Your SlideShare is downloading. ×
Security And Ethical Challenges Of Infornation Technology
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security And Ethical Challenges Of Infornation Technology

15,322
views

Published on

Published in: Technology, Business

5 Comments
7 Likes
Statistics
Notes
No Downloads
Views
Total Views
15,322
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
663
Comments
5
Likes
7
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. SECURITY AND ETHICAL CHALLENGES OF INFORMATION TECHNOLOGY
  • 2. Objectives of Ethical challenges
    • Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
  • 3. Ethical Responsibility Security Ethics and Society Employment Privacy Health Crime Working Conditions Individuality
  • 4. What is Computer Crime ?
    • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources
      • Unauthorized release of information
      • Unauthorized copying of software
  • 5. Types of Computer Crime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses
  • 6. Computer Crime (cont..)
    • Hacking
      • The obsessive use of computers, or the unauthorized access and use of networked computer systems
    • Cyber Theft
      • Involves unauthorized network entry and the fraudulent alteration of computer databases
    • Unauthorized use at work
      • Also called time and resource theft
      • May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks
    • Piracy of intellectual property
      • Other forms of intellectual property covered by copyright laws
        • Music, Videos, Images, Articles, Books
    • Software Piracy
      • Unauthorized copying of software
    • Computer viruses and worms
      • Virus
        • A program that cannot work without being inserted into another program
      • Worm
        • A distinct program that can run unaided
  • 7. Privacy Issues
    • Privacy issues are at the top of the list in regards to ethical use of information.
        • Loss of control
        • Misuse of information
        • Risk to physical privacy
        • Risk of identity theft
        • Unwanted intrusions into daily life
    • Privacy on the Internet
      • Users of the Internet are highly visible and open to violations of privacy
      • Unsecured with no real rules
      • Cookies capture information about you every time you visit a site
      • That information may be sold to third parties
    • Privacy laws
      • Attempt to enforce the privacy of computer-based files and communications
      • Electronic Communications Privacy Act
      • Computer Fraud and Abuse Act
  • 8. Employment Challenges
    • Employment
      • New jobs have been created and productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT.
    Lost Job Opportunities Computer Monitoring Lost Individuality Health Issues Working Conditions
  • 9. Other Challenges
    • Health Issues
    • - Job stress
    • - Muscle damage
    • - Eye strain
    • - Radiation exposure
    • - Accidents
    • Individuality
      • Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities
    • Working Conditions
      • IT has eliminated many monotonous, obnoxious tasks, but has created others
  • 10. Factors in the Workplace
  • 11. Security Management
  • 12. Goal of Security Management
      • Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders
  • 13. Security Measures Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses
  • 14. Security Measures (cont..) Security Codes Security Monitors Backup Files Biometric Security Controls
  • 15. Security Measures (cont..)
    • Encryption
      • Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users
      • Involves using special mathematical algorithms to transform digital data in scrambled code
      • Most widely used method uses a pair of public and private keys unique to each individual
    • Firewalls
      • Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion
        • Provides a filter and safe transfer point
        • Screens all network traffic for proper passwords or other security codes
    • Denial of Service Defenses
      • These assaults depend on three layers of networked computer systems
        • Victim’s website
        • Victim’s ISP
        • Sites of “zombie” or slave computers
      • Defensive measures and security precautions must be taken at all three levels
  • 16. Security Measures (cont..)
    • E-mail Monitoring
      • “ Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”
    • Virus Defenses
      • Protection may accomplished through
        • Centralized distribution and updating of antivirus software
        • Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies
    • Security codes
      • Multilevel password system
        • Log onto the computer system, Gain access into the system, Access individual files
  • 17. Security Measures (cont..)
    • Backup Files
      • Duplicate files of data or programs
      • File retention measures
      • Sometimes several generations of files are kept for control purposes
    • Security Monitors
      • Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction
    • Biometric Security
      • Measure physical traits that make each individual unique
        • Voice
        • Fingerprints
        • Hand geometry
        • Signature dynamics
        • Retina scanning
        • Face recognition and Genetic pattern analysis
  • 18. System Controls and Audits
    • Information System Controls
      • Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities
      • Designed to monitor and maintain the quality and security of input, processing, and storage activities
    • Auditing Business Systems
      • Review and evaluate whether proper and adequate security measures and management policies have been developed and implemented
      • Testing the integrity of an application’s audit trail
  • 19. Thank you…………!!!!!!!!!! By : Rashmi Ankit Rohan Akash Sonali Sabanaz Thakurdas Yashdeep

×