security and ethical challengesPresentation Transcript
Security and Ethical Challenges Management Information Systems Presented by:- Section-C (Group-8) Varun Rai Sood (BM-010162) Vibhav Gupta (BM-010163) Vijay Kr. Sharma (BM-010164) Vineet Kr. Dubey(BM-010165)
Computer crimes that exist in the present society are:-
Unauthorized use at work
Piracy of intellectual property
Computer viruses and worms
Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Hackers usually
Steal or damage data
Get unauthorized access to computer files
Monitor e-mails or web server access
May use remote services that allow one computer to execute programs on another
Plant data that will cause system to welcome intruders
Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.
Unauthorized use at Work
Unauthorized use of computer resources especially by employees
Playing video games
Unauthorized use of internet
Non-work related upload/download
Transmission or confidential data
Unauthorized copying of data is called software piracy or software theft
Software is protected by copyright law and user license agreement that allows only limited copies to be made
Piracy of Intellectual Property
Materials other than software are also pirated by making multiple copies
Piracy of music, video, images, articles, books etc.
Dissemination of these material through internet websites
Computer viruses and worms
A virus is a program code that cannot work without being inserted into another program
A worm is a distinct program that can run unaided
These programs copy annoying or destructive routines into the networked computer systems of anyone who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected computers
They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted external memory.
Privacy on the internet
Computer libel and censorship (threats are spamming and flaming)
Employment challenges because a lot of tasks have been automated
Computer monitoring causes intrusion in personal space for workers
Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs
Challenges to individuality as they eliminate the human relationships between people
Cumulative trauma disorders
Carpal tunnel syndrome
Radiation caused by cathode ray tubes (CRTs) is also a health concern
Computer based training
Security management of IT
Denial of service attacks
Computer failure controls
Fault tolerant systems
System controls and audits
The concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations.
Password Authentication protocol
Challenge Handshake authentication Protocol
Extensible Authentication Protocol
Firewalls are used to restrict access to one network from another network. Different types of firewalls exist.
Kernel Proxy firewalls
Ethical responsibility of business professionals
Business ethics are concerned with
Exercise of corporate power
Categories of Ethical Business Issues
Theories of corporate social responsibility
The stockholders theory holds that managers are agents of the stockholders and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent activities.
The social contract theory states that companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract
The stakeholders theory states that managers have ethical responsibility to manage a firm for the benefit of all of its stakeholders i.e. stockholders, employees, customers, suppliers and local community.
Principles of technology ethics
Proportionality of benefits to risk
Informed consent to risks
Justice in distribution of risk with benefits derived to each subunit
Minimized risk by the selected option
Acting with integrity
Increasing your professional competence
Setting high standards of personal performance
Accepting responsibility for your work
Advancing the health, privacy, and general welfare of the public
Case 1 Cyber scams and Cybercriminals
Cyber scams are today ’s fastest-growing criminal niche
87 percent of companies surveyed reported a security incident
The U.S. Federal Trade Commission says identity theft is its top complaint
eBay has 60 people combating fraud; Microsoft has 65
Stolen credit card account numbers are regularly sold online
What are several reasons why “cyber scams are today’s fastest-growing criminal niche”?
Explain why the reasons you give contribute to the growth of cyber scams
What are several security measures that could be implemented to combat the spread of cyber scams?
Explain why your suggestions would be effective in limiting the spread of cyber scams
Which one or two of the four top cybercriminals described in this case poses the greatest threat to businesses? To consumers?
Explain the reasons for your choices, and how businesses and consumers can protect themselves from these cyber scammers