This document discusses security and ethical challenges related to information technology. It covers topics like corporate social responsibility theories, principles of technology ethics, privacy issues, computer crimes like hacking and cybertheft, and measures to protect security such as encryption, firewalls, and auditing. Business professionals have an ethical responsibility to promote proper IT use and ensure security, privacy, and informed consent regarding technology risks.
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
Information Technology Policy for Corporates is the need of the hour as organisations, are continuously at a stake for violation of information technology laws, commission of cyber crimes, sexual harassment, e-mail violations, and misuse of internet and intranet.
What is Information Security?
Information security means that the confidentiality, integrity and availability of information assets is maintained.
Confidentiality: This means that information is only used by people who are authorized to access it.
Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.
Availability: This means that the information is accessible when authorized users need it.
Information Security Threats:
Most common types of information security threats are:
Theft of confidential information by hacking
System sabotage by hackers
Phishing and other social engineering attacks
Virus, spyware and malware
Social Media-the fraud threat
Theft of Confidential Information:
One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP).
Theft of Employee Information
Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.
Piracy/copyright infringement.
Corporate business strategies including marketing strategies, product introduction strategies.
System Sabotage:
What is system sabotage?
Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system.
Who would perpetrate it?
System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.
The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
Phishing:
To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as:
Opening bank accounts in victim’s name
Applying for loans in victim’s name
Applying for credit cards in victim’s name
Obtaining medical services in victims name (e-death)
Other kind of more sophisticated social engineering attacks include spear-phishing.
Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
Other threats include:
Smishing: Phishing via SMS (texting)
Vishing: Phishing via voice (phone)
Mobile hackin
James A. O'Brien, and George Marakas. Management Information Systems with MISource 2007, 8th ed. Boston, MA: McGraw-Hill, Inc., 2007. ISBN: 13 9780073323091
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
Information Technology Policy for Corporates is the need of the hour as organisations, are continuously at a stake for violation of information technology laws, commission of cyber crimes, sexual harassment, e-mail violations, and misuse of internet and intranet.
What is Information Security?
Information security means that the confidentiality, integrity and availability of information assets is maintained.
Confidentiality: This means that information is only used by people who are authorized to access it.
Integrity: It ensures that information remains intact and unaltered. Any changes to the information through malicious action, natural disaster, or even a simple innocent mistake are tracked.
Availability: This means that the information is accessible when authorized users need it.
Information Security Threats:
Most common types of information security threats are:
Theft of confidential information by hacking
System sabotage by hackers
Phishing and other social engineering attacks
Virus, spyware and malware
Social Media-the fraud threat
Theft of Confidential Information:
One of the major threat to information security is the theft of confidential data by hacking. This includes theft of employee information or theft of trade secrets and other intellectual property (IP).
Theft of Employee Information
Employee information includes credit card information, corporate credit card information, social security number , address, etc. It also includes theft of healthcare records as they contain personal information such date of birth, address, and name of relatives.
Theft of Trade Secrets and other Intellectual Property (IP)
Technology from various verticals including IT, aerospace, and telecommunications are constantly stolen by outsiders or insiders (industrial espionage). China is a growing offender as it continues to advance in technology relying on theft of international trade secrets and IP.
Piracy/copyright infringement.
Corporate business strategies including marketing strategies, product introduction strategies.
System Sabotage:
What is system sabotage?
Planting malware on networks of target organization and generating an enormous amount of transaction activity resulting in malfunction or crash of the system.
Who would perpetrate it?
System sabotage is usually committed by disgruntled ex-employees and by remote cyber-attackers for no particular reason.
The most sensational case of system sabotage: One of the recent examples is the sabotage of Sony PlayStation.
Phishing:
To obtain confidential data about individuals-customers, clients, employees or vendors that can be used to commit various types of identity fraud such as:
Opening bank accounts in victim’s name
Applying for loans in victim’s name
Applying for credit cards in victim’s name
Obtaining medical services in victims name (e-death)
Other kind of more sophisticated social engineering attacks include spear-phishing.
