Republic of the Philippines     EULOGIO “AMANG” RODRIGUEZINSTITUTE OF SCIENCE AND TECHNOLOGY       Nagtahan, Sampaloc, Man...
Sample 1:Digitally altered photos
Sample 2:Digitally altered photos
Sample 3:Digitally altered photosThe New Version        The Old Version
Sample 5:Digitally altered photosOprah, one the most well known celebrities of our time has graced many magazine covers. H...
Sample 1:Photoshop Mistakes                   Missing leg. We love                   Veronica Kay, but the                ...
Sample 2:Photoshop Mistakes                Where’s the belly button?
COMPUTER CRIME   Cyber crime is becoming one of the Net’s    growth businesses.  Today, criminals are    doing everything...
HackingHacking is the obsessive use of computers, or the  unauthorized access and use of networked  computer systems. Hack...
Cyber TheftCyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databas...
Unauthorized use at WorkUnauthorized use of computer resources  especially by employees Playing video games Unauthorized...
Software PiracyUnauthorized copying of data is called software piracy or software theftSoftware is protected by copyright ...
Piracy of Intellectual PropertyMaterials other than software are also  pirated by making multiple copies Piracy of music,...
Computer security risks   Virus-potentially damaging computer    programs that affects, or infects, a    computer negativ...
Symptoms of Computer risks Screen displays unusual message or image Music or unusual sound displays randomly Available ...
Symptoms of Computer risk(cont..) Your computer functions slower than normal Your computer responds slowly and freezes  ...
Safeguard from Computer risks1.   Never start a computer with a floppy disk in drive A,     unless it is an uninfected boo...
Safeguard from Computer risks5.   Check all downloaded programs for viruses, worms,     or Trojan horses. These malicious-...
Unauthorized Access and Use Unauthorized access - the use of a  computer or network without permission Cracker- someone ...
Safeguard from unauthorized               access1.   Acceptable use policy (AUP)- outlines the     activities for which th...
Safeguard from unauthorized        access (continuation)5. Access control-is a security measure that defines who can    ac...
FingerprintReader              Face Recognition System
Other Challenges   Employment challenges because a lot of tasks    have been automated   Computer monitoring causes intr...
Benefits   Medical diagnosis   Crime control   Environmental monitoring   Urban planning   Computer based training  ...
Health Concerns of Computer            Use
Hand Exercises to Reduce Tendonitis
Computer and Health Risks1.   Repetitive strain injury (RSI)-a disorder     of the muscles, nerves, tendons,     ligaments...
Ergonomics appliedscience devoted to incorporating comfort, efficiency and safety into the design of items in the workplace
Computer addiction when  the computer consumes someone’s entire social life
EncryptionThe concept of private key and public key   can be extended to authentication   protocols. There are three types...
FirewallFirewalls are used to restrict access to one   network from another network. Different   types of firewalls exist....
Ethical responsibility of business                 professionalsBusiness ethics are concerned with Equity Rights Honest...
Theories of corporate social                 responsibility   The stockholders theory holds that managers are    agents o...
Principles of technology ethics   Proportionality of benefits to risk   Informed consent to risks   Justice in distribu...
Ethical guideline   Acting with integrity   Increasing your professional competence   Setting high standards of persona...
 Mistakes   arepart of beinghuman.Appreciate yourmistakes     forwhat they are;precious    lifelesson that canonly be lea...
Security & ethical challenges
Security & ethical challenges
Security & ethical challenges
Upcoming SlideShare
Loading in …5
×

Security & ethical challenges

985 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
985
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
67
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security & ethical challenges

