SlideShare a Scribd company logo
Chapter 13 Security and
Ethical Challenges
James A. O'Brien, and George Marakas.
Management Information Systems with MISource
2007, 8th
ed. Boston, MA: McGraw-Hill, Inc.,
2007. ISBN: 13 9780073323091
IT Security, Ethics, and Society
2Chapter 13 Security and Ethical Challenges
 IT has both beneficial
and detrimental
effects on society and
people
 Manage work
activities to
minimize the
detrimental effects
of IT
 Optimize the
beneficial effects
Business Ethics
 Ethics questions that managers confront as part
of their daily business decision making include:
Equity
Rights
Honesty
Exercise of corporate power
3Chapter 13 Security and Ethical Challenges
Categories of Ethical Business
Issues
4Chapter 13 Security and Ethical Challenges
Corporate Social Responsibility
Theories
 Stockholder Theory
 Managers are agents of the stockholders
 Their only ethical responsibility is to increase the profits of
the business without violating the law or engaging in
fraudulent practices
 Social Contract Theory
 Companies have ethical responsibilities to all members of
society, who allow corporations to exist
 Stakeholder Theory
 Managers have an ethical responsibility to manage a firm
for the benefit of all its stakeholders
 Stakeholders are all individuals and groups that have a
stake in, or claim on, a company
5Chapter 13 Security and Ethical Challenges
Principles of Technology Ethics
 Proportionality - The good achieved by the technology must
outweigh the harm or risk; there must be no alternative that
achieves the same or comparable benefits with less harm or
risk
 Informed Consent - Those affected by the technology should
understand and accept the risks
 Justice
 The benefits and burdens of the technology should be
distributed fairly
 Those who benefit should bear their fair share of the risks,
and those who do not benefit should not suffer a significant
increase in risk
 Minimized Risk - Even if judged acceptable by the other three
guidelines, the technology must be implemented so as to
avoid all unnecessary risk
6Chapter 13 Security and Ethical Challenges
AITP Standards of Professional
Conduct
7Chapter 13 Security and Ethical Challenges
Responsible Professional
Guidelines
 A responsible professional
Acts with integrity
Increases personal competence
Sets high standards of personal performance
Accepts responsibility for his/her work
Advances the health, privacy, and general
welfare of the public
8Chapter 13 Security and Ethical Challenges
Computer Crime
 Computer crime includes
Unauthorized use, access, modification, or
destruction of hardware, software, data, or
network resources
The unauthorized release of information
The unauthorized copying of software
Denying an end user access to his/her own
hardware, software, data, or network resources
Using or conspiring to use computer or
network resources illegally to obtain
information or tangible property
9Chapter 13 Security and Ethical Challenges
Cybercrime Protection Measures
10Chapter 13 Security and Ethical Challenges
Hacking
 Hacking is
The obsessive use of computers
The unauthorized access and use of networked
computer systems
 Electronic Breaking and Entering
Hacking into a computer system and reading
files, but neither stealing nor damaging anything
 Cracker
A malicious or criminal hacker who maintains
knowledge of the vulnerabilities found for
private advantage
11Chapter 13 Security and Ethical Challenges
Common Hacking Tactics
 Denial of Service
 Hammering a website’s equipment with too many requests for
information
 Clogging the system, slowing performance, or crashing the site
 Scans
 Widespread probes of the Internet to determine types of
computers, services, and connections
 Looking for weaknesses
 Sniffer
 Programs that search individual packets of data as they pass
through the Internet
 Capturing passwords or entire contents
 Spoofing
 Faking an e-mail address or Web page to trick users into
passing along critical information like passwords or credit card
numbers
12Chapter 13 Security and Ethical Challenges
Common Hacking Tactics
 Trojan House
 A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software
 Back Doors
 A hidden point of entry to be used in case the original entry
point is detected or blocked
 Malicious Applets
 Tiny Java programs that misuse your computer’s resources,
modify files on the hard disk, send fake email, or steal
passwords
 War Dialing
 Programs that automatically dial thousands of telephone
numbers in search of a way in through a modem connection
 Logic Bombs
 An instruction in a computer program that triggers a malicious
act
13Chapter 13 Security and Ethical Challenges
Common Hacking Tactics
 Buffer Overflow
 Crashing or gaining control of a computer by sending too much
data to buffer memory
 Password Crackers
 Software that can guess passwords
 Social Engineering
 Gaining access to computer systems by talking unsuspecting
company employees out of valuable information, such as
passwords
 Dumpster Diving
 Sifting through a company’s garbage to find information to help
break into their computers
14Chapter 13 Security and Ethical Challenges
Cyber Theft
 Many computer crimes involve the theft of
money
 The majority are “inside jobs” that involve
unauthorized network entry and alternation of
computer databases to cover the tracks of the
employees involved
 Many attacks occur through the Internet
 Most companies don’t reveal that they have
been targets or victims of cybercrime
15Chapter 13 Security and Ethical Challenges
Unauthorized Use at Work
 Unauthorized use of computer systems and
networks is time and resource theft
Doing private consulting
Doing personal finances
Playing video games
Unauthorized use of the Internet or company
networks
 Sniffers
Used to monitor network traffic or capacity
Find evidence of improper use
16Chapter 13 Security and Ethical Challenges
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement/plagiarism
Newsgroup postings
Transmission of confidential data
Pornography
Hacking
Non-work-related download/upload
Leisure use of the Internet
Use of external ISPs
Moonlighting
17Chapter 13 Security and Ethical Challenges
Software Piracy
 Software Piracy
Unauthorized copying of computer programs
 Licensing
Purchasing software is really a payment
for a license for fair use
Site license allows a certain number of copies
18
A third of the software
industry’s revenues are
lost to piracy
Chapter 13 Security and Ethical Challenges
Theft of Intellectual Property
 Intellectual Property
Copyrighted material
Includes such things as music, videos,
images, articles, books, and software
 Copyright Infringement is Illegal
Peer-to-peer networking techniques have
