SlideShare a Scribd company logo
1 of 35
CIVIL RIGHTS ACTS of 19646
Desmond Graham
Grantham University
HRM620 - Strategic HR
Dr Sara Willox
November 7, 2021
Abstract
The Civil Rights Act of 1964 was passed into law by President
Lyndon B. Johnson to end segregation practices against blacks
that were prevalent since the implementation of Jim Crows
laws. The Act provides that no individual should face
discrimination based on sex, race, or gender when accessing
public services. Title VII of the Civil Rights Act of 1964
prohibits employers from engaging in discriminatory practices
against employees because of the employee's gender, race, or
sexuality. Noncompliance to the employee rights outlined in
Title VII makes the employer liable for punitive and
compensatory damages based on the number of employees. Title
vii also applies to labor unions, employment agencies, and
training programs, requiring them to refrain from engaging in
discriminatory and segregation practices that could affect the
individual’s employment status or bar them from specific
employment opportunities. The implementation of Title VII has
resulted in equal employment opportunities for persons of every
race, gender, and religion. Even though there are still cases of
age, gender, religion, and race discrimination at the workplace,
employers and organizations have made progress in reducing
discriminatory practices and embracing diversity in the
workplace, which has resulted in increased diversity and
productivity.
Keywords; The Civil Rights Act of 1964, Title VII, workplace
discrimination, Equal Employment Opportunity Commission
Civil Rights Acts of 1964
Introduction
The Civil Rights Act of 1964 was signed into law by President
Lyndon B. Johnson in 1964 to end segregation based on race,
ethnicity, and religion in all public places such as churches,
restaurants, hotels, theatres, and parks (Jennifer, 2015). It came
when the black’s faced oppression since the inception of Jim
Crow laws that promoted segregation. Title VII of the Civil
Rights Act ended discrimination based on employers and labour
unions based on race, gender, and religion. Title VII also
implemented the Equal Employment Opportunity Commission to
advocate for employees who have faced discrimination at the
workplace. It prohibits employers from; failing to hire an
individual or depriving him of some employment privileges and
fair compensation due to his gender, race, or religion. (Timothy
et al., 2019). Also, it prohibits employers from segregating their
employees in a way that would inhibit them from getting a
given position or affect their employment status due to the
individual's race, gender, or religion. Title VII prohibits labour
unions from denying an individual membership because of their
race, religion, or gender or segregating its membership and
causing an employer to engage in discriminatory practices
against such individuals.
Consequences of violating Civil Rights Act of 1964 (Title VII)
Following are the consequences of failing to adhere to the Title
VII of the Civil Rights Act of 1964.
· An employer who intentionally violates Title VII will be
subjected to a jury trial and be liable for compensatory and
punitive damages depending on the number of employees; an
employer with 15-100 workers pays a maximum of $50,000,101-
200 employees is subjected to a maximum of $100,000, while an
employer with over 500 workers will pay an amount not
exceeding $300,000(U.S.E.O.C, n.d).
· An employer found guilty of engaging in sex discrimination
will pay the aggrieved employee back pay to cater for the losses
that accrued to the employee due to the discriminatory act.
· An employment agency that violated the Title VII of the Civil
Rights Act of 1964 gets locked out of federal funding.
· Employers who violate title vii will be liable for the attorney's
fees, court expenses, and other expenses and damages as
prescribed in the Act (U.S.E.O.C,n,d).
The impact of Title VII of the Civil Rights Act on employees
and organizations
Employees
Title VII has changed the face of the workplace and how
employees are treated in their workplaces today. Employees can
now pursue their interests and receive fair compensation
without facing any discrimination based on gender, race, or
religion. Also, employees are hired and promoted based on their
academic qualifications and work experiences, increasing their
motivation, and becoming experts in their relevant fields.
Employers seized ton view employees through the lenses of sex,
religion, or gender and, instead, for what they are and their
capabilities at the workplace. This different perception has
enabled more Americans to be absorbed by organizations,
especially women, reducing the unemployment level, especially
among Hispanics and Black Americans.
Organizations
The implementation of Title VII of the Civil Rights Act of 1964
has seen employers embrace the role of diversity in the
workplace. Employing people from different races and ethnic
backgrounds increases creativity, productivity, and employee
engagement, increasing profits and employee retention (Robert
& Christopher, 2016).
References
Bringle, J. (2015). The Civil Rights Act of 1964
Glynn, T. P., Sullivan, C. A., & Arnow-Richman, R. (2019).
Employment law: Private ordering and its limitations
Lussier, R. N., & Achua, C. F. (2016). Leadership: Theory,
application & skill development.U.S. Equal Employment
Opportunity Commission. (n.d.). Title VII of the Civil Rights
Act of 1964 .
U.S. Equal Employment Opportunity Commission. Retrieved
November 4, 2021, from https://www.eeoc.gov/statutes/title-vii-
civil-rights-act-1964.
Electronic Commerce
Tenth Edition
Chapter 10
Electronic Commerce Security
1
1
1
1
Electronic Commerce, Tenth Edition
2
2
Learning Objectives
In this chapter, you will learn:
What security risks arise in online business and how to manage
them
How to create a security policy
How to implement security on Web client computers
How to implement security in the communication channels
between computers
2
2
2
Learning Objectives (cont’d.)
How to implement security on Web server computers
What organizations promote computer, network, and Internet
security
Electronic Commerce, Tenth Edition
3
3
Electronic Commerce, Tenth Edition
4
Online Security Issues Overview
Early Internet days
Most popular use: electronic mail
Today’s higher stakes
Electronic mail, shopping, all types of financial transactions
Common worry of Web shoppers
Stolen credit card as it transmits over the Internet
More likely to be stolen from computer where stored
Chapter topic: security in the context of electronic commerce
4
5
Origins of Security on Interconnected Computer Systems
Data security measures taken by Roman Empire
Coded information to prevent enemies from reading secret war
and defense plans
Modern electronic security techniques
Defense Department wartime use
“Orange Book”: rules for mandatory access control
Business computers
Initially adopted military’s security methods
Today’s computing
Requires comprehensive computer security plans
Electronic Commerce, Tenth Edition
5
5
Electronic Commerce, Tenth Edition
6
Computer Security and Risk Management
Computer security
Asset protection from unauthorized access, use, alteration, and
destruction
Physical security
Includes tangible protection devices
Alarms, guards, fireproof doors, security fences, safes or vaults,
and bombproof buildings
Logical security
Asset protection using nonphysical means
6
7
Computer Security and Risk Management (cont’d.)
Threat
Any act or object posing danger to computer assets
Countermeasure
Procedure (physical or logical)
Recognizes, reduces, and eliminates threat
Extent and expense of countermeasures
Vary depending on asset importance
Electronic Commerce, Tenth Edition
7
7
8
Computer Security and Risk Management (cont’d.)
Risk management model
Four general organizational actions
Impact (cost) and probability of physical threat
Also applicable for protecting Internet and electronic commerce
assets from physical and electronic threats
Electronic threat examples:
Impostors, eavesdroppers, thieves
Eavesdropper (person or device)
Listen in on and copy Internet transmissions
Electronic Commerce, Tenth Edition
8
8
Electronic Commerce, Tenth Edition
9
FIGURE 10-1 Risk management model
© Cengage Learning 2013
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
9
Electronic Commerce, Tenth Edition
10
Computer Security and Risk Management (cont’d.)
Crackers or hackers (people)
Write programs; manipulate technologies
Obtain unauthorized access to computers and networks
White hat hacker and black hat hacker
Distinction between good hackers and bad hackers
Good security scheme implementation
Identify risks
Determine how to protect threatened assets
Calculate costs to protect assets
10
Electronic Commerce, Tenth Edition
11
Elements of Computer Security
Secrecy
Protecting against unauthorized data disclosure
Ensuring data source authenticity
Integrity
Preventing unauthorized data modification
Man-in-the-middle exploit
E-mail message intercepted; contents changed before forwarded
to original destination
Necessity
Preventing data delays or denials (removal)
