Comp Crimes Ethics Security

Embed Size (px)

Citation preview

  • 7/30/2019 Comp Crimes Ethics Security

    1/26

    Information Systems Ethics,

    Computer Crime, and

    Security

  • 7/30/2019 Comp Crimes Ethics Security

    2/26

    Chapter 9 Objectives

    Understand how computer ethics affects

    IS

    Understand information privacy, accuracy,

    property, and accessibility

    Understand types of computer crime

    Understand the terms virus, worm, Trojanhorse, and logic or time bomb

    Understand computer security

  • 7/30/2019 Comp Crimes Ethics Security

    3/26

  • 7/30/2019 Comp Crimes Ethics Security

    4/26

    Information Systems Ethics

    Computer Literacy Knowing how to use a computer

    Digital Divide

    That gap between those with computer access andthose who dont have it

    Computer Ethics Standards of conduct as they pertain to the use of

    information systems

  • 7/30/2019 Comp Crimes Ethics Security

    5/26

    Information Systems Ethics

    Privacy Protecting ones personal information

    Identity theft Stealing of anothers social security number, credit

    card number, or other personal information

  • 7/30/2019 Comp Crimes Ethics Security

    6/26

    Information Systems Ethics

    Information accuracy Deals with authentication and fidelity of information

    Information property Deals with who owns information about individuals

    and how information can be sold and exchanged

  • 7/30/2019 Comp Crimes Ethics Security

    7/26

  • 7/30/2019 Comp Crimes Ethics Security

    8/26

    Information Systems Ethics

    Information accessibility Deals with what information a person has the right to

    obtain about others and how the information can be used

    Issues in information accessibility Carnivore: software application designed to be connected

    to Internet Service Providers computers and eavesdrops

    on all communications.

    Electronic Communications Privacy Act (ECPA): it offered

    stronger support for voice mail than it did for e-mail. No

    other laws at federal or state levels protect e-mail privacy

    Monitoring e-mail

  • 7/30/2019 Comp Crimes Ethics Security

    9/26

    Information Systems Ethics

    The need for a code of ethical conduct Business ethics

    Plagiarism

    Cybersquatting: registering a domain name andthen trying to sell the name for big bucks to a

    person, company. Domain names are a scarce

    resource one of the few scarce resources in

    cyberspace

  • 7/30/2019 Comp Crimes Ethics Security

    10/26

    Computer Crime

    Definition: the act of using a computer tocommit an illegal act Authorized and unauthorized computer access

    Examples Stealing time on company computers

    Breaking into government Web sites

    Stealing credit card information

  • 7/30/2019 Comp Crimes Ethics Security

    11/26

    Computer Crime

    Federal and State Laws Stealing or compromising data

    Gaining unauthorized computer access

    Violating data belonging to banks Intercepting communications

    Threatening to damage computer systems

    Disseminating viruses

  • 7/30/2019 Comp Crimes Ethics Security

    12/26

    Computer Crime

    Hacking and Cracking Hacker one who gains unauthorized computer

    access, but without doing damage

    Cracker one who breaks into computer systems

    for the purpose of doing damage

  • 7/30/2019 Comp Crimes Ethics Security

    13/26

    Computer Crime Who commits computer crime?

  • 7/30/2019 Comp Crimes Ethics Security

    14/26

    Computer Crime

    Types of computer crime Data diddling: modifying data

    Salami slicing: skimming small amounts of money

    Phreaking: making free long distance calls

    Cloning: cellular phone fraud using scanners

    Carding: stealing credit card numbers online

    Piggybacking: stealing credit card numbers by spying

    Social engineering: tricking employees to gain access

    Dumpster diving: finding private info in garbage cans Spoofing: stealing passwords through a false login page

  • 7/30/2019 Comp Crimes Ethics Security

    15/26

    Computer Crime

    Software piracy North America 25%

    Western Europe 34%

    Asia / Pacific 51%

    Mid East / Africa 55%

    Latin America 58%

    Eastern Europe 63%

  • 7/30/2019 Comp Crimes Ethics Security

    16/26

    Computer Crime

    Computer viruses and destructive code Virus a destructive program that disrupts the normal

    functioning of computer systems

    Types:

    Worm: usually does not destroy files; copies itself

    Trojan horses: Activates without being detected;

    does not copy itself

    Logic or time bombs: A type of Trojan horse thatstays dormant for a period of time before activating

  • 7/30/2019 Comp Crimes Ethics Security

    17/26

    Computer Security

    Computer Security precautions taken to

    keep computers and the information they

    contain safe from unauthorized access

  • 7/30/2019 Comp Crimes Ethics Security

    18/26

    Computer Security

    Recommended Safeguards Implement a security plan to prevent break-ins

    Have a plan if break-ins do occur

    Make backups!

    Only allow access to key employees Change passwords frequently

    Keep stored information secure

    Use antivirus software

    Use biometrics for access to computing resources

    Hire trustworthy employees

  • 7/30/2019 Comp Crimes Ethics Security

    19/26

    Computer Security

    Encryption the process of encodingmessages before they enter the network or

    airwaves, then decoding them at the

    receiving end of the transfer

  • 7/30/2019 Comp Crimes Ethics Security

    20/26

  • 7/30/2019 Comp Crimes Ethics Security

    21/26

    Computer Security

    Other encryption approaches Pretty good privacy (PGP)

    Phil Zimmerman

    Clipper Chip: a chip that could generate uncrackable codes.

    There was a flaw.

  • 7/30/2019 Comp Crimes Ethics Security

    22/26

    Computer Security Internet Security

    Firewall hardware and software designed to keep

    unauthorized users out of network systems

  • 7/30/2019 Comp Crimes Ethics Security

    23/26

    Computer Security

  • 7/30/2019 Comp Crimes Ethics Security

    24/26

    Computer Security

    Virus prevention Install antivirus software

    Make backups

    Avoid unknown sources of shareware Delete e-mails from unknown sources

    If your computer gets a virus

  • 7/30/2019 Comp Crimes Ethics Security

    25/26

    Computer Security

    How to maintain your privacy online Choose Web sites monitored by privacy advocates

    Avoid cookies

    Visit sites anonymously Use caution when requesting confirming e-mail

  • 7/30/2019 Comp Crimes Ethics Security

    26/26

    Computer Security

    Avoid getting conned in cyberspace Internet auctions

    Internet access

    International modem dialing

    Web cramming

    Multilevel marketing (pyramid schemes)

    Travel/vacations

    Business opportunities

    Investments

    Health-care products