Spear-phishing targets specific individuals such as AP manger, controller, senior accountant to gain access to corporate bank accounts and transfer funds abroad.
Other threats include:
Smishing: Phishing via SMS (texting)
Vishing: Phishing via voice (phone)
Mobile hackin
Module 2: Cyber-Crimes and Cyber Laws
Ethics for IT Workers and IT Users-IT Professionals-IT professional malpractice-IT , IT Act cyber
laws - Information Technology Act, 2000 (“IT Act”) - Digital Signature - Confidentiality, Integrity and Authenticity (CIA)
Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses, Computers' roles in crimes, Introduction to digital forensics, Introduction to Incident - Incident Response Methodology –Steps - Activities in Initial Response, Phase after detection of an incident
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
Ethical responsibilities of Business Professionals
Business, technology, Computer crime
Hacking, cyber theft, unauthorized use at work. Piracy
Software and intellectual property.
Privacy – Issues and the Internet
Privacy Challenges
Working condition, individuals. Health and Social Issues
Ergonomics
Cyber terrorism
Module 2: Cyber-Crimes and Cyber Laws
Ethics for IT Workers and IT Users-IT Professionals-IT professional malpractice-IT , IT Act cyber
laws - Information Technology Act, 2000 (“IT Act”) - Digital Signature - Confidentiality, Integrity and Authenticity (CIA)
Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses, Computers' roles in crimes, Introduction to digital forensics, Introduction to Incident - Incident Response Methodology –Steps - Activities in Initial Response, Phase after detection of an incident
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
Ethical responsibilities of Business Professionals
Business, technology, Computer crime
Hacking, cyber theft, unauthorized use at work. Piracy
Software and intellectual property.
Privacy – Issues and the Internet
Privacy Challenges
Working condition, individuals. Health and Social Issues
Ergonomics
Cyber terrorism
Powerpoint for the readers of master degree level. It is designed for the student of MBS Level but can be usable for all masters level reader/ Students.
Powerpoint for the readers of master degree level. It is designed for the student of MBS Level but can be usable for all masters level reader/ Students.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. Introduction
• Use of IT in business can
– Present major security
challenges
– Poses serious ethical questions
– Affect society in significant ways
• IT has both beneficial &
detrimental effects on society
and people
– Manage work activities to
minimize the detrimental effects
of IT
– Optimize the beneficial effects
3. Ethical responsibility
of business professionals
• Business professionals have responsibility to
promote ethical uses of information technology
in the workplace
• Should you electronically access your
employees’ personnel records or workstation
files?
• Should you sell customer information extracted
from transaction processing systems to other
companies?
5. Corporate Social Responsibility Theories
• Stockholder Theory
– Managers are agents of the stockholders
– Their only ethical responsibility is to increase the profits of the
business without violating the law or engaging in fraudulent
practices
• Social Contract Theory
– Companies have ethical responsibilities to all members of
society, who allow corporations to exist
• Stakeholder Theory
– Managers have an ethical responsibility to manage a firm for the
benefit of all its stakeholders
– Stakeholders are all individuals and groups that have a stake in,
or claim on, a company
6. Principles of Technology Ethics
• Proportionality - The good achieved by the technology must
outweigh the harm or risk; there must be no alternative that
achieves the same or comparable benefits with less harm or risk
• Informed Consent - Those affected by the technology should
understand and accept the risks
• Justice
– Fair and equal distribution of benefits and burdens of the
technology
– Those who benefit should bear their fair share of the risks, and
those who do not benefit should not suffer a significant increase
in risk
• Minimized Risk - Even if judged acceptable by the other three
guidelines, the technology must be implemented so as to avoid all
unnecessary risk
7. Ethical Guidelines
• Most policies specify that company computer
workstations and networks are company resources
that must be used only for work-related uses
• A responsible professional
– Acts with integrity
– Increases personal competence
– Sets high standards of personal performance
– Accepts responsibility for his/her work
– Advances the health, privacy, and general
welfare of the public
8. Computer Crime
• Unauthorized use, access, modification, or
destruction of hardware, software, data, or
network resources
• The unauthorized release of information
• The unauthorized copying of software
• Denying an end user access to his/her own
hardware, software, data, or network resources
• Using or conspiring to use computer or network
resources illegally to obtain information or tangible
property
10. Hacking
• Hacking is
– The obsessive use of computers
– The unauthorized access and use of networked
computer systems
