SlideShare a Scribd company logo
1 of 33
INFO-SHEET 1:
PROFESSIONAL AND ETHICAL
RESPONSIBILITIES AS IT
PROFESSIONALS TO BE
AWARE OF THE COMPUTER-
RELATED MISTAKES AND
COMPUTER CRIME
IS PQS 213 - PROFESSIONAL ETHICS, QUALITY
CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS-PQS 213.1.1 Computer Waste and Mistakes
IS-PQS 213.1.2 Preventing Computer-related
Waste and Mistakes
IS-PQS 213.1.3 Computer Crime
IS-PQS 213.1.4 Computer as a tool to commit a crime
IS-PQS 213.1.5 Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS, QUALITY
CONSCIOUSNESS AND SOCIAL ISSUES
IN COMPUTING
Computer Waste
Inappropriate use of
computer technology and
resources
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer Waste
1. Discarding old software and even complete
computer systems when they still have value
2. Building and maintaining complex systems that
are never used to their fullest extent
3. Using corporate time and technology for
personal use
4. Spam
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer-Related Mistake
Errors, failures, and other
computer problems that make
computer output incorrect or
not useful.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer-Related Mistake
a. Failure by users to follow
proper procedures
b. Unclear expectations and a
lack of feedback
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer-Related Mistake
c. Program development that
contains errors
d. Incorrect data entry by the
data-entry clerk
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer-Related Mistake
Data-entry or data-capture errors
Errors in computer programs
TYPES:
Errors in handling files
Mishandling of computer
output
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
MCT: IS-PQS 213.1.2 Preventing Computer-related
Waste and Mistakes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Preventing Computer-related Waste and Mistakes
1. Policies and procedures
must be established to
avoid computer waste and
mistakes.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Preventing Computer-related Waste and Mistakes
2. Preventive policies and
procedures typically
address the issues listed
above
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
MCT: IS-PQS 213.1.3 COMPUTER
CRIME
Computer Crime
rapidly increasing
throughout the world due to
the advancement in the IT
industry
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer Crime
relatively risk-free,
compared to crimes such as
bank robbery
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer Crime
Viruses, Stealing Credit Card
Numbers from online
systems, and crashing
Websites
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer Crime
Computers can be used to
access valuable information
or steal funds.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Computer Crime
criminals gain critical
computer passwords or
access codes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Social Engineering
How to prevent Computer Crime
firewall can help secure an
organization’s information
system from unauthorized
external access.
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Privacy
the right to be out of public
view or to be left alone
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Right to Privacy
Privacy Act 1988
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Republic Act 10173 –
Data Privacy Act of 2012
Categorizing Computer-related Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
A computer can also be the target
of criminal activity, as seen when
hackers obtain unauthorized
access to the Department of
Defense sites.
Categorizing Computer-related Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The perpetrator of a computer
crime could easily be a juvenile
hacker, sophisticated business
person, or terrorist.
MCT: IS-PQS 213.1.4 Computer as
a tool to commit a crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Example of Computer Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
1. Improperly accessing a computer, system, or
network;
2. Modifying, damaging, using, disclosing, copying,
or taking programs or data;
3. Introducing a virus or other contaminant into a
computer system;
4. Using a computer in a scheme to defraud;
Example of Computer Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
5. Interfering with someone else's
computer access or use;
6. Using encryption in aid of a crime;
7. Falsifying email source information; and
8. Stealing an information service from a
provider.
Example of Computer Crime
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
Social Network, Cybercrime, and Internet
Sex Crimes
Cyberbullying
Child Pornography and Preying
on Minors
MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
2.Protect Your Personal Information
1.Keep the Computer System Up-To-
Date
MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
4. Secure Configuration of the System
3. Install or Update Your Antivirus
Software
MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
6. Keep Your Firewall Turned On
5. Choose a Strong Password and
Protect It
MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
8. Review Financial Statements Regularly
7. Read the Fine Print On Website
Privacy Policies
MCT: IS-PQS 213.1.5
Preventing Computer Crimes
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING
The following ten (10) basic ways that
Cyber Crime can be prevented.
10. Turn Off Your Computer
9. If It Seems Too Good to Be True,
It Is!
DR. ROSEMARIE S. GUIRRE
IS PQS 213 INTRUCTOR
IS PQS 213 - PROFESSIONAL ETHICS,
QUALITY CONSCIOUSNESS AND SOCIAL
ISSUES IN COMPUTING