made it easy to trade pirated intellectual
property
 Publishers Offer Inexpensive Online Music
Illegal downloading of music and video is
down and continues to drop
19Chapter 13 Security and Ethical Challenges
Viruses and Worms
 A virus is a program that cannot work without
being inserted into another program
A worm can run unaided
 These programs copy annoying or destructive
routines into networked computers
Copy routines spread the virus
 Commonly transmitted through
The Internet and online services
Email and file attachments
Disks from contaminated computers
Shareware
20Chapter 13 Security and Ethical Challenges
Top Five Virus Families of all Time
 My Doom, 2004
 Spread via email and over Kazaa file-sharing network
 Installs a back door on infected computers
 Infected email poses as returned message or one that can’t be
opened correctly, urging recipient to click on attachment
 Opens up TCP ports that stay open even after termination of
the worm
 Upon execution, a copy of Notepad is opened, filled with
nonsense characters
 Netsky, 2004
 Mass-mailing worm that spreads by emailing itself to all email
addresses found on infected computers
 Tries to spread via peer-to-peer file sharing by copying itself
into the shared folder
 It renames itself to pose as one of 26 other common files along
the way
21Chapter 13 Security and Ethical Challenges
Top Five Virus Families of all Time
 SoBig, 2004
 Mass-mailing email worm that arrives as
an attachment
 Examples: Movie_0074.mpg.pif, Document003.pif
 Scans all .WAB, .WBX, .HTML, .EML, and .TXT files looking for
email addresses to which it can send itself
 Also attempts to download updates for itself
 Klez, 2002
 A mass-mailing email worm that arrives with a randomly named
attachment
 Exploits a known vulnerability in MS Outlook to auto-execute on
unpatched clients
 Tries to disable virus scanners and then copy itself to all local
and networked drives with a random file name
 Deletes all files on the infected machine and any mapped
network drives on the 13th of all even-numbered months
22Chapter 13 Security and Ethical Challenges
Top Five Virus Families of all Time
 Sasser, 2004
 Exploits a Microsoft vulnerability to spread from computer to
computer with no user intervention
 Spawns multiple threads that scan local subnets for
vulnerabilities
23Chapter 13 Security and Ethical Challenges
The Cost of Viruses, Trojans,
Worms
 Cost of the top five virus families
Nearly 115 million computers in 200 countries
were infected in 2004
Up to 11 million computers are believed to
be permanently infected
In 2004, total economic damage from virus
proliferation was $166 to $202 billion
Average damage per computer is between
$277 and $366
24Chapter 13 Security and Ethical Challenges
Adware and Spyware
 Adware
Software that purports to serve a useful
purpose, and often does
Allows advertisers to display pop-up and
banner ads without the consent of the
computer users
 Spyware
Adware that uses an Internet connection in
the background, without the user’s permission
or knowledge
Captures information about the user and
sends it over the Internet 25Chapter 13 Security and Ethical Challenges
Spyware Problems
 Spyware can steal private information and also
Add advertising links to Web pages
Redirect affiliate payments
Change a users home page and search settings
Make a modem randomly call premium-rate
phone numbers
Leave security holes that let Trojans in
Degrade system performance
 Removal programs are often not completely
successful in eliminating spyware
26Chapter 13 Security and Ethical Challenges
Privacy Issues
 The power of information technology to store
and retrieve information can have a negative
effect on every individual’s right to privacy
Personal information is collected with every
visit to a Web site
Confidential information stored by credit
bureaus, credit card companies, and the
government has been stolen or misused
27Chapter 13 Security and Ethical Challenges
Opt-in Versus Opt-out
 Opt-In
You explicitly consent to allow data to be
compiled about you
This is the default in Europe
 Opt-Out
Data can be compiled about you unless you
specifically request it not be
This is the default in the U.S.
28Chapter 13 Security and Ethical Challenges
Privacy Issues
 Violation of Privacy
 Accessing individuals’ private email conversations and
computer records
 Collecting and sharing information about individuals gained
from their visits to Internet websites
 Computer Monitoring
 Always knowing where a person is
 Mobile and paging services are becoming more closely
associated with people than with places
 Computer Matching
 Using customer information gained from many sources to
market additional business services
 Unauthorized Access of Personal Files
 Collecting telephone numbers, email addresses, credit card
numbers, and other information to build customer profiles
29Chapter 13 Security and Ethical Challenges
Protecting Your Privacy on the
Internet
 There are multiple ways to protect your privacy
Encrypt email
Send newsgroup postings through
anonymous remailers
Ask your ISP not to sell your name and
information to mailing list providers and
other marketers
Don’t reveal personal data and interests on
online service and website user profiles
30Chapter 13 Security and Ethical Challenges
Privacy Laws
 Electronic Communications Privacy Act
and Computer Fraud and Abuse Act
 Prohibit intercepting data communications messages, stealing or
destroying data, or trespassing in federal-related computer
systems
 U.S. Computer Matching and Privacy Act
 Regulates the matching of data held in federal agency files to
verify eligibility for federal programs
 Other laws impacting privacy and how
much a company spends on compliance
 Sarbanes-Oxley
 Health Insurance Portability and Accountability Act (HIPAA)
 Gramm-Leach-Bliley
 USA Patriot Act
 California Security Breach Law
 Securities and Exchange Commission rule 17a-4
31Chapter 13 Security and Ethical Challenges
Computer Libel and Censorship
 The opposite side of the privacy debate…
 Freedom of information, speech, and press
 Biggest battlegrounds - bulletin boards, email boxes, and
online files of Internet and public networks
 Weapons used in this battle – spamming, flame mail,
libel laws, and censorship
 Spamming - Indiscriminate sending of unsolicited email
messages to many Internet users
 Flaming
 Sending extremely critical, derogatory, and often
vulgar email messages or newsgroup posting to other
users on the Internet or online services
 Especially prevalent on special-interest newsgroups
32Chapter 13 Security and Ethical Challenges
Cyberlaw
 Laws intended to regulate activities over the Internet or via