• Electronic Breaking and Entering
– Hacking into a computer system and reading files,
but neither stealing nor damaging anything
• Cracker
– A malicious or criminal hacker who maintains
knowledge of the vulnerabilities found for
private advantage
11. Common Hacking Tactics
• Denial of Service
– Hammering a website’s equipment with too many requests for
information
– Clogging the system, slowing performance, or crashing the site
• Scans
– Widespread probes of the Internet to determine types of computers,
services, and connections
– Looking for weaknesses
• Sniffer
– Programs that search individual packets of data as they pass through
the Internet
– Capturing passwords or entire contents
• Spoofing
– Faking an e-mail address or Web page to trick users into passing along
critical information like passwords or credit card numbers
12. Common Hacking Tactics
• Trojan House
– A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software
• Back Doors
– A hidden point of entry to be used in case the original entry point is
detected or blocked
• Malicious Applets
– Tiny Java programs that misuse your computer’s resources, modify
files on the hard disk, send fake email, or steal passwords
• War Dialing
– Programs that automatically dial thousands of telephone numbers in
search of a way in through a modem connection
• Logic Bombs
– An instruction in a computer program that triggers a malicious act
13. Common Hacking Tactics
• Buffer Overflow
– Crashing or gaining control of a computer by sending too much data to
buffer memory
• Password Crackers
– Software that can guess passwords
• Social Engineering
– Gaining access to computer systems by talking unsuspecting company
employees out of valuable information, such as passwords
• Dumpster Diving
– Sifting through a company’s garbage to find information to help break
into their computers
14. Cyber Theft
• Many computer crimes involve the theft of
money
• The majority are “inside jobs” that involve
unauthorized network entry and alternation
of computer databases to cover the tracks of
the employees involved
• Many attacks occur through the Internet
• Most companies don’t reveal that they have
been targets or victims of cybercrime
15. Unauthorized Use at Work
• Unauthorized use of computer systems and
networks is time and resource theft
– Doing private consulting
– Doing personal finances
– Playing video games
– Unauthorized use of the Internet or company
networks
• Sniffers
– Used to monitor network traffic or capacity
– Find evidence of improper use
16. Internet Abuses in the Workplace
– General email abuses
– Unauthorized usage and access
– Copyright infringement/plagiarism
– Newsgroup postings
– Transmission of confidential data
– Pornography
– Hacking
– Non-work-related download/upload
– Leisure use of the Internet
– Use of external ISPs
– Moonlighting
17. Software Piracy
• Software Piracy
– Unauthorized copying of computer programs
– Software is an intellectual property
• Licensing
– Purchasing software is really a payment
for a license for fair use
– Site license allows a certain number of copies
A third of the software
industry’s revenues are
lost to piracy
18. Theft of Intellectual Property
• Intellectual Property
– Copyrighted material
– Includes such things as music, videos, images,
articles, books, and software
• Copyright Infringement is Illegal
– Peer-to-peer networking techniques have made it
easy to trade pirated intellectual property
• Publishers Offer Inexpensive Online Music
– Illegal downloading of music and video is
down and continues to drop
19. Viruses and Worms
• A virus is a program that cannot work without
being inserted into another program
– A worm can run unaided
• These programs copy annoying or destructive
routines into networked computers
• Commonly transmitted through
– The Internet and online services
– Email and file attachments
– Disks from contaminated computers
– Shareware
20. Adware and Spyware
• Adware
– Software that purports to serve a useful purpose,
and often does
– Allows advertisers to display pop-up and banner
ads without the consent of the computer users
• Spyware
– Adware that uses an Internet connection in the
background, without the user’s permission
or knowledge
– Captures information about the user and sends it
over the Internet
21. Spyware Problems
• Spyware can steal private information and also
– Add advertising links to Web pages
– Redirect affiliate payments
– Change a users home page and search settings
– Make a modem randomly call premium-rate phone
numbers
– Leave security holes that let Trojans in
– Degrade system performance
• Removal programs are often not completely
successful in eliminating spyware
22. Privacy Issues
• The power of information technology to store
and retrieve information can have a negative
effect on every individual’s right to privacy
– Personal information is collected with every
visit to a Web site
– Confidential information stored by credit
bureaus, credit card companies, and the
government has been stolen or misused
23. Opt-in Versus Opt-out
• Opt-In
– You explicitly consent to allow data to be compiled
about you
– This is the default in Europe
• Opt-Out
– Data can be compiled about you unless you
specifically request it not be
– This is the default in the U.S.