Delaying message or completely destroying it
11
Establishing a Security Policy
Security policy
Assets to protect and why, protection responsibility, acceptable
and unacceptable behaviors
Physical security, network security, access authorizations, virus
protection, disaster recovery
Military policy: stresses separation of multiple levels of
security
Corporate information classifications
Public
Company confidential
Electronic Commerce, Tenth Edition
12
12
Electronic Commerce, Tenth Edition
13
Establishing a Security Policy (cont’d.)
Steps to create security policy
Determine assets to protect from threats
Determine access to various system parts
Identify resources to protect assets
Develop written security policy
Commit resources
Comprehensive security plan goals
Protect privacy, integrity, availability; authentication
Selected to satisfy Figure 10-2 requirements
13
Electronic Commerce, Tenth Edition
14
FIGURE 10-2 Requirements for secure electronic commerce
© Cengage Learning 2013
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
14
Electronic Commerce, Tenth Edition
15
Establishing a Security Policy (cont’d.)
Security policies information sources
WindowSecurity.com site
Information Security Policy World site
Absolute security: difficult to achieve
Create barriers deterring intentional violators
Reduce impact of natural disasters and terrorist acts
Integrated security
Having all security measures work together
Prevents unauthorized disclosure, destruction, modification of
assets
15
Electronic Commerce, Tenth Edition
16
Establishing a Security Policy (cont’d.)
Security policy points
Authentication: Who is trying to access site?
Access control: Who is allowed to log on to and access site?
Secrecy: Who is permitted to view selected information?
Data integrity: Who is allowed to change data?
Audit: Who or what causes specific events to occur, and when?
16
Electronic Commerce, Tenth Edition
17
Security for Client Computers
Client computers
Must be protected from threats
Threats
Originate in software and downloaded data
Malevolent server site masquerades as legitimate Web site
Chapter topics organized to follow the
transaction-processing flow
Beginning with consumer
Ending with Web server at electronic commerce site
17
Electronic Commerce, Tenth Edition
18
Cookies and Web Bugs
Internet connection between Web clients and servers
Stateless connection
Each information transmission is independent
No continuous connection (open session) maintained between
any client and server
Cookies
Small text files Web servers place on Web client
Identify returning visitors
Allow continuing open session
18
Electronic Commerce, Tenth Edition
19
Cookies and Web Bugs (cont’d.)
Time duration cookie categories
Session cookies: exist until client connection ends
Persistent cookies: remain indefinitely
Electronic commerce sites use both
Cookie sources
First-party cookies
Web server site places them on client computer
Third-party cookies
Different Web site places them on client computer
19
Electronic Commerce, Tenth Edition
20
Cookies and Web Bugs (cont’d.)
Disable cookies entirely
Complete cookie protection
Problem
Useful cookies blocked (along with others)
Full site resources not available
Web browser cookie management functions
Refuse only third-party cookies
Review each cookie before accepted
Provided by most Web browsers
20
Electronic Commerce, Tenth Edition
21
FIGURE 10-3 Mozilla Firefox dialog box for managing stored
cookies
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
21
Electronic Commerce, Tenth Edition
22
Cookies and Web Bugs (cont’d.)
Web bug
Tiny graphic that third-party Web site places on another site’s
Web page
Purpose
Provide a way for a third-party site to place cookie on visitor’s
computer
Internet advertising community:
Calls Web bugs “clear GIFs” or “1-by-1 GIFs”
Graphics created in GIF format
Color value of “transparent,” small as 1 pixel by 1 pixel
22
Electronic Commerce, Tenth Edition
23
Active Content
Active content
Programs embedded transparently in Web pages
Cause action to occur
E-commerce example
Place items into shopping cart; compute tax and costs
Advantages
Extends HTML functionality
Moves data processing chores to client computer
Disadvantages
Can damage client computer
23
Electronic Commerce, Tenth Edition
24
Active Content (cont’d.)
Cookies, Java applets, JavaScript, VBScript, ActiveX controls,
graphics, Web browser plug-ins,
e-mail attachments
Scripting languages: provide executable script
Examples: JavaScript and VBScript
Applet: small application program
Typically runs within Web browser
Some browsers include tools limiting applets’ actions
Active content modules
Embedded in Web pages (invisible)
24
Electronic Commerce, Tenth Edition
25
FIGURE 10-4 Advanced JavaScript settings in Mozilla Firefox
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
25
Electronic Commerce, Tenth Edition
26
Active Content (cont’d.)
Crackers: embed malicious active content
Trojan horse
Program hidden inside another program or Web page
Masking true purpose
May result in secrecy and integrity violations
Zombie (Trojan horse)
Secretly takes over another computer
Launches attacks on other computers
Botnet (robotic network, zombie farm)
All controlled computers act as an attacking unit
26
Electronic Commerce, Tenth Edition
27
Java Applets
Java programming language
Developed by Sun Microsystems
Widespread use in Web pages: active content
Java: platform-independent programming language
Provides Web page active content
Server sends applets with client-requested pages
Most cases: operation visible to visitor
Possibility: functions not noticed by visitor
27
Electronic Commerce, Tenth Edition
28
Java Applets (cont’d.)
Advantages
Adds functionality to business application’s functionality;
relieves server-side programs
Disadvantage
Possible security violations (Trojan horse, zombie)
28
Java Applets (cont’d.)
Java sandbox
Confines Java applet actions to set of rules defined by security
model
Rules apply to all untrusted Java applets
Not established as secure
Java applets running within sandbox constraint
Does not allow full client system access
Prevents secrecy (disclosure) and integrity (deletion or
modification) violations
Electronic Commerce, Tenth Edition
29
29
Electronic Commerce, Tenth Edition
30
JavaScript
JavaScript
Scripting language developed by Netscape
Enables Web page designers to build active content
Based loosely on Sun’s Java programming language
Can be used for attacks
Cannot commence execution on its own
User must start ill-intentioned JavaScript program
30
Electronic Commerce, Tenth Edition
31
ActiveX Controls
ActiveX control
Objects containing programs and properties Web designers
place on Web pages
Component construction
Many different programming languages
Common: C++ and Visual Basic
Run on Windows operating systems computers
Executed on client computer like any other program
31
Electronic Commerce, Tenth Edition
32
ActiveX Controls (cont’d.)
Comprehensive ActiveX controls list
ActiveX page at Download.com
Security danger
Execute like other client computer programs
Have access to full system resources
Cause secrecy, integrity, and necessity violations
Actions cannot be halted once started
Web browsers
Provide notice of Active-X download or install
32
Electronic Commerce, Tenth Edition
33
FIGURE 10-5 ActiveX control download warning dialog box in
Internet Explorer
33
Electronic Commerce, Tenth Edition
34
Graphics and Plug-Ins
Graphics, browser plug-ins, and e-mail attachments can harbor
executable content
Graphic: embedded code can harm client computer
Browser plug-ins (programs)
Enhance browser capabilities
Popular plug-ins: Adobe Flash Player, Apple’s QuickTime
Player, Microsoft Silverlight, RealNetworks’ RealPlayer
Can pose security threats
1999 RealPlayer plug-in
Plug-ins executing commands buried within media
34
Electronic Commerce, Tenth Edition
35
Viruses, Worms, and Antivirus Software
Programs display e-mail attachments by automatically executing
associated programs
Macro viruses within attached files can cause damage
Virus: software
Attaches itself to another program
Causes damage when host program activated
Worm: virus
Replicates itself on computers it infects
Spreads quickly through the Internet
Macro virus
Small program (macro) embedded in file
35
Electronic Commerce, Tenth Edition
36
Viruses, Worms, and Antivirus Software (cont’d.)
ILOVEYOU virus (“love bug”)
Spread with amazing speed
Infected computers and clogged e-mail systems
Replicated itself explosively through Outlook e-mail
Caused other harm
2001 Code Red and Nimda: virus-worm combinations
Multivector virus: entered computer system in several different
ways (vectors)
2002 and 2003: new virus-worm combinations
Example: Bugbear
36
Electronic Commerce, Tenth Edition
37
Viruses, Worms, and Antivirus Software (cont’d.)
Antivirus software
Detects viruses and worms
Either deletes or isolates them on client computer
2005 and 2006 Zotob
New breed of Trojan horse-worm combination
2007: Storm virus
2008 and continuing into 2009: Conflicker
2009 and 2010: URLzone and Clampi
New viruses designed specifically to hijack users’ online