electronic communication devices
 Encompasses a wide variety of legal and political issues
 Includes intellectual property, privacy, freedom of
expression, and jurisdiction
 The intersection of technology and the law is controversial
 Some feel the Internet should not be regulated
 Encryption and cryptography make traditional form of
regulation difficult
 The Internet treats censorship as damage and simply
routes around it
 Cyberlaw only began to emerge in 1996
 Debate continues regarding the applicability of legal
principles derived from issues that had nothing to do with
cyberspace
33Chapter 13 Security and Ethical Challenges
Other Challenges
 Employment
 IT creates new jobs and increases productivity
 It can also cause significant reductions in job opportunities, as well as
requiring new job skills
 Computer Monitoring
 Using computers to monitor the productivity and behavior of employees as
they work
 Criticized as unethical because it monitors individuals, not just work, and is
done constantly
 Criticized as invasion of privacy because many employees do not know
they are being monitored
 Working Conditions
 IT has eliminated monotonous or obnoxious tasks
 However, some skilled craftsperson jobs have been replaced by jobs
requiring routine, repetitive tasks or standby roles
 Individuality
 Dehumanizes and depersonalizes activities because computers eliminate
human relationships
 Inflexible systems
34Chapter 13 Security and Ethical Challenges
Health Issues
 Cumulative Trauma Disorders (CTDs)
Disorders suffered by people who sit at a
PC or terminal and do fast-paced repetitive
keystroke jobs
 Carpal Tunnel Syndrome
Painful, crippling ailment of the hand
and wrist
Typically requires surgery to cure
35Chapter 13 Security and Ethical Challenges
Ergonomics
 Designing healthy
work environments
 Safe, comfortable,
and pleasant for
people to work in
 Increases
employee morale
and productivity
 Also called human
factors
engineering
36Chapter 13 Security and Ethical Challenges
Ergonomics Factors
Societal Solutions
 Using information technologies to solve human
and social problems
Medical diagnosis
Computer-assisted instruction
Governmental program planning
Environmental quality control
Law enforcement
Job placement
 The detrimental effects of IT
Often caused by individuals or organizations
not accepting ethical responsibility for their
actions
37Chapter 13 Security and Ethical Challenges
Security Management of IT
 The Internet was developed for inter-operability,
not impenetrability
Business managers and professionals alike
are responsible for the security, quality, and
performance of business information systems
Hardware, software, networks, and data
resources must be protected by a variety
of security measures
38Chapter 13 Security and Ethical Challenges
Security Management
 The goal of security
management is the
accuracy, integrity,
and safety of all
information system
processes and
resources
39Chapter 13 Security and Ethical Challenges
Internetworked Security Defenses
 Encryption
Data is transmitted in scrambled form
It is unscrambled by computer systems for
authorized users only
The most widely used method uses a pair of
public and private keys unique to each
individual
40Chapter 13 Security and Ethical Challenges
Public/Private Key Encryption
41Chapter 13 Security and Ethical Challenges
Internetworked Security Defenses
 Firewalls
A gatekeeper system that protects a
company’s intranets and other computer
networks from intrusion
Provides a filter and safe transfer point for
access to/from the Internet and other
networks
Important for individuals who connect to the
Internet with DSL or cable modems
Can deter hacking, but cannot prevent it
42Chapter 13 Security and Ethical Challenges
Internet and Intranet Firewalls
43Chapter 13 Security and Ethical Challenges
Denial of Service Attacks
 Denial of service attacks depend on three
layers of networked computer systems
The victim’s website
The victim’s Internet service provider
Zombie or slave computers that have been
commandeered by the cybercriminals
44Chapter 13 Security and Ethical Challenges
Defending Against Denial of Service
 At Zombie Machines
Set and enforce security policies
Scan for vulnerabilities
 At the ISP
Monitor and block traffic spikes
 At the Victim’s Website
Create backup servers and network
connections
45Chapter 13 Security and Ethical Challenges
Internetworked Security Defenses
 Email Monitoring
Use of content monitoring software that scans
for troublesome words that might compromise
corporate security
 Virus Defenses
Centralize the updating and distribution of
antivirus software
Use a security suite that integrates virus
protection with firewalls, Web security,
and content blocking features
46Chapter 13 Security and Ethical Challenges
Other Security Measures
 Security Codes
 Multilevel password system
 Encrypted passwords
 Smart cards with microprocessors
 Backup Files
 Duplicate files of data or programs
 Security Monitors
 Monitor the use of computers and networks
 Protects them from unauthorized use, fraud, and destruction
 Biometrics
 Computer devices measure physical traits that make each
individual unique
 Voice recognition, fingerprints, retina scan
 Computer Failure Controls
 Prevents computer failures or minimizes its effects
 Preventive maintenance
 Arrange backups with a disaster recovery organization
47Chapter 13 Security and Ethical Challenges
Other Security Measures
 In the event of a system failure, fault-tolerant systems have
redundant processors, peripherals, and software that provide
 Fail-over capability: shifts to back up components
 Fail-save capability: the system continues to operate at the
same level
 Fail-soft capability: the system continues to operate at a
reduced but acceptable level
 A disaster recovery plan contains formalized procedures to follow
in the event of a disaster
 Which employees will participate
 What their duties will be
 What hardware, software, and facilities will be used
 Priority of applications that will be processed
 Use of alternative facilities
 Offsite storage of databases
48Chapter 13 Security and Ethical Challenges
Information System Controls
 Methods and
devices that
attempt to
ensure the
accuracy,
validity, and
propriety of
information
system
activities
49Chapter 13 Security and Ethical Challenges
Auditing IT Security
 IT Security Audits
Performed by internal or external auditors
Review and evaluation of security measures
and management policies
Goal is to ensure that that proper and
adequate measures and policies are in place
50Chapter 13 Security and Ethical Challenges
Protecting Yourself from
Cybercrime
51Chapter 13 Security and Ethical Challenges