  1. 1. Republic of the Philippines EULOGIO “AMANG” RODRIGUEZINSTITUTE OF SCIENCE AND TECHNOLOGY Nagtahan, Sampaloc, Manila GRADUATE PROGRAM MASTER IN PUBLIC ADMINISTRATION TOPIC: Security and Ethical Challenges Management Information Systems DR. LOURDES BANDOY Professor Presented by: LOUIE A. MEDINACELI Management Information Systems 1
  2. 2. Sample 1:Digitally altered photos
  3. 3. Sample 2:Digitally altered photos
  4. 4. Sample 3:Digitally altered photosThe New Version The Old Version
  5. 5. Sample 5:Digitally altered photosOprah, one the most well known celebrities of our time has graced many magazine covers. However in this TV Guide she is seen in a beautiful dress sitting on a pile of cash. You see it? The pile of cash is so fake right? You are right. See anything else? Take a look at the picture below. That’s not Oprah’s body. It’s Ann-Margaret.
  6. 6. Sample 1:Photoshop Mistakes Missing leg. We love Veronica Kay, but the missing leg is not sexy.
  7. 7. Sample 2:Photoshop Mistakes Where’s the belly button?
  8. 8. COMPUTER CRIME Cyber crime is becoming one of the Net’s growth businesses.  Today, criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorism.
  9. 9. HackingHacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Hackers usually Steal or damage data Get unauthorized access to computer files Monitor e-mails or web server access May use remote services that allow one computer to execute programs on another Plant data that will cause system to welcome intruders Management Information Systems 9
  10. 10. Cyber TheftCyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases. Management Information Systems 10
  11. 11. Unauthorized use at WorkUnauthorized use of computer resources especially by employees Playing video games Unauthorized use of internet Non-work related upload/download Transmission of confidential data Moonlighting Management Information Systems 11
  12. 12. Software PiracyUnauthorized copying of data is called software piracy or software theftSoftware is protected by copyright law and user license agreement that allows only limited copies to be made Management Information Systems 12
  13. 13. Piracy of Intellectual PropertyMaterials other than software are also pirated by making multiple copies Piracy of music, video, images, articles, books etc. Dissemination of these material through internet websites Management Information Systems 13
  14. 14. Computer security risks Virus-potentially damaging computer programs that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission; may damage files, software including the operating system Worms-a program that copies itself; could shut down the computer or network Trojan horses-a program that hides within or looks like a legitimate program; does not replicate itself to other computers
  15. 15. Symptoms of Computer risks Screen displays unusual message or image Music or unusual sound displays randomly Available memory is less than expected Existing programs and files disappear Files become corrupted Programs or files do not work properly Unknown programs or files mysteriously appear System properties change
  16. 16. Symptoms of Computer risk(cont..) Your computer functions slower than normal Your computer responds slowly and freezes often Your computer restarts itself often You see uncommon error messages, distorted menus, and dialog boxes You notice applications on your computer fail to work correctly You fail to print correctly
  17. 17. Safeguard from Computer risks1. Never start a computer with a floppy disk in drive A, unless it is an uninfected boot disk. Turn off message preview2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source. Turn off message preview3. Set the macro security in programs so you can enable or disable macros. Only enable macros if the document is from a trusted source and you are expecting it.4. Install an antivirus program on all of your computers. Obtain updates to the antivirus signature files on a regular basis.
  18. 18. Safeguard from Computer risks5. Check all downloaded programs for viruses, worms, or Trojan horses. These malicious-logic programs often placed in seemingly innocent programs, so they will affect a large number of users.6. If the anti-virus program flags an e-mail attachment as infected, delete the attachment immediately.7. Before using any removable storage devices, use the antivirus program to check for infection.8. Create a recovery disk and write protect it.9. Install a personal firewall program
  19. 19. Unauthorized Access and Use Unauthorized access - the use of a computer or network without permission Cracker- someone who tries to access a computer or network illegally Hacker- break into a computer by connecting to it and then logging in as a legitimate user
  20. 20. Safeguard from unauthorized access1. Acceptable use policy (AUP)- outlines the activities for which the computer and network may and may not be used2. Firewalls-deny network access to outsiders and restrict employees’ access to sensitive data like payroll or personnel records3. Intrusion detection software- automatically analyzes all network traffic, assess system vulnerabilities, identifies any unauthorized access (intrusions) and notifies
  21. 21. Safeguard from unauthorized access (continuation)5. Access control-is a security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computerand audit trails- or log, that records in a file both successful and unsuccessful access attemptsa. User names-a unique combination of characters like letters of the alphabet, that identifies one specific userb. and passwords-a private combination of characters associated with the user name that allows access to certain computer resourcesc. Possessed objects-any items that you must carry to gain access to a computer or computer facility (badges, cards, smart cards, keys)d. Biometric devices-grant access to programs using biometric identifies like finger prints, face recognition, voice recognitione. Callback system-user connects to a computer only after the computer calls that user back at a previously established telephone number
  22. 22. FingerprintReader Face Recognition System
  23. 23. Other Challenges Employment challenges because a lot of tasks have been automated Computer monitoring causes intrusion in personal space for workers Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs Challenges to individuality as they eliminate the human relationships between people Management Information Systems 23
  24. 24. Benefits Medical diagnosis Crime control Environmental monitoring Urban planning Computer based training Distance learning Management Information Systems 24
  25. 25. Health Concerns of Computer Use
  26. 26. Hand Exercises to Reduce Tendonitis
  27. 27. Computer and Health Risks1. Repetitive strain injury (RSI)-a disorder of the muscles, nerves, tendons, ligaments and joints2. Computer vision syndrome-sore, tired, burning, itching or dry eyes; blurred or double vision, etc.3. Lower back pain, muscle fatigue and emotional fatigue
  28. 28. Ergonomics appliedscience devoted to incorporating comfort, efficiency and safety into the design of items in the workplace
  29. 29. Computer addiction when the computer consumes someone’s entire social life
  30. 30. EncryptionThe concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations.1. Password Authentication protocol2. Challenge Handshake authentication Protocol3. Extensible Authentication Protocol Management Information Systems 33
  31. 31. FirewallFirewalls are used to restrict access to one network from another network. Different types of firewalls exist.1. Packet Filtering2. Stateful firewalls3. Proxy Firewalls4. Kernel Proxy firewalls Management Information Systems 34
  32. 32. Ethical responsibility of business professionalsBusiness ethics are concerned with Equity Rights Honesty Exercise of corporate power Management Information Systems 35
  33. 33. Theories of corporate social responsibility The stockholders theory holds that managers are agents of the stockholders and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent activities. The social contract theory states that companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract The stakeholders theory states that managers have ethical responsibility to manage a firm for the benefit of all of its stakeholders i.e. stockholders, employees, customers, suppliers and Informationcommunity. Management local Systems 36
  34. 34. Principles of technology ethics Proportionality of benefits to risk Informed consent to risks Justice in distribution of risk with benefits derived to each sub unit Minimized risk by the selected option Management Information Systems 37
  35. 35. Ethical guideline Acting with integrity Increasing your professional competence Setting high standards of personal performance Accepting responsibility for your work Advancing the health, privacy, and general welfare of the public Management Information Systems 38
  36. 36.  Mistakes arepart of beinghuman.Appreciate yourmistakes forwhat they are;precious lifelesson that canonly be learnedthe hard way.

×