banking sessions
37
Viruses, Worms, and Antivirus Software (cont’d.)
2010: new Trojan horse-worm combination attack
Spread through a computer operating system
Designed to target industrial equipment
German industrial giant Siemens’ control systems
2011: Zeus and SpyEye combined
Targeted bank account information
Not visible in Microsoft Windows Task Manager
Intercept credit card or online banking data entered in Web
browser
Electronic Commerce, Tenth Edition
38
38
Electronic Commerce, Tenth Edition
39
FIGURE 10-6 Major viruses, worms, and Trojan horses
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
39
40
Electronic Commerce, Tenth Edition
40
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
40
Electronic Commerce, Tenth Edition
41
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
41
Electronic Commerce, Tenth Edition
42
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
42
Electronic Commerce, Tenth Edition
43
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
43
Electronic Commerce, Tenth Edition
44
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
44
Viruses, Worms, and Antivirus Software (cont’d.)
Companies that track viruses, sell antivirus software, provide
virus descriptions on Web sites
Symantec (Symantec Security Response)
McAfee (McAfee Virus Information)
Data files must be updated regularly
Recognize and eliminate newest viruses
Some Web e-mail systems:
Provide and update antivirus software
Used to scan attachments before downloading
Example: Yahoo! Mail
Electronic Commerce, Tenth Edition
45
45
Electronic Commerce, Tenth Edition
46
Digital Certificates
Digital certificate (digital ID)
E-mail message attachment or program embedded in Web page
Verifies sender or Web site
Contains a means to send encrypted message
Signed message or code
Provides proof of holder identified by the certificate
Used for online transactions
Electronic commerce, electronic mail, and electronic funds
transfers
46
Electronic Commerce, Tenth Edition
47
FIGURE 10-7 Delmar Cengage Learning’s digital certificate
information displayed in Firefox browser
© Cengage Learning 2013
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
47
Electronic Commerce, Tenth Edition
48
Digital Certificates (cont’d.)
Digital certificate for software:
Assurance software was created by specific company
Does not attest to quality of software
Certification authority (CA)
Issues digital certificates to organizations, individuals
Digital certificates cannot be forged easily
Six main elements: owner’s identifying information, owner’s
public key, dates certificate is valid, serial number, issuer
name, issuer digital signature
48
Electronic Commerce, Tenth Edition
49
Digital Certificates (cont’d.)
Key
Number: usually long binary number
Used with encryption algorithm
“Lock” message characters being protected
Longer keys provide better protection
Identification requirements vary
Driver’s license, notarized form, fingerprints
Companies offering CA services
Thawte, VeriSign, Comodo, DigiCert, Entrust, GeoTrust,
RapidSSL.com
49
Electronic Commerce, Tenth Edition
50
Digital Certificates (cont’d.)
Secure Sockets Layer-Extended Validation
(SSL-EV) digital certificate
Issued after more extensive verification confirmed
Annual fees
$200 to more than $1500
Digital certificates expire after period of time
Provides protection (users and businesses)
Must submit credentials for reevaluation periodically
50
51
FIGURE 10-8 Internet Explorer address window display for an
SSL-EV Web site
Electronic Commerce, Tenth Edition
51
51
Electronic Commerce, Tenth Edition
52
Steganography
Steganography
Hiding information within another piece of information
Can be used for malicious purposes
Hiding encrypted file within another file
Casual observer cannot detect anything of importance in
container file
Two-step process
Encrypting file protects it from being read
Steganography makes it invisible
Al Qaeda used steganography to hide attack orders
52
Electronic Commerce, Tenth Edition
53
Physical Security for Clients
Client computers
Control important business functions
Same physical security as early systems
New physical security technologies
Fingerprint readers (less than $100)
Stronger protection than password approaches
Biometric security device
Identification using element of person’s biological makeup
Writing pads, eye scanners, palm reading scanners, reading back
of hand vein pattern
53
Client Security for Mobile Devices
Security measures
Access password
Remote wipe: clears all personal data
Can be added as an app
Capability through corporate e-mail synchronization
Antivirus software
Rogue apps: contain malware or collect information and forward
to perpetrators
Apple App Store tests apps before authorizing sales
Android Market does less extensive testing
Users should not rush to install latest app
Electronic Commerce, Tenth Edition
54
54
Electronic Commerce, Tenth Edition
55
Communication Channel Security
Internet
Not designed to be secure
Designed to provide redundancy
Remains unchanged from original insecure state
Message traveling on the Internet
Subject to secrecy, integrity, and necessity threats
55
Electronic Commerce, Tenth Edition
56
Secrecy Threats
Secrecy
Prevention of unauthorized information disclosure
Technical issue
Requiring sophisticated physical and logical mechanisms
Privacy
Protection of individual rights to nondisclosure
Legal matter
56
Secrecy Threats (cont’d.)
E-mail message
Secrecy violations protected using encryption
Protects outgoing messages
Privacy issues address whether supervisors are permitted to read
employees’ messages randomly
Electronic commerce threat
Sensitive or personal information theft
Sniffer programs
Record information passing through computer or router
Electronic Commerce, Tenth Edition
57
57
Electronic Commerce, Tenth Edition
58
Secrecy Threats (cont’d.)
Electronic commerce threat (cont’d.)
Backdoor: electronic holes
Left open accidentally or intentionally
Content exposed to secrecy threats
Example: Cart32 shopping cart program backdoor
Stolen corporate information
Eavesdropper example
Web users continually reveal information
Secrecy breach
Possible solution: anonymous Web surfing
58
Electronic Commerce, Tenth Edition
59
Integrity Threats
Also known as active wiretapping
Unauthorized party alters message information stream
Integrity violation example
Cybervandalism
Electronic defacing of Web site
Masquerading (spoofing)
Pretending to be someone else
Fake Web site representing itself as original
59
Electronic Commerce, Tenth Edition
60
Integrity Threats (cont’d.)
Domain name servers (DNSs)
Internet computers maintaining directories
Linking domain names to IP addresses
Perpetrators use software security hole
Substitute their Web site address in place of real one
Spoofs Web site visitors
Phishing expeditions
Capture confidential customer information
Common victims
Online banking, payment system users
60
Electronic Commerce, Tenth Edition
61
Necessity Threats
Also known as delay, denial, denial-of-service (DoS) attack
Disrupt or deny normal computer processing
Intolerably slow-speed computer processing
Renders service unusable or unattractive
Distributed denial-of-service (DDoS) attack
Launch simultaneous attack on a Web site via botnets
DoS attacks
Remove information altogether
Delete transmission or file information
61
Electronic Commerce, Tenth Edition
62
Necessity Threats (cont’d.)
Denial attack examples:
Quicken accounting program diverted money to perpetrator’s
bank account
High-profile electronic commerce company received flood of
data packets
Overwhelmed sites’ servers
Choked off legitimate customers’ access
62
Electronic Commerce, Tenth Edition
63
Threats to the Physical Security of Internet Communications
Channels
Internet’s packet-based network design:
Precludes it from being shut down
By attack on single communications link
Individual user’s Internet service can be interrupted
Destruction of user’s Internet link
Larger companies, organizations
Use more than one link to main Internet backbone
63
Electronic Commerce, Tenth Edition
64
Threats to Wireless Networks
Wireless Encryption Protocol (WEP)
Rule set for encrypting transmissions from the wireless devices
to the wireless access points (WAPs)
Wardrivers
Attackers drive around in cars
Search for accessible networks
Warchalking
Place chalk mark on building
Identifies easily entered wireless network nearby
Web sites include wireless access locations maps
64
Electronic Commerce, Tenth Edition
65
Threats to Wireless Networks (cont’d.)
Preventing attacks by wardrivers
Turn on WEP
Change default login and password settings
Example
Best Buy wireless point-of-sale (POS)
Failed to enable WEP
Customer launched sniffer program
Intercepted data from POS terminals
65
Electronic Commerce, Tenth Edition
66
Encryption
Solution
s
Encryption: coding information using mathematically based
program, secret key
Cryptography: science studying encryption
Science of creating messages only sender and receiver can read
Steganography
Makes text undetectable to naked eye
Cryptography converts text to other visible text
With no apparent meaning
66
Encryption