More Related Content

What's hot

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Information systems in global business today
Information systems in global business todayInformation systems in global business today
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
Sukanya Ben
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Today
tvto1381
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
Sukanya Ben
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
stanbridge
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
Sukanya Ben
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
Fizaril Amzari Omar
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
Sukanya Ben
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
Prof. Othman Alsalloum
 
Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
Advance Saraswati Prakashan Pvt Ltd
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
Sukanya Ben
 
Chap05 Data Resource Management
Chap05 Data Resource ManagementChap05 Data Resource Management
Chap05 Data Resource Management
Aqib Syed
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
Sammer Qader
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
mmuser2014
 
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging TechnologiesIT Infrastructure and Emerging Technologies

What's hot (20)

INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information systems in global business today
Information systems in global business todayInformation systems in global business today
Information systems in global business today
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Today
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
 
Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Chapter 13 security and ethical challenges
Chapter 13  security and ethical challengesChapter 13  security and ethical challenges
Chapter 13 security and ethical challenges
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
Chap05 Data Resource Management
Chap05 Data Resource ManagementChap05 Data Resource Management
Chap05 Data Resource Management
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging TechnologiesIT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging Technologies
 

Similar to Chap13 Security and Ethical Challenges

Newethics
NewethicsNewethics
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
I P Abir
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
Pradeep513562
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Ch12
Ch12Ch12
Ch12
kelasapa
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
Priya Diana Mercy
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
ssuser5162c9
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
Katy Kate
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testers
yasirabdullah15
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniques
yasirabdullah15
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expert
jmbrrvgzhr
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
Rishab garg
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
Somesh Kumar
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
RamaNingaiah
 

Similar to Chap13 Security and Ethical Challenges (20)

Newethics
NewethicsNewethics
Newethics
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ch12
Ch12Ch12
Ch12
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testers
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniques
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expert
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Hamza
HamzaHamza
Hamza
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 

More from Aqib Syed

Text Mining - Advanced Customer Analytics
Text Mining - Advanced Customer AnalyticsText Mining - Advanced Customer Analytics
Text Mining - Advanced Customer Analytics
Aqib Syed
 
KNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdf
KNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdfKNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdf
KNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdf
Aqib Syed
 
Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...
Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...
Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...
Aqib Syed
 
E Scooters in Scandinavia and Sustainability
E Scooters in Scandinavia and SustainabilityE Scooters in Scandinavia and Sustainability
E Scooters in Scandinavia and Sustainability
Aqib Syed
 
The Great Leader Muhammad Ali Jinnah
The Great Leader Muhammad Ali JinnahThe Great Leader Muhammad Ali Jinnah
The Great Leader Muhammad Ali Jinnah
Aqib Syed
 
Sir Syed Ahmed Khan Bahadur -History of Pakistan
Sir Syed Ahmed Khan Bahadur -History of PakistanSir Syed Ahmed Khan Bahadur -History of Pakistan
Sir Syed Ahmed Khan Bahadur -History of Pakistan
Aqib Syed
 
Pakistan Resolution 1940 -History of Pakistan
Pakistan Resolution 1940 -History of PakistanPakistan Resolution 1940 -History of Pakistan
Pakistan Resolution 1940 -History of Pakistan
Aqib Syed
 
Rise of Mughal Empire (1625-1707)- History of SubContinent
Rise of Mughal Empire (1625-1707)-  History of SubContinentRise of Mughal Empire (1625-1707)-  History of SubContinent
Rise of Mughal Empire (1625-1707)- History of SubContinent
Aqib Syed
 
Decline of Mughals (1707-1857) -History of SubContinent
Decline of Mughals (1707-1857) -History of SubContinentDecline of Mughals (1707-1857) -History of SubContinent
Decline of Mughals (1707-1857) -History of SubContinent
Aqib Syed
 
Allama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinent
Allama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinentAllama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinent
Allama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinent
Aqib Syed
 
East Pakistan Separation- History of SubContinent
East Pakistan  Separation- History of SubContinentEast Pakistan  Separation- History of SubContinent
East Pakistan Separation- History of SubContinent
Aqib Syed
 
General Muhammad Zia Ul Haq - Dictatorship in Pakistan
General Muhammad Zia Ul Haq - Dictatorship in PakistanGeneral Muhammad Zia Ul Haq - Dictatorship in Pakistan
General Muhammad Zia Ul Haq - Dictatorship in Pakistan
Aqib Syed
 
Zulfiqar Ali Bhutto- A Politician
Zulfiqar Ali Bhutto- A Politician Zulfiqar Ali Bhutto- A Politician
Zulfiqar Ali Bhutto- A Politician
Aqib Syed
 
Ashoka- The Great _History of Subcontinent
Ashoka- The Great _History of SubcontinentAshoka- The Great _History of Subcontinent
Ashoka- The Great _History of Subcontinent
Aqib Syed
 
Perception and Marketing- Consumer Behavior
Perception and Marketing- Consumer BehaviorPerception and Marketing- Consumer Behavior
Perception and Marketing- Consumer Behavior
Aqib Syed
 