More Related Content

What's hot

Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Surveillance in the_workplace_highcontrast_ppt
Surveillance in the_workplace_highcontrast_pptSurveillance in the_workplace_highcontrast_ppt
Surveillance in the_workplace_highcontrast_pptrlizotte
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdfSprintzeal
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected WorldRussell_Kennedy
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Editor IJCATR
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...Segun Ebenezer Olaniyan
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessCasey Robertson
 
DATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREvDATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREvYudha Eri Saputra
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics OverviewKarthik Sarma
 

What's hot (20)

Information security
Information securityInformation security
Information security
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Security in it
Security in it Security in it
Security in it
 
Surveillance in the_workplace_highcontrast_ppt
Surveillance in the_workplace_highcontrast_pptSurveillance in the_workplace_highcontrast_ppt
Surveillance in the_workplace_highcontrast_ppt
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
IT security
IT securityIT security
IT security
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdf
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
IT Policy
IT PolicyIT Policy
IT Policy
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Understand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming ProcessUnderstand Ethics and Security in the Programming Process
Understand Ethics and Security in the Programming Process
 
DATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREvDATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREv
 
Data security
Data securityData security
Data security
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 

Similar to Professional and Ethical Responsibilities as IT Professionals to be aware of the Computer-Related Mistakes and Computer Crime

ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...Stefano Maria De' Rossi
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inOllieShoresna
 
Cyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfCyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfAfrianto Budi
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptxPratheeshKumarN
 
Issues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxIssues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxmohitsrivastavabtech
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Tcs cybersecurity for healthcare
Tcs cybersecurity for healthcareTcs cybersecurity for healthcare
Tcs cybersecurity for healthcareComtech TCS
 

Similar to Professional and Ethical Responsibilities as IT Professionals to be aware of the Computer-Related Mistakes and Computer Crime (20)

ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
Cyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdfCyber Insurance - insurtechindonesia.com.pdf
Cyber Insurance - insurtechindonesia.com.pdf
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
hacker culture
hacker culturehacker culture
hacker culture
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
 
Issues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptxIssues related to Cybercrime and Social Marketing_G6.pptx
Issues related to Cybercrime and Social Marketing_G6.pptx
 
COMPUTER FORENSICS.pptx
COMPUTER FORENSICS.pptxCOMPUTER FORENSICS.pptx
COMPUTER FORENSICS.pptx
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Tcs cybersecurity for healthcare
Tcs cybersecurity for healthcareTcs cybersecurity for healthcare
Tcs cybersecurity for healthcare
 

More from Dr. Rosemarie Sibbaluca-Guirre

More from Dr. Rosemarie Sibbaluca-Guirre (20)

Korean Language: Culture 한국어 개요
Korean Language: Culture 한국어 개요Korean Language: Culture 한국어 개요
Korean Language: Culture 한국어 개요
 
Korean Language Overview 한국어 개요
Korean Language Overview 한국어 개요Korean Language Overview 한국어 개요
Korean Language Overview 한국어 개요
 
Conjunction 접속사
Conjunction   접속사Conjunction   접속사
Conjunction 접속사
 
Pronoun 대명사
Pronoun  대명사Pronoun  대명사
Pronoun 대명사
 
Usage of Particles 입자의 사용
Usage of Particles 입자의 사용Usage of Particles 입자의 사용
Usage of Particles 입자의 사용
 
Usage of Particles 입자의 사용
Usage of Particles 입자의 사용Usage of Particles 입자의 사용
Usage of Particles 입자의 사용
 
