Security And Ethical Challenges Of Infornation Technology
Upcoming SlideShare
Loading in...5
×
 

Security And Ethical Challenges Of Infornation Technology

on

  • 1,026 views

With the proliferation of Electronic Commerce and the “Virtual Office,” threats are becoming an everyday occurrence to business. In fact, more threats arrive daily than business can combat them.

With the proliferation of Electronic Commerce and the “Virtual Office,” threats are becoming an everyday occurrence to business. In fact, more threats arrive daily than business can combat them.

Statistics

Views

Total Views
1,026
Views on SlideShare
1,026
Embed Views
0

Actions

Likes
0
Downloads
16
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Many of the economic espionage cases are in the tens or hundreds of millions of dollars, the FBI says, and that can translate into job losses.
  • “Operation Aurora, which was an attack on Google, I think, was a watershed moment where we suddenly realized that even the best companies with tremendously smart people, great security, are vulnerable to the threat,” cyber security expert Dmitri Alperovitch said.in the tens or hundreds of millions of dollars, the FBI says, and that can translate into job losses.
  • Email: Alperovitch said that’s how cyber spies were able to hack into Google last year. Example SALES department AttachmentIf cyber spies are interested in a lot of people within a larger group, they can target a website that’s used by the group or company, Alperovitch said. It can also be surreptitiously inserted into a computer by a spy on the inside of a company.

Security And Ethical Challenges Of Infornation Technology Presentation Transcript