Learning, Memory and Retrieval
Learning, Memory and RetrievalLearning, Memory and Retrieval
Learning, Memory and Retrieval
Aqib Syed
 
Exposure, Attention and Interpretation -Consumer Behavior
Exposure, Attention and Interpretation -Consumer BehaviorExposure, Attention and Interpretation -Consumer Behavior
Exposure, Attention and Interpretation -Consumer Behavior
Aqib Syed
 
Emotions and Marketing Strategy- Cosnumer Behavior
Emotions and Marketing Strategy- Cosnumer BehaviorEmotions and Marketing Strategy- Cosnumer Behavior
Emotions and Marketing Strategy- Cosnumer Behavior
Aqib Syed
 
Attitude - Consumer Behavior
Attitude - Consumer BehaviorAttitude - Consumer Behavior
Attitude - Consumer Behavior
Aqib Syed
 
Measuring Sources of Brand Equity -Brand Management
Measuring Sources of Brand Equity -Brand ManagementMeasuring Sources of Brand Equity -Brand Management
Measuring Sources of Brand Equity -Brand Management
Aqib Syed
 

More from Aqib Syed (20)

Text Mining - Advanced Customer Analytics
Text Mining - Advanced Customer AnalyticsText Mining - Advanced Customer Analytics
Text Mining - Advanced Customer Analytics
 
KNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdf
KNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdfKNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdf
KNOWLEDGE BASED ENTREPRENEURSHIP - ALT Business Plan59cc9dee8.pdf
 
Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...
Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...
Challenged-Based Learning Project on IVAR IKS (Digitalisation and sustainabil...
 
E Scooters in Scandinavia and Sustainability
E Scooters in Scandinavia and SustainabilityE Scooters in Scandinavia and Sustainability
E Scooters in Scandinavia and Sustainability
 
The Great Leader Muhammad Ali Jinnah
The Great Leader Muhammad Ali JinnahThe Great Leader Muhammad Ali Jinnah
The Great Leader Muhammad Ali Jinnah
 
Sir Syed Ahmed Khan Bahadur -History of Pakistan
Sir Syed Ahmed Khan Bahadur -History of PakistanSir Syed Ahmed Khan Bahadur -History of Pakistan
Sir Syed Ahmed Khan Bahadur -History of Pakistan
 
Pakistan Resolution 1940 -History of Pakistan
Pakistan Resolution 1940 -History of PakistanPakistan Resolution 1940 -History of Pakistan
Pakistan Resolution 1940 -History of Pakistan
 
Rise of Mughal Empire (1625-1707)- History of SubContinent
Rise of Mughal Empire (1625-1707)-  History of SubContinentRise of Mughal Empire (1625-1707)-  History of SubContinent
Rise of Mughal Empire (1625-1707)- History of SubContinent
 
Decline of Mughals (1707-1857) -History of SubContinent
Decline of Mughals (1707-1857) -History of SubContinentDecline of Mughals (1707-1857) -History of SubContinent
Decline of Mughals (1707-1857) -History of SubContinent
 
Allama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinent
Allama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinentAllama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinent
Allama Muhammad Iqbal as a Dreamer of Pakistan- History of SubContinent
 
East Pakistan Separation- History of SubContinent
East Pakistan  Separation- History of SubContinentEast Pakistan  Separation- History of SubContinent
East Pakistan Separation- History of SubContinent
 
General Muhammad Zia Ul Haq - Dictatorship in Pakistan
General Muhammad Zia Ul Haq - Dictatorship in PakistanGeneral Muhammad Zia Ul Haq - Dictatorship in Pakistan
General Muhammad Zia Ul Haq - Dictatorship in Pakistan
 
Zulfiqar Ali Bhutto- A Politician
Zulfiqar Ali Bhutto- A Politician Zulfiqar Ali Bhutto- A Politician
Zulfiqar Ali Bhutto- A Politician
 
Ashoka- The Great _History of Subcontinent
Ashoka- The Great _History of SubcontinentAshoka- The Great _History of Subcontinent
Ashoka- The Great _History of Subcontinent
 
Perception and Marketing- Consumer Behavior
Perception and Marketing- Consumer BehaviorPerception and Marketing- Consumer Behavior
Perception and Marketing- Consumer Behavior
 
Learning, Memory and Retrieval
Learning, Memory and RetrievalLearning, Memory and Retrieval
Learning, Memory and Retrieval
 
Exposure, Attention and Interpretation -Consumer Behavior
Exposure, Attention and Interpretation -Consumer BehaviorExposure, Attention and Interpretation -Consumer Behavior
Exposure, Attention and Interpretation -Consumer Behavior
 
Emotions and Marketing Strategy- Cosnumer Behavior
Emotions and Marketing Strategy- Cosnumer BehaviorEmotions and Marketing Strategy- Cosnumer Behavior
Emotions and Marketing Strategy- Cosnumer Behavior
 
Attitude - Consumer Behavior
Attitude - Consumer BehaviorAttitude - Consumer Behavior
Attitude - Consumer Behavior
 
Measuring Sources of Brand Equity -Brand Management
Measuring Sources of Brand Equity -Brand ManagementMeasuring Sources of Brand Equity -Brand Management
Measuring Sources of Brand Equity -Brand Management
 

Recently uploaded

PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
Ksquare Energy Pvt. Ltd.
 
Prescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPTPrescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPT
Freelance
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
hello960827
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
valvereliz227
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
PennapaKeavsiri
 
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
dpbossdpboss69
 
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani case
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Niswey
 
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium PresentationKirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
BBPMedia1
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
IPLTech Electric
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 

Recently uploaded (20)

PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
PM Surya Ghar Muft Bijli Yojana: Online Application, Eligibility, Subsidies &...
 
Prescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPTPrescriptive analytics BA4206 Anna University PPT
Prescriptive analytics BA4206 Anna University PPT
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
 
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
欧洲杯赌球-欧洲杯赌球买球官方官网-欧洲杯赌球比赛投注官网|【​网址​🎉ac55.net🎉​】
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
 
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
Call 8867766396 Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian M...
 
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Indian Matka
 
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...
 
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium PresentationKirill Klip GEM Royalty TNR Gold Lithium Presentation
Kirill Klip GEM Royalty TNR Gold Lithium Presentation
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
IMG_20240615_091110.pdf dpboss guessing
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
Dpboss Matka Guessing Satta Matta Matka Kalyan panel Chart Indian Matka Dpbos...
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 

Chap13 Security and Ethical Challenges

  • 1. Chapter 13 Security and Ethical Challenges James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
  • 2. IT Security, Ethics, and Society 2Chapter 13 Security and Ethical Challenges  IT has both beneficial and detrimental effects on society and people  Manage work activities to minimize the detrimental effects of IT  Optimize the beneficial effects
  • 3. Business Ethics  Ethics questions that managers confront as part of their daily business decision making include: Equity Rights Honesty Exercise of corporate power 3Chapter 13 Security and Ethical Challenges
  • 4. Categories of Ethical Business Issues 4Chapter 13 Security and Ethical Challenges
  • 5. Corporate Social Responsibility Theories  Stockholder Theory  Managers are agents of the stockholders  Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices  Social Contract Theory  Companies have ethical responsibilities to all members of society, who allow corporations to exist  Stakeholder Theory  Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders  Stakeholders are all individuals and groups that have a stake in, or claim on, a company 5Chapter 13 Security and Ethical Challenges
  • 6. Principles of Technology Ethics  Proportionality - The good achieved by the technology must outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk  Informed Consent - Those affected by the technology should understand and accept the risks  Justice  The benefits and burdens of the technology should be distributed fairly  Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk  Minimized Risk - Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk 6Chapter 13 Security and Ethical Challenges
  • 7. AITP Standards of Professional Conduct 7Chapter 13 Security and Ethical Challenges
  • 8. Responsible Professional Guidelines  A responsible professional Acts with integrity Increases personal competence Sets high standards of personal performance Accepts responsibility for his/her work Advances the health, privacy, and general welfare of the public 8Chapter 13 Security and Ethical Challenges
  • 9. Computer Crime  Computer crime includes Unauthorized use, access, modification, or destruction of hardware, software, data, or network resources The unauthorized release of information The unauthorized copying of software Denying an end user access to his/her own hardware, software, data, or network resources Using or conspiring to use computer or network resources illegally to obtain information or tangible property 9Chapter 13 Security and Ethical Challenges
  • 10. Cybercrime Protection Measures 10Chapter 13 Security and Ethical Challenges
  • 11. Hacking  Hacking is The obsessive use of computers The unauthorized access and use of networked computer systems  Electronic Breaking and Entering Hacking into a computer system and reading files, but neither stealing nor damaging anything  Cracker A malicious or criminal hacker who maintains knowledge of the vulnerabilities found for private advantage 11Chapter 13 Security and Ethical Challenges
  • 12. Common Hacking Tactics  Denial of Service  Hammering a website’s equipment with too many requests for information  Clogging the system, slowing performance, or crashing the site  Scans  Widespread probes of the Internet to determine types of computers, services, and connections  Looking for weaknesses  Sniffer  Programs that search individual packets of data as they pass through the Internet  Capturing passwords or entire contents  Spoofing  Faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers 12Chapter 13 Security and Ethical Challenges
  • 13. Common Hacking Tactics  Trojan House  A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software  Back Doors  A hidden point of entry to be used in case the original entry point is detected or blocked  Malicious Applets  Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords  War Dialing  Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection  Logic Bombs  An instruction in a computer program that triggers a malicious act 13Chapter 13 Security and Ethical Challenges
  • 14. Common Hacking Tactics  Buffer Overflow  Crashing or gaining control of a computer by sending too much data to buffer memory  Password Crackers  Software that can guess passwords  Social Engineering  Gaining access to computer systems by talking unsuspecting company employees out of valuable information, such as passwords  Dumpster Diving  Sifting through a company’s garbage to find information to help break into their computers 14Chapter 13 Security and Ethical Challenges
  • 15. Cyber Theft  Many computer crimes involve the theft of money  The majority are “inside jobs” that involve unauthorized network entry and alternation of computer databases to cover the tracks of the employees involved  Many attacks occur through the Internet  Most companies don’t reveal that they have been targets or victims of cybercrime 15Chapter 13 Security and Ethical Challenges
  • 16. Unauthorized Use at Work  Unauthorized use of computer systems and networks is time and resource theft Doing private consulting Doing personal finances Playing video games Unauthorized use of the Internet or company networks  Sniffers Used to monitor network traffic or capacity Find evidence of improper use 16Chapter 13 Security and Ethical Challenges
  • 17. Internet Abuses in the Workplace General email abuses Unauthorized usage and access Copyright infringement/plagiarism Newsgroup postings Transmission of confidential data Pornography Hacking Non-work-related download/upload Leisure use of the Internet Use of external ISPs Moonlighting 17Chapter 13 Security and Ethical Challenges