Korean Word Order 한국어 단어 순서
Korean Word Order 한국어 단어 순서Korean Word Order 한국어 단어 순서
Korean Word Order 한국어 단어 순서
 
Korean Number 한국 번호
Korean Number 한국 번호Korean Number 한국 번호
Korean Number 한국 번호
 
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptxISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
 
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptxISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
 
ISAD 313-2_ SYSTEM ANALYSIS.pptx
ISAD 313-2_ SYSTEM ANALYSIS.pptxISAD 313-2_ SYSTEM ANALYSIS.pptx
ISAD 313-2_ SYSTEM ANALYSIS.pptx
 
ISAD 313-4_ RESEARCH PROJECT.pptx
ISAD 313-4_ RESEARCH PROJECT.pptxISAD 313-4_ RESEARCH PROJECT.pptx
ISAD 313-4_ RESEARCH PROJECT.pptx
 
ISAD 313-3_ SYSTEM FLOW.pptx
ISAD 313-3_ SYSTEM FLOW.pptxISAD 313-3_ SYSTEM FLOW.pptx
ISAD 313-3_ SYSTEM FLOW.pptx
 
ISAD 313-3_ MODELS.pptx
ISAD 313-3_ MODELS.pptxISAD 313-3_ MODELS.pptx
ISAD 313-3_ MODELS.pptx
 
ACCT11_9_Financial Position.pptx
ACCT11_9_Financial Position.pptxACCT11_9_Financial Position.pptx
ACCT11_9_Financial Position.pptx
 
ACCT11_8_Equity.pptx
ACCT11_8_Equity.pptxACCT11_8_Equity.pptx
ACCT11_8_Equity.pptx
 
ACCT11_7_Performance.pptx
ACCT11_7_Performance.pptxACCT11_7_Performance.pptx
ACCT11_7_Performance.pptx
 
ACCT11_6_Worksheet.pptx
ACCT11_6_Worksheet.pptxACCT11_6_Worksheet.pptx
ACCT11_6_Worksheet.pptx
 
ACCT11_5_Adjusting Entries.pptx
ACCT11_5_Adjusting Entries.pptxACCT11_5_Adjusting Entries.pptx
ACCT11_5_Adjusting Entries.pptx
 
ACCT11_4_Trial Balance.pptx
ACCT11_4_Trial Balance.pptxACCT11_4_Trial Balance.pptx
ACCT11_4_Trial Balance.pptx
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

Professional and Ethical Responsibilities as IT Professionals to be aware of the Computer-Related Mistakes and Computer Crime