More Related Content

More from VinaOconner450

Learning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxLearning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxVinaOconner450
 
Learning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxLearning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxVinaOconner450
 
Learning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxLearning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxVinaOconner450
 
Learning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxLearning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxVinaOconner450
 
Learning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxLearning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxVinaOconner450
 
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxLearning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxVinaOconner450
 
Learning ModulesCh. 11 Corrections History and Institutions His.docx
Learning ModulesCh. 11 Corrections History and Institutions  His.docxLearning ModulesCh. 11 Corrections History and Institutions  His.docx
Learning ModulesCh. 11 Corrections History and Institutions His.docxVinaOconner450
 
Learning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxLearning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxVinaOconner450
 
Learning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxLearning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxVinaOconner450
 
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxLEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxVinaOconner450
 
Lead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxLead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxVinaOconner450
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxVinaOconner450
 
Learning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxLearning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxVinaOconner450
 
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management  Rost (1991) reinterpreted Burns mode.docxLeadership versus Management  Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management Rost (1991) reinterpreted Burns mode.docxVinaOconner450
 
Laura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxLaura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxVinaOconner450
 
Leadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxLeadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxVinaOconner450
 
Leadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxLeadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxVinaOconner450
 
Leaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxLeaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxVinaOconner450
 
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxLaws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxVinaOconner450
 
Law Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxLaw Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxVinaOconner450
 

More from VinaOconner450 (20)

Learning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docxLearning SimulationSpecific information to consider for your desig.docx
Learning SimulationSpecific information to consider for your desig.docx
 
Learning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docxLearning Activity 1Identify key external forces Then interview.docx
Learning Activity 1Identify key external forces Then interview.docx
 
Learning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docxLearning ReflectionHow would you apply the four p’s to a service .docx
Learning ReflectionHow would you apply the four p’s to a service .docx
 
Learning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docxLearning Activity #1Please discuss the ethical lessons that you le.docx
Learning Activity #1Please discuss the ethical lessons that you le.docx
 