24. Privacy Issues
• Violation of Privacy
– Accessing individuals’ private email conversations and computer
records
– Collecting and sharing information about individuals gained from
their visits to Internet websites
• Computer Monitoring
– Always knowing where a person is
– Mobile and paging services are becoming more closely associated
with people than with places
• Computer Matching
– Using customer information gained from many sources to market
additional business services
• Unauthorized Access of Personal Files
– Collecting telephone numbers, email addresses, credit card
numbers, and other information to build customer profiles
25. Protecting Your Privacy on the
Internet
• There are multiple ways to protect your privacy
– Encrypt email
– Send newsgroup postings through anonymous
remailers
– Ask your ISP not to sell your name and information to
mailing list providers and
other marketers
– Don’t reveal personal data and interests on
online service and website user profiles
26. Privacy Laws
• Electronic Communications Privacy Act
and Computer Fraud and Abuse Act
– Prohibit intercepting data communications messages, stealing or
destroying data, or trespassing in federal-related computer systems
• U.S. Computer Matching and Privacy Act
– Regulates the matching of data held in federal agency files to verify
eligibility for federal programs
• Other laws impacting privacy and how
much a company spends on compliance
– Sarbanes-Oxley
– Health Insurance Portability and Accountability Act (HIPAA)
– Gramm-Leach-Bliley
– USA Patriot Act
– California Security Breach Law
– Securities and Exchange Commission rule 17a-4
27. Computer Libel and Censorship
• The opposite side of the privacy debate…
– Freedom of information, speech, and press
• Biggest battlegrounds - bulletin boards, email boxes, and online
files of Internet and public networks
• Weapons used in this battle – spamming, flame mail, libel laws, and
censorship
• Spamming - Indiscriminate sending of unsolicited email messages
to many Internet users
• Flaming
– Sending extremely critical, derogatory, and often vulgar email
messages or newsgroup posting to other users on the Internet
or online services
– Especially prevalent on special-interest newsgroups
28. Cyberlaw
• Laws intended to regulate activities over the Internet or via
electronic communication devices
– Encompasses a wide variety of legal and political issues
– Includes intellectual property, privacy, freedom of expression,
and jurisdiction
• The intersection of technology and the law is controversial
– Some feel the Internet should not be regulated
– Encryption and cryptography make traditional form of
regulation difficult
– The Internet treats censorship as damage and simply routes
around it
• Cyberlaw only began to emerge in 1996
– Debate continues regarding the applicability of legal principles
derived from issues that had nothing to do with cyberspace
29. Other Challenges
• Employment
– IT creates new jobs and increases productivity
– Cause significant reductions in some job opportunities
– Jobs created by IT require new job skills
• Internet Web masters, e-commerce directors, system analysts, user
consultants
• Computer Monitoring
– Using computers to monitor the productivity and
behavior of employees as they work
– Criticized as unethical because it monitors individuals, not
just work, and is done constantly
– Criticized as invasion of privacy because many employees
do not know they are being monitored
30. Other Challenges
• Working Conditions
– IT has eliminated monotonous or obnoxious tasks
– Shift allows people to concentrate on more challenging
and interesting assignments
– Sadly data entry jobs are quite repetitive and routine
– But some skilled craftsperson jobs have been replaced by
jobs requiring routine, repetitive tasks or standby roles
• Individuality
– Dehumanizes and depersonalizes activities because
computers eliminate human relationships
– Inflexible systems due to strict adherence to standards
– But it’s changing due to personalization in e-commerce
31. Health Issues
• Cumulative Trauma Disorders (CTDs)
– Disorders suffered by people who sit at a
PC or terminal and do fast-paced repetitive
keystroke jobs
– Strained muscles, back pain, nerve damage
• Carpal Tunnel Syndrome
– Painful, crippling ailment of the hand
and wrist