  • 1. INFO-SHEET 1: PROFESSIONAL AND ETHICAL RESPONSIBILITIES AS IT PROFESSIONALS TO BE AWARE OF THE COMPUTER- RELATED MISTAKES AND COMPUTER CRIME IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR
  • 2. IS-PQS 213.1.1 Computer Waste and Mistakes IS-PQS 213.1.2 Preventing Computer-related Waste and Mistakes IS-PQS 213.1.3 Computer Crime IS-PQS 213.1.4 Computer as a tool to commit a crime IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 3. Computer Waste Inappropriate use of computer technology and resources DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 4. Computer Waste 1. Discarding old software and even complete computer systems when they still have value 2. Building and maintaining complex systems that are never used to their fullest extent 3. Using corporate time and technology for personal use 4. Spam DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 5. Computer-Related Mistake Errors, failures, and other computer problems that make computer output incorrect or not useful. DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 6. Computer-Related Mistake a. Failure by users to follow proper procedures b. Unclear expectations and a lack of feedback DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 7. Computer-Related Mistake c. Program development that contains errors d. Incorrect data entry by the data-entry clerk DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 8. Computer-Related Mistake Data-entry or data-capture errors Errors in computer programs TYPES: Errors in handling files Mishandling of computer output DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 9. MCT: IS-PQS 213.1.2 Preventing Computer-related Waste and Mistakes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 10. Preventing Computer-related Waste and Mistakes 1. Policies and procedures must be established to avoid computer waste and mistakes. DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 11. Preventing Computer-related Waste and Mistakes 2. Preventive policies and procedures typically address the issues listed above DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 12. MCT: IS-PQS 213.1.3 COMPUTER CRIME
  • 13. Computer Crime rapidly increasing throughout the world due to the advancement in the IT industry DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 14. Computer Crime relatively risk-free, compared to crimes such as bank robbery DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 15. Computer Crime Viruses, Stealing Credit Card Numbers from online systems, and crashing Websites DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 16. Computer Crime Computers can be used to access valuable information or steal funds. DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 17. Computer Crime criminals gain critical computer passwords or access codes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING Social Engineering
  • 18. How to prevent Computer Crime firewall can help secure an organization’s information system from unauthorized external access. DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 19. Privacy the right to be out of public view or to be left alone DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 20. Right to Privacy Privacy Act 1988 DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING Republic Act 10173 – Data Privacy Act of 2012
  • 21. Categorizing Computer-related Crime DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING A computer can also be the target of criminal activity, as seen when hackers obtain unauthorized access to the Department of Defense sites.
  • 22. Categorizing Computer-related Crime DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING The perpetrator of a computer crime could easily be a juvenile hacker, sophisticated business person, or terrorist.
  • 23. MCT: IS-PQS 213.1.4 Computer as a tool to commit a crime DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 24. Example of Computer Crime DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING 1. Improperly accessing a computer, system, or network; 2. Modifying, damaging, using, disclosing, copying, or taking programs or data; 3. Introducing a virus or other contaminant into a computer system; 4. Using a computer in a scheme to defraud;
  • 25. Example of Computer Crime DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING 5. Interfering with someone else's computer access or use; 6. Using encryption in aid of a crime; 7. Falsifying email source information; and 8. Stealing an information service from a provider.
  • 26. Example of Computer Crime DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING Social Network, Cybercrime, and Internet Sex Crimes Cyberbullying Child Pornography and Preying on Minors
  • 27. MCT: IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING
  • 28. MCT: IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING The following ten (10) basic ways that Cyber Crime can be prevented. 2.Protect Your Personal Information 1.Keep the Computer System Up-To- Date
  • 29. MCT: IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING The following ten (10) basic ways that Cyber Crime can be prevented. 4. Secure Configuration of the System 3. Install or Update Your Antivirus Software
  • 30. MCT: IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING The following ten (10) basic ways that Cyber Crime can be prevented. 6. Keep Your Firewall Turned On 5. Choose a Strong Password and Protect It
  • 31. MCT: IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING The following ten (10) basic ways that Cyber Crime can be prevented. 8. Review Financial Statements Regularly 7. Read the Fine Print On Website Privacy Policies
  • 32. MCT: IS-PQS 213.1.5 Preventing Computer Crimes DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING The following ten (10) basic ways that Cyber Crime can be prevented. 10. Turn Off Your Computer 9. If It Seems Too Good to Be True, It Is!
  • 33. DR. ROSEMARIE S. GUIRRE IS PQS 213 INTRUCTOR IS PQS 213 - PROFESSIONAL ETHICS, QUALITY CONSCIOUSNESS AND SOCIAL ISSUES IN COMPUTING