Learning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docxLearning Activity Data on Child AbuseChildren are suffering from .docx
Learning Activity Data on Child AbuseChildren are suffering from .docx
 
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docxLearning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
Learning Activity #1Joe Jackson owned a sawmill in Stuttgart, Arka.docx
 
Learning ModulesCh. 11 Corrections History and Institutions His.docx
Learning ModulesCh. 11 Corrections History and Institutions  His.docxLearning ModulesCh. 11 Corrections History and Institutions  His.docx
Learning ModulesCh. 11 Corrections History and Institutions His.docx
 
Learning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docxLearning goal To develop your ability to systematically analyze and.docx
Learning goal To develop your ability to systematically analyze and.docx
 
Learning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docxLearning Activity #1  What are the theoretical differences betw.docx
Learning Activity #1  What are the theoretical differences betw.docx
 
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docxLEADERSHIPImagine you are the HR, describe the role of a leade.docx
LEADERSHIPImagine you are the HR, describe the role of a leade.docx
 
Lead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docxLead_Professor,Look forward to your quality work!Looking for.docx
Lead_Professor,Look forward to your quality work!Looking for.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docxLearning Activity 1Impart your understanding and the organizati.docx
Learning Activity 1Impart your understanding and the organizati.docx
 
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management  Rost (1991) reinterpreted Burns mode.docxLeadership versus Management  Rost (1991) reinterpreted Burns mode.docx
Leadership versus Management Rost (1991) reinterpreted Burns mode.docx
 
Laura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docxLaura Jackson discusses three spatial scales on the aspects of phy.docx
Laura Jackson discusses three spatial scales on the aspects of phy.docx
 
Leadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docxLeadership Development and Succession PlanningAn effective success.docx
Leadership Development and Succession PlanningAn effective success.docx
 
Leadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docxLeadership FactorsWrite a four page paper (not including the tit.docx
Leadership FactorsWrite a four page paper (not including the tit.docx
 
Leaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docxLeaders face many hurdles when leading in multiple countries. .docx
Leaders face many hurdles when leading in multiple countries. .docx
 
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docxLaws Enforcement TechnologiesIn this week’s assignment, you will e.docx
Laws Enforcement TechnologiesIn this week’s assignment, you will e.docx
 
Law Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docxLaw Enforcement  Please respond to the followingIdentify the ke.docx
Law Enforcement  Please respond to the followingIdentify the ke.docx
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