  • 18. Software Piracy  Software Piracy Unauthorized copying of computer programs  Licensing Purchasing software is really a payment for a license for fair use Site license allows a certain number of copies 18 A third of the software industry’s revenues are lost to piracy Chapter 13 Security and Ethical Challenges
  • 19. Theft of Intellectual Property  Intellectual Property Copyrighted material Includes such things as music, videos, images, articles, books, and software  Copyright Infringement is Illegal Peer-to-peer networking techniques have made it easy to trade pirated intellectual property  Publishers Offer Inexpensive Online Music Illegal downloading of music and video is down and continues to drop 19Chapter 13 Security and Ethical Challenges
  • 20. Viruses and Worms  A virus is a program that cannot work without being inserted into another program A worm can run unaided  These programs copy annoying or destructive routines into networked computers Copy routines spread the virus  Commonly transmitted through The Internet and online services Email and file attachments Disks from contaminated computers Shareware 20Chapter 13 Security and Ethical Challenges
  • 21. Top Five Virus Families of all Time  My Doom, 2004  Spread via email and over Kazaa file-sharing network  Installs a back door on infected computers  Infected email poses as returned message or one that can’t be opened correctly, urging recipient to click on attachment  Opens up TCP ports that stay open even after termination of the worm  Upon execution, a copy of Notepad is opened, filled with nonsense characters  Netsky, 2004  Mass-mailing worm that spreads by emailing itself to all email addresses found on infected computers  Tries to spread via peer-to-peer file sharing by copying itself into the shared folder  It renames itself to pose as one of 26 other common files along the way 21Chapter 13 Security and Ethical Challenges
  • 22. Top Five Virus Families of all Time  SoBig, 2004  Mass-mailing email worm that arrives as an attachment  Examples: Movie_0074.mpg.pif, Document003.pif  Scans all .WAB, .WBX, .HTML, .EML, and .TXT files looking for email addresses to which it can send itself  Also attempts to download updates for itself  Klez, 2002  A mass-mailing email worm that arrives with a randomly named attachment  Exploits a known vulnerability in MS Outlook to auto-execute on unpatched clients  Tries to disable virus scanners and then copy itself to all local and networked drives with a random file name  Deletes all files on the infected machine and any mapped network drives on the 13th of all even-numbered months 22Chapter 13 Security and Ethical Challenges
  • 23. Top Five Virus Families of all Time  Sasser, 2004  Exploits a Microsoft vulnerability to spread from computer to computer with no user intervention  Spawns multiple threads that scan local subnets for vulnerabilities 23Chapter 13 Security and Ethical Challenges
  • 24. The Cost of Viruses, Trojans, Worms  Cost of the top five virus families Nearly 115 million computers in 200 countries were infected in 2004 Up to 11 million computers are believed to be permanently infected In 2004, total economic damage from virus proliferation was $166 to $202 billion Average damage per computer is between $277 and $366 24Chapter 13 Security and Ethical Challenges
  • 25. Adware and Spyware  Adware Software that purports to serve a useful purpose, and often does Allows advertisers to display pop-up and banner ads without the consent of the computer users  Spyware Adware that uses an Internet connection in the background, without the user’s permission or knowledge Captures information about the user and sends it over the Internet 25Chapter 13 Security and Ethical Challenges
  • 26. Spyware Problems  Spyware can steal private information and also Add advertising links to Web pages Redirect affiliate payments Change a users home page and search settings Make a modem randomly call premium-rate phone numbers Leave security holes that let Trojans in Degrade system performance  Removal programs are often not completely successful in eliminating spyware 26Chapter 13 Security and Ethical Challenges
  • 27. Privacy Issues  The power of information technology to store and retrieve information can have a negative effect on every individual’s right to privacy Personal information is collected with every visit to a Web site Confidential information stored by credit bureaus, credit card companies, and the government has been stolen or misused 27Chapter 13 Security and Ethical Challenges
  • 28. Opt-in Versus Opt-out  Opt-In You explicitly consent to allow data to be compiled about you This is the default in Europe  Opt-Out Data can be compiled about you unless you specifically request it not be This is the default in the U.S. 28Chapter 13 Security and Ethical Challenges
  • 29. Privacy Issues  Violation of Privacy  Accessing individuals’ private email conversations and computer records  Collecting and sharing information about individuals gained from their visits to Internet websites  Computer Monitoring  Always knowing where a person is  Mobile and paging services are becoming more closely associated with people than with places  Computer Matching  Using customer information gained from many sources to market additional business services  Unauthorized Access of Personal Files  Collecting telephone numbers, email addresses, credit card numbers, and other information to build customer profiles 29Chapter 13 Security and Ethical Challenges
  • 30. Protecting Your Privacy on the Internet  There are multiple ways to protect your privacy Encrypt email Send newsgroup postings through anonymous remailers Ask your ISP not to sell your name and information to mailing list providers and other marketers Don’t reveal personal data and interests on online service and website user profiles 30Chapter 13 Security and Ethical Challenges
  • 31. Privacy Laws  Electronic Communications Privacy Act and Computer Fraud and Abuse Act  Prohibit intercepting data communications messages, stealing or destroying data, or trespassing in federal-related computer systems  U.S. Computer Matching and Privacy Act  Regulates the matching of data held in federal agency files to verify eligibility for federal programs  Other laws impacting privacy and how much a company spends on compliance  Sarbanes-Oxley  Health Insurance Portability and Accountability Act (HIPAA)  Gramm-Leach-Bliley  USA Patriot Act  California Security Breach Law  Securities and Exchange Commission rule 17a-4 31Chapter 13 Security and Ethical Challenges
  • 32. Computer Libel and Censorship  The opposite side of the privacy debate…  Freedom of information, speech, and press  Biggest battlegrounds - bulletin boards, email boxes, and online files of Internet and public networks  Weapons used in this battle – spamming, flame mail, libel laws, and censorship  Spamming - Indiscriminate sending of unsolicited email messages to many Internet users  Flaming  Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the Internet or online services  Especially prevalent on special-interest newsgroups 32Chapter 13 Security and Ethical Challenges
