security and ethical challenges in information systems
1. SECURITY AND ETHICAL CHALLENGES IN
INFORMATION SYSTEMS
JAMIA HAMDARD
SCHOOL OF MANAGEMENT AND BUSINESS STUDIES
Submitted by:
Hiba Siraj
Hasan Yasir
Harsha Choudhary
Imaad Khan
Hilal Parvez Submitted to: Dr. Abdullah
2. WHAT IS MIS SECURITY?
MIS security refers to measures put in place to protect information
system resources from unauthorized access or being compromised.
Security vulnerabilities are weaknesses in a computer system,
software, or hardware that can be exploited by the attacker to gain
unauthorized access or compromise a system.
3. WHY MIS SECURITY?
▪ Information systems security is very important to help protect against all types
of theft.
▪ Companies and organizations are especially vulnerable since they have a
wealth of information from their employees.
▪ The main focus of this industry is to protect these systems and to prevent the
information from being stolen too.
4. SECURITY CHALLENGES
Computer crimes that exist in the present society are:
◦ Hacking
◦ Cyber Theft
◦ Unauthorized use at work
◦ Software Piracy
◦ Piracy of intellectual property
◦ Computer viruses and worms
5. PRIVACY ISSUES
◦ -Privacy on the internet
◦ -Computer Matching
◦ -Privacy Laws
◦ -Computer libel and censorship (threats are spamming
and flaming)
6. ETHICS IN INFORMATION TECHNOLOGY
◦ Ethics in information technology is important because it creates a culture of
trust, responsibility, integrity and excellence in the use of resources.
◦ Ethics also promotes privacy, confidentiality of information and unauthorized
access to computer networks, helping to prevent conflict and dishonesty.
7. ETHICAL RESPONSIBILITY IN BUSINESS
Business ethics are concerned with-
◦ Equity Rights
◦ Honesty
◦ Exercise of corporate power
8. UNETHICAL BEHAVIOURS IN A WORKPLACE
The 5 most common unethical behaviors in the workplace are:
◦ Misusing company time
◦ Abusive behavior.
◦ Employee theft
◦ Lying to employees.
◦ Violating company internet policies.
9. MANAGEMENT OF ETHICAL CHALLENGES IN
INFORMATION SYSTEMS
▪ Follow your own code of personal conduct.
▪ While at work, focus on your work.
▪ Don’t appropriate office supplies or products or other company resources for
your own use.
▪ Be honest.
▪ Build your own character.
10. SECURITY MANAGEMENT OF IT
• Encryption
• Firewalls
• Denial of service attack
• E-mail monitoring
• Virus defense
• Security codes
• Audits
• Backup files
• Security monitors
• Biometric security
• Computer failure controls
• Fault tolerant systems
• Disaster recovery
• System controls
11. CONCLUSION
▪ Technical and technological security measures are sometimes insufficient
to protect an information system. Because there is a human factor in
information system.
▪ Ethics are set of moral rules that guide people.
▪ With the help of ethics a better and robust security can be achieved.