Editor's Notes

  1. NOTE: Want a different image on this slide? Select the picture and delete it. Now click the Pictures icon in the placeholder to insert your own image.
  2. Computer waste refers to the inappropriate use of computer technology and services in an organization or community. Many employees inside the organization have no idea what is computer waste. Computer-related mistakes  Errors, failures, and other computer problems that make computer output incorrect or not useful
  3. Computer-related mistakes  Errors, failures, and other computer problems that make computer output incorrect or not useful
  4. Computer-related mistakes  Errors, failures, and other computer problems that make computer output incorrect or not useful. Computer mistakes include errors, failures, and related problems that cause computer output to be incorrect or not useful. Most of the computer-related mistakes are caused by human error. There are few common mistakes that employees or normal households will involve such as clicking on advertisements.
  5. Computer-related mistakes  Errors, failures, and other computer problems that make computer output incorrect or not useful
  6. PREVENTING COMPUTER-RELATED WASTE AND MISTAKES Types of computer-related mistakes include the following:  Data-entry or data-capture errors  Errors in computer programs  Errors in handling files, including formatting a disk by mistake, copying an old file over a newer one, and deleting a file by mistake  Mishandling of computer output  Inadequate planning for and control of equipment malfunctions  Inadequate planning for and control of environmental difficulties (e.g., electrical and humidity problems)  Installing computing capacity inadequate for the level of activity  Failure to provide access to the most current information by not adding new Web links and not deleting old links Implementing Policies and Procedures: Some useful policies to minimize waste and mistakes include the following:  Changes to critical tables, HTML, and URLs should be tightly controlled, with all changes documented and authorized by responsible owners.  A user manual should be available covering operating procedures and documenting the management and control of the application.  Each system report should indicate its general content in its title and specify the time period covered.  The system should have controls to prevent invalid and unreasonable data entry.  Controls should exist to ensure that data input, HTML, and URLs are valid, applicable, and posted in the right time frame.  Users should implement proper procedures to ensure correct input data. Reviewing Policies and Procedures  During review, people should ask the following questions:  Do current policies cover existing practices adequately? Were any problems or opportunities uncovered during monitoring?
  7. How to avoid and prevent computer waste and mistakes? 1. Policies and procedures must be established to avoid computer waste and mistakes. Although often unintentional, computer waste and a mistake can be costly. Organizational policies and procedures can help to avoid losses. Many employees tend to make unintentional computer waste and mistakes that caused the organization to pay a high amount to settle and repair the waste and mistake.
  8. 2. Preventive policies and procedures typically address the issues listed above. Procedures relating to the acquisition and use of computers can avoid both waste and mistakes. For example, procedures could ensure that computers no longer needed in one part of the organization would be used in another part of the organization, rather than discarded the computers.
  9. Computer crime is a serious and rapidly growing area of concern requiring management attention (Chiu, 2000). Intentional computer crime is rapidly increasing throughout the world due to the advancement in the IT industry especially the IT Finance industry. Many hackers intentionally create a crime to steal information from the IT Finance industry and sell to others to make a high amount of profits. Intentional computer crime requires the attention of management and security specialists to prevent the loss of important data and privacy of the clients.
  10. Computer crime is relatively risk-free, compared to crimes such as bank robbery which might involve the murder of humans. And yet it can often escape detection. Furthermore, due to computer processing speed and data communications, large amounts of money can be quickly stolen or diverted with the right know-how and equipment. Computer Crime in the recent world involves a wide range of categories, such as introducing Viruses, Stealing Credit Card Numbers from online systems, and crashing Websites. Computer crimes have caused more than 10 Billion USD lost in European countries. Even with policies in place, computer crimes can occur in an organization.
  11. Computer Crime in the recent world involves a wide range of categories, such as introducing Viruses, Stealing Credit Card Numbers from online systems, and crashing Websites. Computer crimes have caused more than 10 Billion USD lost in European countries. Even with policies in place, computer crimes can occur in an organization.
  12. How is the computer being a Tool to Commit Crime? Computers can be used to access valuable information or steal funds
  13. Individuals need to know how to gain access to the target computer system and know what to do to the system to achieve their objectives. Often, criminals gain critical computer passwords or access codes needed simply by talking to employees. This is what we called “Social Engineering
