Your SlideShare is downloading. ×
Security And Ethical Challenges Of Infornation Technology
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security And Ethical Challenges Of Infornation Technology


Published on

Published in: Technology, Business

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 2. Objectives of Ethical challenges
    • Identify ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.
  • 3. Ethical Responsibility Security Ethics and Society Employment Privacy Health Crime Working Conditions Individuality
  • 4. What is Computer Crime ?
    • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources
      • Unauthorized release of information
      • Unauthorized copying of software
  • 5. Types of Computer Crime Hacking Unauthorized Use at work Cyber Theft Piracy Computer Viruses
  • 6. Computer Crime (cont..)
    • Hacking
      • The obsessive use of computers, or the unauthorized access and use of networked computer systems
    • Cyber Theft
      • Involves unauthorized network entry and the fraudulent alteration of computer databases
    • Unauthorized use at work
      • Also called time and resource theft
      • May range from doing private consulting or personal finances, to playing video games, to unauthorized use of the Internet on company networks
    • Piracy of intellectual property
      • Other forms of intellectual property covered by copyright laws
        • Music, Videos, Images, Articles, Books
    • Software Piracy
      • Unauthorized copying of software
    • Computer viruses and worms
      • Virus
        • A program that cannot work without being inserted into another program
      • Worm
        • A distinct program that can run unaided
  • 7. Privacy Issues
    • Privacy issues are at the top of the list in regards to ethical use of information.
        • Loss of control
        • Misuse of information
        • Risk to physical privacy
        • Risk of identity theft
        • Unwanted intrusions into daily life
    • Privacy on the Internet
      • Users of the Internet are highly visible and open to violations of privacy
      • Unsecured with no real rules
      • Cookies capture information about you every time you visit a site
      • That information may be sold to third parties
    • Privacy laws
      • Attempt to enforce the privacy of computer-based files and communications
      • Electronic Communications Privacy Act
      • Computer Fraud and Abuse Act
  • 8. Employment Challenges
    • Employment
      • New jobs have been created and productivity has increased, yet there has been a significant reduction in some types of jobs as a result of IT.
    Lost Job Opportunities Computer Monitoring Lost Individuality Health Issues Working Conditions
  • 9. Other Challenges
    • Health Issues
    • - Job stress
    • - Muscle damage
    • - Eye strain
    • - Radiation exposure
    • - Accidents
    • Individuality
      • Computer-based systems criticized as impersonal systems that dehumanize and depersonalize activities
    • Working Conditions
      • IT has eliminated many monotonous, obnoxious tasks, but has created others
  • 10. Factors in the Workplace
  • 11. Security Management
  • 12. Goal of Security Management
      • Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders
  • 13. Security Measures Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses
  • 14. Security Measures (cont..) Security Codes Security Monitors Backup Files Biometric Security Controls
  • 15. Security Measures (cont..)
    • Encryption
      • Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users
      • Involves using special mathematical algorithms to transform digital data in scrambled code
      • Most widely used method uses a pair of public and private keys unique to each individual
    • Firewalls
      • Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion
        • Provides a filter and safe transfer point
        • Screens all network traffic for proper passwords or other security codes
    • Denial of Service Defenses
      • These assaults depend on three layers of networked computer systems
        • Victim’s website
        • Victim’s ISP
        • Sites of “zombie” or slave computers
      • Defensive measures and security precautions must be taken at all three levels
  • 16. Security Measures (cont..)
    • E-mail Monitoring
      • “ Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.”
    • Virus Defenses
      • Protection may accomplished through
        • Centralized distribution and updating of antivirus software
        • Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies
    • Security codes
      • Multilevel password system
        • Log onto the computer system, Gain access into the system, Access individual files
  • 17. Security Measures (cont..)
    • Backup Files
      • Duplicate files of data or programs
      • File retention measures
      • Sometimes several generations of files are kept for control purposes
    • Security Monitors
      • Programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction
    • Biometric Security
      • Measure physical traits that make each individual unique
        • Voice
        • Fingerprints
        • Hand geometry
        • Signature dynamics
        • Retina scanning
        • Face recognition and Genetic pattern analysis
  • 18. System Controls and Audits
    • Information System Controls
      • Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities
      • Designed to monitor and maintain the quality and security of input, processing, and storage activities
    • Auditing Business Systems
      • Review and evaluate whether proper and adequate security measures and management policies have been developed and implemented
      • Testing the integrity of an application’s audit trail
  • 19. Thank you…………!!!!!!!!!! By : Rashmi Ankit Rohan Akash Sonali Sabanaz Thakurdas Yashdeep