CIVIL RIGHTS ACTS of 19646Desmond Graham Grantha

  • 1. CIVIL RIGHTS ACTS of 19646 Desmond Graham Grantham University HRM620 - Strategic HR Dr Sara Willox November 7, 2021 Abstract The Civil Rights Act of 1964 was passed into law by President Lyndon B. Johnson to end segregation practices against blacks that were prevalent since the implementation of Jim Crows laws. The Act provides that no individual should face discrimination based on sex, race, or gender when accessing public services. Title VII of the Civil Rights Act of 1964 prohibits employers from engaging in discriminatory practices against employees because of the employee's gender, race, or sexuality. Noncompliance to the employee rights outlined in Title VII makes the employer liable for punitive and compensatory damages based on the number of employees. Title vii also applies to labor unions, employment agencies, and training programs, requiring them to refrain from engaging in
  • 2. discriminatory and segregation practices that could affect the individual’s employment status or bar them from specific employment opportunities. The implementation of Title VII has resulted in equal employment opportunities for persons of every race, gender, and religion. Even though there are still cases of age, gender, religion, and race discrimination at the workplace, employers and organizations have made progress in reducing discriminatory practices and embracing diversity in the workplace, which has resulted in increased diversity and productivity. Keywords; The Civil Rights Act of 1964, Title VII, workplace discrimination, Equal Employment Opportunity Commission Civil Rights Acts of 1964 Introduction The Civil Rights Act of 1964 was signed into law by President Lyndon B. Johnson in 1964 to end segregation based on race, ethnicity, and religion in all public places such as churches, restaurants, hotels, theatres, and parks (Jennifer, 2015). It came when the black’s faced oppression since the inception of Jim Crow laws that promoted segregation. Title VII of the Civil Rights Act ended discrimination based on employers and labour unions based on race, gender, and religion. Title VII also implemented the Equal Employment Opportunity Commission to advocate for employees who have faced discrimination at the workplace. It prohibits employers from; failing to hire an individual or depriving him of some employment privileges and fair compensation due to his gender, race, or religion. (Timothy et al., 2019). Also, it prohibits employers from segregating their employees in a way that would inhibit them from getting a
  • 3. given position or affect their employment status due to the individual's race, gender, or religion. Title VII prohibits labour unions from denying an individual membership because of their race, religion, or gender or segregating its membership and causing an employer to engage in discriminatory practices against such individuals. Consequences of violating Civil Rights Act of 1964 (Title VII) Following are the consequences of failing to adhere to the Title VII of the Civil Rights Act of 1964. · An employer who intentionally violates Title VII will be subjected to a jury trial and be liable for compensatory and punitive damages depending on the number of employees; an employer with 15-100 workers pays a maximum of $50,000,101- 200 employees is subjected to a maximum of $100,000, while an employer with over 500 workers will pay an amount not exceeding $300,000(U.S.E.O.C, n.d). · An employer found guilty of engaging in sex discrimination will pay the aggrieved employee back pay to cater for the losses that accrued to the employee due to the discriminatory act. · An employment agency that violated the Title VII of the Civil Rights Act of 1964 gets locked out of federal funding. · Employers who violate title vii will be liable for the attorney's fees, court expenses, and other expenses and damages as prescribed in the Act (U.S.E.O.C,n,d). The impact of Title VII of the Civil Rights Act on employees and organizations Employees Title VII has changed the face of the workplace and how employees are treated in their workplaces today. Employees can now pursue their interests and receive fair compensation without facing any discrimination based on gender, race, or religion. Also, employees are hired and promoted based on their academic qualifications and work experiences, increasing their motivation, and becoming experts in their relevant fields. Employers seized ton view employees through the lenses of sex,
  • 4. religion, or gender and, instead, for what they are and their capabilities at the workplace. This different perception has enabled more Americans to be absorbed by organizations, especially women, reducing the unemployment level, especially among Hispanics and Black Americans. Organizations The implementation of Title VII of the Civil Rights Act of 1964 has seen employers embrace the role of diversity in the workplace. Employing people from different races and ethnic backgrounds increases creativity, productivity, and employee engagement, increasing profits and employee retention (Robert & Christopher, 2016). References Bringle, J. (2015). The Civil Rights Act of 1964 Glynn, T. P., Sullivan, C. A., & Arnow-Richman, R. (2019). Employment law: Private ordering and its limitations
  • 5. Lussier, R. N., & Achua, C. F. (2016). Leadership: Theory, application & skill development.U.S. Equal Employment Opportunity Commission. (n.d.). Title VII of the Civil Rights Act of 1964 . U.S. Equal Employment Opportunity Commission. Retrieved November 4, 2021, from https://www.eeoc.gov/statutes/title-vii- civil-rights-act-1964. Electronic Commerce Tenth Edition Chapter 10 Electronic Commerce Security 1 1 1 1 Electronic Commerce, Tenth Edition 2 2 Learning Objectives In this chapter, you will learn: What security risks arise in online business and how to manage them How to create a security policy How to implement security on Web client computers How to implement security in the communication channels between computers
  • 6. 2 2 2 Learning Objectives (cont’d.) How to implement security on Web server computers What organizations promote computer, network, and Internet security Electronic Commerce, Tenth Edition 3 3 Electronic Commerce, Tenth Edition 4 Online Security Issues Overview Early Internet days Most popular use: electronic mail Today’s higher stakes Electronic mail, shopping, all types of financial transactions Common worry of Web shoppers Stolen credit card as it transmits over the Internet More likely to be stolen from computer where stored Chapter topic: security in the context of electronic commerce 4 5 Origins of Security on Interconnected Computer Systems
  • 7. Data security measures taken by Roman Empire Coded information to prevent enemies from reading secret war and defense plans Modern electronic security techniques Defense Department wartime use “Orange Book”: rules for mandatory access control Business computers Initially adopted military’s security methods Today’s computing Requires comprehensive computer security plans Electronic Commerce, Tenth Edition 5 5 Electronic Commerce, Tenth Edition 6 Computer Security and Risk Management Computer security Asset protection from unauthorized access, use, alteration, and destruction Physical security Includes tangible protection devices Alarms, guards, fireproof doors, security fences, safes or vaults, and bombproof buildings Logical security Asset protection using nonphysical means 6 7
  • 8. Computer Security and Risk Management (cont’d.) Threat Any act or object posing danger to computer assets Countermeasure Procedure (physical or logical) Recognizes, reduces, and eliminates threat Extent and expense of countermeasures Vary depending on asset importance Electronic Commerce, Tenth Edition 7 7 8 Computer Security and Risk Management (cont’d.) Risk management model Four general organizational actions Impact (cost) and probability of physical threat Also applicable for protecting Internet and electronic commerce assets from physical and electronic threats Electronic threat examples: Impostors, eavesdroppers, thieves Eavesdropper (person or device) Listen in on and copy Internet transmissions Electronic Commerce, Tenth Edition 8 8 Electronic Commerce, Tenth Edition 9
  • 9. FIGURE 10-1 Risk management model © Cengage Learning 2013 Click to edit Master text styles Second level Third level Fourth level Fifth level 9 Electronic Commerce, Tenth Edition 10 Computer Security and Risk Management (cont’d.) Crackers or hackers (people) Write programs; manipulate technologies Obtain unauthorized access to computers and networks White hat hacker and black hat hacker Distinction between good hackers and bad hackers Good security scheme implementation Identify risks Determine how to protect threatened assets Calculate costs to protect assets 10 Electronic Commerce, Tenth Edition 11 Elements of Computer Security Secrecy Protecting against unauthorized data disclosure Ensuring data source authenticity
