntranetServer

Firewall

Router Router

IntranetServer

Host System

Internet

1

2

3

4

4 5

1 External FirewallBlocks Outsiders

2 Internal FirewallBlocks Restricted Materials

3 Use of Passwords and Browser Security

4 Performs Authentication and Encryption

5 Careful Network Interface Design

Defending Against Denial of Defending Against Denial of Service AttacksService Attacks

Security Management of Security Management of Information TechnologyInformation Technology

Other Security MeasuresOther Security Measures

Security Management of Security Management of Information TechnologyInformation Technology

• Security Codes• Multilevel Password System

– Smart Cards• Backup Files

– Child, Parent, Grandparent Files• System Security Monitors• Biometric Security

Evaluation of Biometric SecurityEvaluation of Biometric Security

Security Management of Security Management of Information TechnologyInformation Technology

Computer Failure ControlsComputer Failure Controls

Security Management of Security Management of Information TechnologyInformation Technology

• Fault Tolerant Systems–Fail-Over–Fail-Safe–Fail-Soft

• Disaster Recovery

Methods of Fault ToleranceMethods of Fault Tolerance

Security Management of Security Management of Information TechnologyInformation Technology

Systems Controls and Systems Controls and AuditsAudits

Security CodesEncryption

Data Entry ScreensError Signals

Control Totals

Security CodesEncryption

Control TotalsControl Listings

End User Feedback

Security CodesEncryption

Backup FilesLibrary Procedures

Database Administration

InputControls

OutputControls

StorageControls

ProcessingControls

Software ControlsHardware Controls

FirewallsCheckpoints