  14. How to Prevent Computer Crime? Installed Firewalls on the computer. A firewall can help secure an organization’s information system from unauthorized external access. Organizations need to develop and enforce effective Internet Security policies for all employees. Many companies have taken steps to fight computer crime such as BERJAYA University College of Hospitality (BERJAYA UCH) has banned some unauthorized websites such as high potential forums (Crack Code Forum USA). Since preventing computer crime requires additional controls on information systems, organizations must identify potential computer-related crime, the consequences of that crime, and the cost and complexity of the controls needed to protect against loss from the crime. Sometimes, the cost of the controls may outweigh the potential for loss.
  15. What is Privacy? Privacy is the right to be out of public view or to be left alone. With today’s information systems and networks, the right to privacy has become a challenge (IBM, 2013). Data is continually collected and stored about personal details Associate in Computer Technology IS-PQS 213 Professional ethics, quality consciousness and social issues in computing Bulacan Polytechnic College Date Developed: June 2020 Date Revised: July 2020 Page 6 of 12 Document No. 00-IS-PQS 213 Developed by: Mauro C. Tolentino Revision # 02 and often transmitted over networks without user knowledge. Data collected normally will store inside countless databases throughout the world.
  16. Privacy Act 1988      The objects of this Act are:                      (a)  to promote the protection of the privacy of individuals; and                      (b)  to recognise that the protection of the privacy of individuals is balanced with the interests of entities in carrying out their functions or activities; and                      (c)  to provide the basis for nationally consistent regulation of privacy and the handling of personal information; and                      (d)  to promote responsible and transparent handling of personal information by entities; and                      (e)  to facilitate an efficient credit reporting system while ensuring that the privacy of individuals is respected; and                       (f)  to facilitate the free flow of information across national borders while ensuring that the privacy of individuals is respected; and                      (g)  to provide a means for individuals to complain about an alleged interference with their privacy; and                      (h)  to implement Australia’s international obligation in relation to privacy. Republic Act 10173 – Data Privacy Act of 2012 AN ACT PROTECTING INDIVIDUAL PERSONAL INFORMATION IN INFORMATION AND COMMUNICATIONS SYSTEMS IN THE GOVERNMENT AND THE PRIVATE SECTOR, CREATING FOR THIS PURPOSE A NATIONAL PRIVACY COMMISSION, AND FOR OTHER PURPOSES
  17. The theft of information stored on a computer also falls within this category. The unauthorized procuring of trade secrets for economic gain from a computer system places the computer in the role of being a target of criminal activity.
  18. computer crimes do not fit a specific category in that the spectrum of possible victims includes individuals, financial institutions, government agencies, corporations, and foreign governments
  19. Examples of Computer Crimes Computer crime laws prohibit a person from performing certain acts without authorization, including: 1. Improperly accessing a computer, system, or network; 2. Modifying, damaging, using, disclosing, copying, or taking programs or data; 3. Introducing a virus or other contaminant into a computer system; 4. Using a computer in a scheme to defraud; 5. Interfering with someone else's computer access or use; 6. Using encryption in aid of a crime; 7. Falsifying email source information; and 8. Stealing an information service from a provider.
  20. Examples of Computer Crimes Computer crime laws prohibit a person from performing certain acts without authorization, including: 1. Improperly accessing a computer, system, or network; 2. Modifying, damaging, using, disclosing, copying, or taking programs or data; 3. Introducing a virus or other contaminant into a computer system; 4. Using a computer in a scheme to defraud; 5. Interfering with someone else's computer access or use; 6. Using encryption in aid of a crime; 7. Falsifying email source information; and 8. Stealing an information service from a provider.
  21. Social Network, Cybercrime, and Internet Sex Crimes While bullying, sexual harassment, and child pornography are long-standing crimes and societal problems, the Internet and social network sites have introduced a whole new arena for predators to practice their trade. Cyberbullying Cyberbullying is aggressive harassment that occurs using electronic technology, including cell phones, tablets, and computers using social media sites and chats sites. Cyberbullying includes the sending of unwanted, abusive text messages, photographs, personal information, defamatory and libelous allegations and rumors, and the creation of fake profiles intended to harm victims. Child Pornography and Preying on Minors Child pornographers and child molesters have unfortunately found the Internet to be a useful tool to prey on children as well. The Department of Justice (DOJ) has a special task force devoted to catching these predators, and if your child has been targeted, you should contact law enforcement right away. The DOJ has published a Citizen's Guide on Child Pornography to outline the applicable laws. The Department of Justice also provides additional resources on Internet safety for children and the rights of child victims.