  • 10. Integrity Preventing unauthorized data modification Man-in-the-middle exploit E-mail message intercepted; contents changed before forwarded to original destination Necessity Preventing data delays or denials (removal) Delaying message or completely destroying it 11 Establishing a Security Policy Security policy Assets to protect and why, protection responsibility, acceptable and unacceptable behaviors Physical security, network security, access authorizations, virus protection, disaster recovery Military policy: stresses separation of multiple levels of security Corporate information classifications Public Company confidential Electronic Commerce, Tenth Edition 12 12 Electronic Commerce, Tenth Edition 13 Establishing a Security Policy (cont’d.) Steps to create security policy Determine assets to protect from threats
  • 11. Determine access to various system parts Identify resources to protect assets Develop written security policy Commit resources Comprehensive security plan goals Protect privacy, integrity, availability; authentication Selected to satisfy Figure 10-2 requirements 13 Electronic Commerce, Tenth Edition 14 FIGURE 10-2 Requirements for secure electronic commerce © Cengage Learning 2013 Click to edit Master text styles Second level Third level Fourth level Fifth level 14 Electronic Commerce, Tenth Edition 15 Establishing a Security Policy (cont’d.) Security policies information sources WindowSecurity.com site Information Security Policy World site Absolute security: difficult to achieve Create barriers deterring intentional violators Reduce impact of natural disasters and terrorist acts
  • 12. Integrated security Having all security measures work together Prevents unauthorized disclosure, destruction, modification of assets 15 Electronic Commerce, Tenth Edition 16 Establishing a Security Policy (cont’d.) Security policy points Authentication: Who is trying to access site? Access control: Who is allowed to log on to and access site? Secrecy: Who is permitted to view selected information? Data integrity: Who is allowed to change data? Audit: Who or what causes specific events to occur, and when? 16 Electronic Commerce, Tenth Edition 17 Security for Client Computers Client computers Must be protected from threats Threats Originate in software and downloaded data Malevolent server site masquerades as legitimate Web site Chapter topics organized to follow the transaction-processing flow Beginning with consumer Ending with Web server at electronic commerce site
  • 13. 17 Electronic Commerce, Tenth Edition 18 Cookies and Web Bugs Internet connection between Web clients and servers Stateless connection Each information transmission is independent No continuous connection (open session) maintained between any client and server Cookies Small text files Web servers place on Web client Identify returning visitors Allow continuing open session 18 Electronic Commerce, Tenth Edition 19 Cookies and Web Bugs (cont’d.) Time duration cookie categories Session cookies: exist until client connection ends Persistent cookies: remain indefinitely Electronic commerce sites use both Cookie sources First-party cookies Web server site places them on client computer Third-party cookies Different Web site places them on client computer
  • 14. 19 Electronic Commerce, Tenth Edition 20 Cookies and Web Bugs (cont’d.) Disable cookies entirely Complete cookie protection Problem Useful cookies blocked (along with others) Full site resources not available Web browser cookie management functions Refuse only third-party cookies Review each cookie before accepted Provided by most Web browsers 20 Electronic Commerce, Tenth Edition 21 FIGURE 10-3 Mozilla Firefox dialog box for managing stored cookies Click to edit Master text styles Second level Third level Fourth level Fifth level 21 Electronic Commerce, Tenth Edition 22
  • 15. Cookies and Web Bugs (cont’d.) Web bug Tiny graphic that third-party Web site places on another site’s Web page Purpose Provide a way for a third-party site to place cookie on visitor’s computer Internet advertising community: Calls Web bugs “clear GIFs” or “1-by-1 GIFs” Graphics created in GIF format Color value of “transparent,” small as 1 pixel by 1 pixel 22 Electronic Commerce, Tenth Edition 23 Active Content Active content Programs embedded transparently in Web pages Cause action to occur E-commerce example Place items into shopping cart; compute tax and costs Advantages Extends HTML functionality Moves data processing chores to client computer Disadvantages Can damage client computer 23 Electronic Commerce, Tenth Edition 24
  • 16. Active Content (cont’d.) Cookies, Java applets, JavaScript, VBScript, ActiveX controls, graphics, Web browser plug-ins, e-mail attachments Scripting languages: provide executable script Examples: JavaScript and VBScript Applet: small application program Typically runs within Web browser Some browsers include tools limiting applets’ actions Active content modules Embedded in Web pages (invisible) 24 Electronic Commerce, Tenth Edition 25 FIGURE 10-4 Advanced JavaScript settings in Mozilla Firefox Click to edit Master text styles Second level Third level Fourth level Fifth level 25 Electronic Commerce, Tenth Edition 26 Active Content (cont’d.) Crackers: embed malicious active content Trojan horse Program hidden inside another program or Web page
  • 17. Masking true purpose May result in secrecy and integrity violations Zombie (Trojan horse) Secretly takes over another computer Launches attacks on other computers Botnet (robotic network, zombie farm) All controlled computers act as an attacking unit 26 Electronic Commerce, Tenth Edition 27 Java Applets Java programming language Developed by Sun Microsystems Widespread use in Web pages: active content Java: platform-independent programming language Provides Web page active content Server sends applets with client-requested pages Most cases: operation visible to visitor Possibility: functions not noticed by visitor 27 Electronic Commerce, Tenth Edition 28 Java Applets (cont’d.) Advantages Adds functionality to business application’s functionality; relieves server-side programs Disadvantage Possible security violations (Trojan horse, zombie)
  • 18. 28 Java Applets (cont’d.) Java sandbox Confines Java applet actions to set of rules defined by security model Rules apply to all untrusted Java applets Not established as secure Java applets running within sandbox constraint Does not allow full client system access Prevents secrecy (disclosure) and integrity (deletion or modification) violations Electronic Commerce, Tenth Edition 29 29 Electronic Commerce, Tenth Edition 30 JavaScript JavaScript Scripting language developed by Netscape Enables Web page designers to build active content Based loosely on Sun’s Java programming language Can be used for attacks Cannot commence execution on its own User must start ill-intentioned JavaScript program 30
  • 19. Electronic Commerce, Tenth Edition 31 ActiveX Controls ActiveX control Objects containing programs and properties Web designers place on Web pages Component construction Many different programming languages Common: C++ and Visual Basic Run on Windows operating systems computers Executed on client computer like any other program 31 Electronic Commerce, Tenth Edition 32 ActiveX Controls (cont’d.) Comprehensive ActiveX controls list ActiveX page at Download.com Security danger Execute like other client computer programs Have access to full system resources Cause secrecy, integrity, and necessity violations Actions cannot be halted once started Web browsers Provide notice of Active-X download or install 32 Electronic Commerce, Tenth Edition 33
  • 20. FIGURE 10-5 ActiveX control download warning dialog box in Internet Explorer 33 Electronic Commerce, Tenth Edition 34 Graphics and Plug-Ins Graphics, browser plug-ins, and e-mail attachments can harbor executable content Graphic: embedded code can harm client computer Browser plug-ins (programs) Enhance browser capabilities Popular plug-ins: Adobe Flash Player, Apple’s QuickTime Player, Microsoft Silverlight, RealNetworks’ RealPlayer Can pose security threats 1999 RealPlayer plug-in Plug-ins executing commands buried within media 34 Electronic Commerce, Tenth Edition 35 Viruses, Worms, and Antivirus Software Programs display e-mail attachments by automatically executing associated programs Macro viruses within attached files can cause damage Virus: software Attaches itself to another program Causes damage when host program activated Worm: virus
  • 21. Replicates itself on computers it infects Spreads quickly through the Internet Macro virus Small program (macro) embedded in file 35 Electronic Commerce, Tenth Edition 36 Viruses, Worms, and Antivirus Software (cont’d.) ILOVEYOU virus (“love bug”) Spread with amazing speed Infected computers and clogged e-mail systems Replicated itself explosively through Outlook e-mail Caused other harm 2001 Code Red and Nimda: virus-worm combinations Multivector virus: entered computer system in several different ways (vectors) 2002 and 2003: new virus-worm combinations Example: Bugbear 36 Electronic Commerce, Tenth Edition 37 Viruses, Worms, and Antivirus Software (cont’d.) Antivirus software Detects viruses and worms Either deletes or isolates them on client computer 2005 and 2006 Zotob New breed of Trojan horse-worm combination 2007: Storm virus