– Typically requires surgery to cure
32. Ergonomics
• Designing healthy
work environments
– Safe, comfortable,
and pleasant for
people to work in
– GUI, hardware, job
design ergonomics
– Increases employee
morale and
productivity
– Also called human
factors engineering
Ergonomics Factors
33. Societal Solutions
• Using information technologies to solve human
and social problems
– Medical diagnosis
– Computer-assisted instruction
– Governmental program planning
– Environmental quality control
– Law enforcement
– Job placement
• The detrimental effects of IT
– Often caused by individuals or organizations not
accepting ethical responsibility for their actions
34. Security Management of IT
• The Internet was developed for inter-
operability, not impenetrability
– Business managers and professionals alike
are responsible for the security, quality, and
performance of business information systems
– Hardware, software, networks, and data
resources must be protected by a variety
of security measures
35. Security Management
• The goal of security
management is the
accuracy, integrity,
and safety of all
information system
processes and
resources
36. Internetworked Security Defenses
• Encryption
– Data is transmitted in scrambled form
– It is unscrambled by computer systems for
authorized users only
– The most widely used method uses a pair of
public and private keys unique to each individual
37. Internetworked Security Defenses
• Firewalls
– A gatekeeper system that protects a company’s
intranets and other computer networks from
intrusion
– Provides a filter and safe transfer point for
access to/from the Internet and other networks
– Important for individuals who connect to the
Internet with DSL or cable modems
– Can deter hacking, but cannot prevent it
39. Denial of Service Attacks
• Denial of service attacks depend on three
layers of networked computer systems
– The victim’s website
– The victim’s Internet service provider
– Zombie or slave computers that have been
commandeered by the cybercriminals
40. Defending Against Denial of Service
• At Zombie Machines
– Set and enforce security policies
– Scan for vulnerabilities
• At the ISP
– Monitor and block traffic spikes
• At the Victim’s Website
– Create backup servers and network connections
41. Internetworked Security Defenses
• Email Monitoring
– Use of content monitoring software that scans
for troublesome words that might compromise
corporate security
• Virus Defenses
– Centralize the updating and distribution of
antivirus software
– Use a security suite that integrates virus
protection with firewalls, Web security,
and content blocking features
42. Other Security Measures
• Security Codes
– Multilevel password system
– Encrypted passwords
– Smart cards with microprocessors
• Backup Files
– Duplicate files of data or programs
• Security Monitors
– Monitor the use of computers and networks
– Protects them from unauthorized use, fraud, and destruction
• Biometrics
– Computer devices measure physical traits that make each individual
unique
• Voice recognition, fingerprints, retina scan
• Computer Failure Controls
– Prevents computer failures or minimizes its effects
– Preventive maintenance
– Arrange backups with a disaster recovery organization
43. Other Security Measures
• In the event of a system failure, fault-tolerant systems have redundant
processors, peripherals, and software that provide
– Fail-over capability: shifts to back up components
– Fail-save capability: the system continues to operate at the same level
– Fail-soft capability: the system continues to operate at a reduced but
acceptable level
• A disaster recovery plan contains formalized procedures to follow in the
event of a disaster
– Which employees will participate
– What their duties will be
– What hardware, software, and facilities will be used
– Priority of applications that will be processed
– Use of alternative facilities
– Offsite storage of databases
44. Information System Controls
• Methods and
devices that
attempt to
ensure the
accuracy,
validity, and
propriety of
information
system
activities
45. Auditing IT Security
• IT Security Audits
– Performed by internal or external auditors
– Review and evaluation of security measures
and management policies
– Goal is to ensure that that proper and adequate
measures and policies are in place