  22. Keep the Computer System Up-To-Date Cybercriminals will use software flaws to attack computer systems frequently and anonymously. Most Windows-based systems can be configured to download software patches and updates automatically. By doing this they will monitor all online activity with the intent to protect the system from viruses and other malicious programs. They will also be upgraded to protect against Spyware and Adware. To be safe on the Internet, the antivirus software should be configured to update itself every time the system connects to the Internet. 2. Protect Your Personal Information Using many of the online services today involves sharing basic personal information to include name, home address, phone number, and email address. Using common-sense is the best way to protect against and prevent Cyber Crime. Do not respond to email messages that contain misspellings, poor grammar, odd phrases, or web sites with strange extensions. When in doubt about responding to an email, consider a telephone call to the organization to verify authenticity. Type the address for the website in the browser instead of clicking on a link. Any financial transaction website should have an “s” after the letters “http” (e.g., https://www.mystore.com AND NOT http://www.mystore.com). The “s” stands for secure and should appear when you are in an area requesting you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon at the bottom of your web browser (usually the righthand corner). Hackers might try to gain access to crash it, delete information, or steal passwords and other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
  23. 3. Install or Update Your Antivirus Software Cybercriminals will use software flaws to attack computer systems frequently and anonymously. Most Windows-based systems can be configured to download software patches and updates automatically. By doing this they will monitor all online activity with the intent to protect the system from viruses and other malicious programs. They will also be upgraded to protect against Spyware and Adware. To be safe on the Internet, the antivirus software should be configured to update itself every time the system connects to the Internet. 4. Protect Your Personal Information Computers must be configured to the security level that is appropriate and comfortable for the user. Too much security can have the adverse effect of frustrating the user and possibly preventing them from accessing certain web content. Using the “help” feature of the operating system can often address many of the questions in this area.
  24. 5. Choose a Strong Password and Protect It Usernames, passwords, and personal identification numbers (PIN) are used for almost every online transaction today. A strong password should be at least eight characters in length with a mixture of letters and numbers. Using the same password for various sites or systems increases the risk of discovery and possible exploitation. It is never a good practice to write a password down and leave it near the system it is intended to be used on. Changing a password every 90 days is a good practice to limit the amount of time it can be used to access sensitive information. 6. Keep Your Firewall Turned On A firewall helps to protect your computer from hackers who might try to gain access to crash it, delete information, or steal passwords and other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.
  25. 7. Read the Fine Print On Website Privacy Policies On many social networking and photo sharing sites, there is the wording on the privacy policies that allow the website to keep information and photos posted to the site, sometimes indefinitely, even after the original has been deleted by the user. While this may not discourage one from posting images or messages, an awareness that this can be later retrieved and disseminated may be a consideration as to what information or photos are posted. What today may seem to be a harmless prank can have a devastating effect on one’s reputation several years later when applying for a job or other opportunity. 8. Review Financial Statements Regularly Reviewing credit card and bank statements regularly will often reduce the impact of identity theft and credit fraud by discovering the problem shortly after the data has been stolen or when the first use of the information is attempted. Credit card protection services can often alert a person when there is unusual activity occurring on his or her account, for example, purchases in a geographically distant location or a high volume of purchases. These alerts should not be taken lightly and could be the first indicator a targeted victim receives that something is wrong.
  26. 9. If It Seems Too Good to Be True, It Is! No one is going to receive a large sum of money from a dead Nigerian politician, win a huge lottery from being “randomly selected from a database of email addresses,” or make big money from “passive residual income a few hours each day working out of your home.” Many of these crimes go unreported because the victim is too embarrassed to admit to law enforcement that they were duped. 10. Turn Off Your Computer With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always-on” renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning the computer off effectively severs an attacker’s connection—be it spyware or a botnet that employs your computer’s resources to reach out to other unwitting users