  • 22. 2008 and continuing into 2009: Conflicker 2009 and 2010: URLzone and Clampi New viruses designed specifically to hijack users’ online banking sessions 37 Viruses, Worms, and Antivirus Software (cont’d.) 2010: new Trojan horse-worm combination attack Spread through a computer operating system Designed to target industrial equipment German industrial giant Siemens’ control systems 2011: Zeus and SpyEye combined Targeted bank account information Not visible in Microsoft Windows Task Manager Intercept credit card or online banking data entered in Web browser Electronic Commerce, Tenth Edition 38 38 Electronic Commerce, Tenth Edition 39 FIGURE 10-6 Major viruses, worms, and Trojan horses Click to edit Master text styles Second level Third level Fourth level Fifth level
  • 23. 39 40 Electronic Commerce, Tenth Edition 40 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued) 40 Electronic Commerce, Tenth Edition 41 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued) Click to edit Master text styles Second level Third level Fourth level Fifth level 41 Electronic Commerce, Tenth Edition 42
  • 24. FIGURE 10-6 Major viruses, worms, and Trojan horses (continued) 42 Electronic Commerce, Tenth Edition 43 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued) 43 Electronic Commerce, Tenth Edition 44 FIGURE 10-6 Major viruses, worms, and Trojan horses (continued) 44 Viruses, Worms, and Antivirus Software (cont’d.) Companies that track viruses, sell antivirus software, provide virus descriptions on Web sites Symantec (Symantec Security Response) McAfee (McAfee Virus Information) Data files must be updated regularly Recognize and eliminate newest viruses Some Web e-mail systems:
  • 25. Provide and update antivirus software Used to scan attachments before downloading Example: Yahoo! Mail Electronic Commerce, Tenth Edition 45 45 Electronic Commerce, Tenth Edition 46 Digital Certificates Digital certificate (digital ID) E-mail message attachment or program embedded in Web page Verifies sender or Web site Contains a means to send encrypted message Signed message or code Provides proof of holder identified by the certificate Used for online transactions Electronic commerce, electronic mail, and electronic funds transfers 46 Electronic Commerce, Tenth Edition 47 FIGURE 10-7 Delmar Cengage Learning’s digital certificate information displayed in Firefox browser © Cengage Learning 2013 Click to edit Master text styles
  • 26. Second level Third level Fourth level Fifth level 47 Electronic Commerce, Tenth Edition 48 Digital Certificates (cont’d.) Digital certificate for software: Assurance software was created by specific company Does not attest to quality of software Certification authority (CA) Issues digital certificates to organizations, individuals Digital certificates cannot be forged easily Six main elements: owner’s identifying information, owner’s public key, dates certificate is valid, serial number, issuer name, issuer digital signature 48 Electronic Commerce, Tenth Edition 49 Digital Certificates (cont’d.) Key Number: usually long binary number Used with encryption algorithm “Lock” message characters being protected Longer keys provide better protection Identification requirements vary Driver’s license, notarized form, fingerprints Companies offering CA services
  • 27. Thawte, VeriSign, Comodo, DigiCert, Entrust, GeoTrust, RapidSSL.com 49 Electronic Commerce, Tenth Edition 50 Digital Certificates (cont’d.) Secure Sockets Layer-Extended Validation (SSL-EV) digital certificate Issued after more extensive verification confirmed Annual fees $200 to more than $1500 Digital certificates expire after period of time Provides protection (users and businesses) Must submit credentials for reevaluation periodically 50 51 FIGURE 10-8 Internet Explorer address window display for an SSL-EV Web site Electronic Commerce, Tenth Edition 51 51 Electronic Commerce, Tenth Edition 52
  • 28. Steganography Steganography Hiding information within another piece of information Can be used for malicious purposes Hiding encrypted file within another file Casual observer cannot detect anything of importance in container file Two-step process Encrypting file protects it from being read Steganography makes it invisible Al Qaeda used steganography to hide attack orders 52 Electronic Commerce, Tenth Edition 53 Physical Security for Clients Client computers Control important business functions Same physical security as early systems New physical security technologies Fingerprint readers (less than $100) Stronger protection than password approaches Biometric security device Identification using element of person’s biological makeup Writing pads, eye scanners, palm reading scanners, reading back of hand vein pattern 53 Client Security for Mobile Devices Security measures
  • 29. Access password Remote wipe: clears all personal data Can be added as an app Capability through corporate e-mail synchronization Antivirus software Rogue apps: contain malware or collect information and forward to perpetrators Apple App Store tests apps before authorizing sales Android Market does less extensive testing Users should not rush to install latest app Electronic Commerce, Tenth Edition 54 54 Electronic Commerce, Tenth Edition 55 Communication Channel Security Internet Not designed to be secure Designed to provide redundancy Remains unchanged from original insecure state Message traveling on the Internet Subject to secrecy, integrity, and necessity threats 55 Electronic Commerce, Tenth Edition 56
  • 30. Secrecy Threats Secrecy Prevention of unauthorized information disclosure Technical issue Requiring sophisticated physical and logical mechanisms Privacy Protection of individual rights to nondisclosure Legal matter 56 Secrecy Threats (cont’d.) E-mail message Secrecy violations protected using encryption Protects outgoing messages Privacy issues address whether supervisors are permitted to read employees’ messages randomly Electronic commerce threat Sensitive or personal information theft Sniffer programs Record information passing through computer or router Electronic Commerce, Tenth Edition 57 57 Electronic Commerce, Tenth Edition 58 Secrecy Threats (cont’d.) Electronic commerce threat (cont’d.) Backdoor: electronic holes Left open accidentally or intentionally
  • 31. Content exposed to secrecy threats Example: Cart32 shopping cart program backdoor Stolen corporate information Eavesdropper example Web users continually reveal information Secrecy breach Possible solution: anonymous Web surfing 58 Electronic Commerce, Tenth Edition 59 Integrity Threats Also known as active wiretapping Unauthorized party alters message information stream Integrity violation example Cybervandalism Electronic defacing of Web site Masquerading (spoofing) Pretending to be someone else Fake Web site representing itself as original 59 Electronic Commerce, Tenth Edition 60 Integrity Threats (cont’d.) Domain name servers (DNSs) Internet computers maintaining directories Linking domain names to IP addresses Perpetrators use software security hole Substitute their Web site address in place of real one
  • 32. Spoofs Web site visitors Phishing expeditions Capture confidential customer information Common victims Online banking, payment system users 60 Electronic Commerce, Tenth Edition 61 Necessity Threats Also known as delay, denial, denial-of-service (DoS) attack Disrupt or deny normal computer processing Intolerably slow-speed computer processing Renders service unusable or unattractive Distributed denial-of-service (DDoS) attack Launch simultaneous attack on a Web site via botnets DoS attacks Remove information altogether Delete transmission or file information 61 Electronic Commerce, Tenth Edition 62 Necessity Threats (cont’d.) Denial attack examples: Quicken accounting program diverted money to perpetrator’s bank account High-profile electronic commerce company received flood of data packets Overwhelmed sites’ servers
  • 33. Choked off legitimate customers’ access 62 Electronic Commerce, Tenth Edition 63 Threats to the Physical Security of Internet Communications Channels Internet’s packet-based network design: Precludes it from being shut down By attack on single communications link Individual user’s Internet service can be interrupted Destruction of user’s Internet link Larger companies, organizations Use more than one link to main Internet backbone 63 Electronic Commerce, Tenth Edition 64 Threats to Wireless Networks Wireless Encryption Protocol (WEP) Rule set for encrypting transmissions from the wireless devices to the wireless access points (WAPs) Wardrivers Attackers drive around in cars Search for accessible networks Warchalking Place chalk mark on building Identifies easily entered wireless network nearby Web sites include wireless access locations maps
  • 34. 64 Electronic Commerce, Tenth Edition 65 Threats to Wireless Networks (cont’d.) Preventing attacks by wardrivers Turn on WEP Change default login and password settings Example Best Buy wireless point-of-sale (POS) Failed to enable WEP Customer launched sniffer program Intercepted data from POS terminals 65 Electronic Commerce, Tenth Edition 66 Encryption Solution s Encryption: coding information using mathematically based program, secret key Cryptography: science studying encryption Science of creating messages only sender and receiver can read
  • 35. Steganography Makes text undetectable to naked eye Cryptography converts text to other visible text With no apparent meaning 66 Encryption