  • 33. Cyberlaw  Laws intended to regulate activities over the Internet or via electronic communication devices  Encompasses a wide variety of legal and political issues  Includes intellectual property, privacy, freedom of expression, and jurisdiction  The intersection of technology and the law is controversial  Some feel the Internet should not be regulated  Encryption and cryptography make traditional form of regulation difficult  The Internet treats censorship as damage and simply routes around it  Cyberlaw only began to emerge in 1996  Debate continues regarding the applicability of legal principles derived from issues that had nothing to do with cyberspace 33Chapter 13 Security and Ethical Challenges
  • 34. Other Challenges  Employment  IT creates new jobs and increases productivity  It can also cause significant reductions in job opportunities, as well as requiring new job skills  Computer Monitoring  Using computers to monitor the productivity and behavior of employees as they work  Criticized as unethical because it monitors individuals, not just work, and is done constantly  Criticized as invasion of privacy because many employees do not know they are being monitored  Working Conditions  IT has eliminated monotonous or obnoxious tasks  However, some skilled craftsperson jobs have been replaced by jobs requiring routine, repetitive tasks or standby roles  Individuality  Dehumanizes and depersonalizes activities because computers eliminate human relationships  Inflexible systems 34Chapter 13 Security and Ethical Challenges
  • 35. Health Issues  Cumulative Trauma Disorders (CTDs) Disorders suffered by people who sit at a PC or terminal and do fast-paced repetitive keystroke jobs  Carpal Tunnel Syndrome Painful, crippling ailment of the hand and wrist Typically requires surgery to cure 35Chapter 13 Security and Ethical Challenges
  • 36. Ergonomics  Designing healthy work environments  Safe, comfortable, and pleasant for people to work in  Increases employee morale and productivity  Also called human factors engineering 36Chapter 13 Security and Ethical Challenges Ergonomics Factors
  • 37. Societal Solutions  Using information technologies to solve human and social problems Medical diagnosis Computer-assisted instruction Governmental program planning Environmental quality control Law enforcement Job placement  The detrimental effects of IT Often caused by individuals or organizations not accepting ethical responsibility for their actions 37Chapter 13 Security and Ethical Challenges
  • 38. Security Management of IT  The Internet was developed for inter-operability, not impenetrability Business managers and professionals alike are responsible for the security, quality, and performance of business information systems Hardware, software, networks, and data resources must be protected by a variety of security measures 38Chapter 13 Security and Ethical Challenges
  • 39. Security Management  The goal of security management is the accuracy, integrity, and safety of all information system processes and resources 39Chapter 13 Security and Ethical Challenges
  • 40. Internetworked Security Defenses  Encryption Data is transmitted in scrambled form It is unscrambled by computer systems for authorized users only The most widely used method uses a pair of public and private keys unique to each individual 40Chapter 13 Security and Ethical Challenges
  • 41. Public/Private Key Encryption 41Chapter 13 Security and Ethical Challenges
  • 42. Internetworked Security Defenses  Firewalls A gatekeeper system that protects a company’s intranets and other computer networks from intrusion Provides a filter and safe transfer point for access to/from the Internet and other networks Important for individuals who connect to the Internet with DSL or cable modems Can deter hacking, but cannot prevent it 42Chapter 13 Security and Ethical Challenges
  • 43. Internet and Intranet Firewalls 43Chapter 13 Security and Ethical Challenges
  • 44. Denial of Service Attacks  Denial of service attacks depend on three layers of networked computer systems The victim’s website The victim’s Internet service provider Zombie or slave computers that have been commandeered by the cybercriminals 44Chapter 13 Security and Ethical Challenges
  • 45. Defending Against Denial of Service  At Zombie Machines Set and enforce security policies Scan for vulnerabilities  At the ISP Monitor and block traffic spikes  At the Victim’s Website Create backup servers and network connections 45Chapter 13 Security and Ethical Challenges
  • 46. Internetworked Security Defenses  Email Monitoring Use of content monitoring software that scans for troublesome words that might compromise corporate security  Virus Defenses Centralize the updating and distribution of antivirus software Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features 46Chapter 13 Security and Ethical Challenges
  • 47. Other Security Measures  Security Codes  Multilevel password system  Encrypted passwords  Smart cards with microprocessors  Backup Files  Duplicate files of data or programs  Security Monitors  Monitor the use of computers and networks  Protects them from unauthorized use, fraud, and destruction  Biometrics  Computer devices measure physical traits that make each individual unique  Voice recognition, fingerprints, retina scan  Computer Failure Controls  Prevents computer failures or minimizes its effects  Preventive maintenance  Arrange backups with a disaster recovery organization 47Chapter 13 Security and Ethical Challenges
  • 48. Other Security Measures  In the event of a system failure, fault-tolerant systems have redundant processors, peripherals, and software that provide  Fail-over capability: shifts to back up components  Fail-save capability: the system continues to operate at the same level  Fail-soft capability: the system continues to operate at a reduced but acceptable level  A disaster recovery plan contains formalized procedures to follow in the event of a disaster  Which employees will participate  What their duties will be  What hardware, software, and facilities will be used  Priority of applications that will be processed  Use of alternative facilities  Offsite storage of databases 48Chapter 13 Security and Ethical Challenges
  • 49. Information System Controls  Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities 49Chapter 13 Security and Ethical Challenges
  • 50. Auditing IT Security  IT Security Audits Performed by internal or external auditors Review and evaluation of security measures and management policies Goal is to ensure that that proper and adequate measures and policies are in place 50Chapter 13 Security and Ethical Challenges
  • 51. Protecting Yourself from Cybercrime 51Chapter 13 Security and Ethical Challenges