  • 1. Security & Ethicalchallenges in anOrganisationVIVEK
  • 2. The government has recently said in Rajya Sabha that1,600 arrests have been made related to cyber crimesunder the Information Technology Act of 2000.The interesting aspect of these numbers is that the numberof cyber crimes has gone up 10 fold in the past couple ofyears.
  • 3. IntroductionWith the proliferation of Electronic Commerce and the “Virtual Office,” threats are becomingan everyday occurrence to business. In fact, more threats arrive daily than business cancombat them. Threats to business can happen at any level, such as from Physical Access Entry to the place of business The Internet and company Intranet Lack of Security Policy enforcement Employees of the business themselves Wireless Access to the company network, etc.
  • 4. Security Challenges 1. Hacking
  • 5. HackingHacking is often called the biggest danger to the economic security of the Company orNation.President Obama has gone on record as calling the cyber threat “one of the most seriousand economic and national security challenges we face as a nation.
  • 6. HackingBy attacking business networks, hackers are accessing company secrets and confidentialstrategies and creating huge losses for the overall economy.
  • 7. HackingEvery company is at risk. Even big names are not immune — LinkedIn was the victim ofhackers in June, and Google was attacked in 2011, when hackers gained access tohundreds of user accounts.
  • 8. Several News Related to thischallengesCoke Gets Hacked And Doesn’t Tell Anyonehttp://www.businessweek.com/news/2012-11-04/coke-hacked-and-doesn-t-tellHackers had broken into the company’s computer systems and were pilfering sensitive filesabout its attempted $2.4 billion acquisition of China Huiyuan Juice Group (1886)
  • 9. Several News Related to this challengesA Huge Error From Apple Led To A Wired Reporter Getting Hacked Hard (Aug 6 2012)http://www.businessinsider.com/a-huge-error-from-apple-led-to-a-wired-reporter-getting-hacked-hard-2012-8One of the biggest stories in the tech world was Wired reporter Mat Honan getting "hacked,hard" in his own words. Its a pretty terrifying tale if you have anything of personal significance onyour computer.
  • 10. Hacking So how do hackers get in the door?
  • 11. Hacking Email Social Engineering/Spear Phishing Infection Via A Drive-By Web Download USB Key Malware Scanning Networks For Vulnerabilities And Exploitment Guessing Or Social Engineering Passwords Wifi Compromises Stolen Credentials From Third-Party Sites Insiders
  • 12. Cyber TheftCrooks are breaking into banks and stealing money. But it’s not Baby Face Aditi or JesseJames Gautam doing the robberies. Today’s thieves and crooks don’t have cool soundingnames. These are nameless, faceless, anonymous cyber thieves.
  • 13. Cyber TheftThere is a growing epidemic of online financial transaction theft from American banks andfinancial institutions. Just since 2008, cyber thieves have stolen millions of dollars from smallbusinesses, school districts, churches, public libraries, municipalities, water districts andnonprofits.
  • 14. Cyber TheftAccording to a recent victims’ survey by cyber security giant Symantec, “CorporateAccount Takeover” attacks against small businesses doubled in 2012, reported Krebs onSecurity. While many financial institutions make good on depositors losses from CorporateAccount Takeover fraud and theft, many more disclaim any responsibility for such losses.
  • 15. News Related to this challengesThe Western Beaver public school district in Pennsylvania filed a lawsuit against its bank aftercyber-thieves used malicious software to siphon more than $700,000 from the schools accountat ESB. According to the lawsuit, the funds were transferred in 74 separate transactions over atwo-day period.
  • 16. News Related to this challengesCyber-crooks stole $1.2 million from Unique Industrial Product Co., a Sugar Land, Texas-basedplumbing equipment supply company. The companys operations manager said a forensicanalysis showed the attackers used malware planted on its computers to initiate 43 transfers outof the companys account within 30 minutes.
  • 17. News Related to this challengesFraudsters struck JM Test Systems, an electronics calibration company in Baton Rouge.According to the companys controller, an unauthorized wire transfer of $45,640 was sent fromJMs account to a bank in Russia. The companys bank subsequently provided the company withnew credentials. But less than a week later, another $51,550 of JM Tests money was transferredto five money mules across the country. The company was able to recover only $7,200 of thestolen money, which was returned only because one mule who was to receive that transferapparently closed their account before the transfer could be completed.
  • 18. Cyber Theft Phishing Pharming ((Also Domain Spoofing and DNS Poisoning)
  • 19. Cyber Theft
  • 20. Security Challenges 3. Unauthorized use at work
  • 21. Unauthorized use at workAs it becomes easier for people to access computer databases, ease of use means ease ofabuse. Using the computer, individual employees can quickly and quietly commit seriouscrimes that are very difficult to detect. They can steal information, change information, ordestroy information in automated file systems while sitting at their desk and doing nothing thatappears out of the ordinary to casual observers.
  • 22. Unauthorized use at workPersonnel with technical skills and administrative access to a network are also capable ofdamaging or impairing the operability of critical information systems. There have beennumerous cases of such malicious behavior by disgruntled IT professionals with some level ofadministrative access to a government or corporate system.
  • 23. Unauthorized use at workOwing to the magnitude of problems that can be caused by misuse of computer systems, allagencies have a vested interest in maintaining a work environment that fosters high standards ofcomputer security.
  • 24. Potentially Disqualifying Conditions Illegal or unauthorized entry into any information technology system or component thereof illegal or unauthorized modification, destruction, manipulation or denial of access to information, software, firmware, or hardware in an information technology system use of any information technology system to gain unauthorized access to another system or to a compartmented area within the same system downloading, storing, or transmitting classified information on or to any unauthorized software, hardware, or information technology system
  • 25. Potentially Disqualifying Conditions Introduction, removal, or duplication of hardware, firmware, software, or media to or from any information technology system without authorization, when prohibited by rules, procedures, guidelines or regulations negligence or lax security habits in handling information technology that persist despite counseling by management any misuse of information technology, whether deliberate or negligent, that results in damage to the national security.
  • 26. Security Challenges 4. Software Piracy
  • 27. Software PiracySoftware piracy is stealing. If you or your company are caught copying and/or distributingillegal copies of software, you could be held liable under both civil and criminal laws. If thesoftware owner decides to sue you or your company, the owner can seek to stop you fromusing/distributing its software immediately and can also request monetary damages.
  • 28. Consequences of Software Piracy Increase the chances that the software will not function correctly or will fail completely; Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes; Have no warranty to protect themselves; Increase their risk of exposure to a debilitating virus that can destroy valuable data; May find that the software is actually an outdated version, a beta (test) version, or a nonfunctioning copy; Are subject to significant fines for copyright infringement; and Risk potential negative publicity and public and private embarrassment.
  • 29. Other side of storyThe losses suffered as a result of software piracy directly affect the profitability of thesoftware industry. Because of the money lost to pirates, publishers have fewer resources todevote to research and development of new products, have less revenue to justify loweringsoftware prices and are forced to pass these costs on to their customers.
  • 30. Security Challenges 4. Piracy of intellectual property
  • 31. Piracy of Intellectual PropertyThat piracy of goods embodying intellectual property is an enormous worldwide problemcannot be denied.
  • 32. Piracy of Intellectual PropertyThe World Customs Organization, for example, has found in its most recent survey thataround 5% of all world trade is trade in pirated goods. The European Commission has, insimilar terms, concluded that between 5% and 7% of world trade depends on piracy,representing 200 to 300 billion euro in lost trade.
  • 33. Piracy of Intellectual Property Music Films Books Software
  • 34. Music PiracyMore than one in three CDs sold in the world were pirate products!In addition, a significant percentage of this lost income would have gone to the musicpublishers, and the songwriters and composers they represent, as all of these illegal CDsand cassettes embody the unauthorised mechanical reproduction of copyrighted songsand other compositions.
  • 35. Music Piracy – Other side of StorySecondary to these direct losses are all of the other consequential losses that piracyinevitably triggers: loss of employment opportunities in recording studios and retail stores,as well as losses from all of the other ancillary industries which contribute to the musicindustry, such as graphic artists and musical editors, video and film support, and marketing,promotional, and advertising experts.
  • 36. Film PiracyIt is estimated that the U.S. motion picture industry loses in excess of US $3 billion annuallyin potential worldwide revenue due to commercial piracy!But film industry losses from piracy are not a problem only for the major US studios.Thousands of Bollywood DVDs and CDs are sold in the UK annually, yet it is estimated that atleast 4 out of 10 (and some would say as many as 7 out of 10) of these are pirate products.
  • 37. Software PiracyIn the field of computer software, the value of losses to the economy of developed anddeveloping countries alike is immense, far greater even than that seen with respect tomusic and films.The Business Software Alliance, estimates that thirty-six percent of thesoftware installed on computers worldwide was pirated in 2003, representing a loss ofnearly US $29 billion.
  • 38. Security Challenges Summery
  • 39.  create a culture of security Assess risk and identify weaknesses Create a contingency plan Educate employees Implement a security agreement
  • 40. And as far as piracy and intellectual property is concern:General of the World Intellectual Property Organization, Dr. Kamil Idris, hasobserved,"Concerted action, enhanced public awareness,and galvanization of political will to eventually eradicatethis problem and its negative effects on society” are allrequired.
  • 41. Thank You!