SlideShare a Scribd company logo
Welcome to Our Presentation
Angry Birds
1
2
 IT Security, Ethics, and Society
 Business Ethics
 Categories of Ethical Business Issues
 Computer Crime
 Hacking
 Common Hacking Tactics
 Cyber Theft
 Unauthorized Use at Work
 Internet Abuses in the Workplace
 Software Piracy
 Theft of Intellectual Property
 Viruses and Worms
 Top Five Virus Families of all Time
 The Cost of Viruses, Trojans, Worms
 Adware and Spyware
 Spyware Problems
 Privacy Issues
 Opt-in Versus Opt-out
 Protecting Your Privacy on the Internet
 Health Issues
 Security Management of IT
 Security Management
 Internetworked Security Defenses
 Public/Private Key Encryption
 Internetworked Security Defenses
 Internet and Intranet Firewalls
 Internetworked Security Defenses
 Information System Controls 4
 IT has both beneficial
and detrimental effects
on society and people
 Manage work
activities to minimize
the detrimental
effects of IT
 Optimize the
beneficial effects
5
 Ethics questions that managers confront as
part of their daily business decision making
include:
 Equity
 Rights
 Honesty
 Exercise of corporate power
6
7
 Computer crime includes
 Unauthorized use, access, modification, or
destruction of hardware, software, data, or network
resources
 The unauthorized release of information
 The unauthorized copying of software
 Denying an end user access to his/her own
hardware, software, data, or network resources
 Using or conspiring to use computer or network
resources illegally to obtain information or tangible
property
8
 Hacking is
 The obsessive use of computers
 The unauthorized access and use of networked
computer systems
 Electronic Breaking and Entering
 Hacking into a computer system and reading files, but
neither stealing nor damaging anything
 Cracker
 A malicious or criminal hacker who maintains
knowledge of the vulnerabilities found for
private advantage
9
 Denial of Service
 Hammering a website’s equipment with too many requests for
information
 Clogging the system, slowing performance, or crashing the site
 Scans
 Widespread probes of the Internet to determine types of
computers, services, and connections
 Looking for weaknesses
 Sniffer
 Programs that search individual packets of data as they pass through the
Internet
 Capturing passwords or entire contents
 Spoofing
 Faking an e-mail address or Web page to trick users into passing along
critical information like passwords or credit card numbers
10
 Trojan House
 A program that, unknown to the user, contains instructions that exploit
a known vulnerability in some software
 Back Doors
 A hidden point of entry to be used in case the original entry point is
detected or blocked
 Malicious Applets
 Tiny Java programs that misuse your computer’s resources, modify
files on the hard disk, send fake email, or steal passwords
 War Dialing
 Programs that automatically dial thousands of telephone numbers in
search of a way in through a modem connection
 Logic Bombs
 An instruction in a computer program that triggers a malicious act
11
 Buffer Overflow
 Crashing or gaining control of a computer by sending too much data to
buffer memory
 Password Crackers
 Software that can guess passwords
 Social Engineering
 Gaining access to computer systems by talking unsuspecting company
employees out of valuable information, such as passwords
 Dumpster Diving
 Sifting through a company’s garbage to find information to help break
into their computers
12
 Many computer crimes involve the theft of money
 The majority are “inside jobs” that involve
unauthorized network entry and alternation of
computer databases to cover the tracks of the
employees involved
 Many attacks occur through the Internet
 Most companies don’t reveal that they have been
targets or victims of cybercrime
13
 Unauthorized use of computer systems and
networks is time and resource theft
 Doing private consulting
 Doing personal finances
 Playing video games
 Unauthorized use of the Internet or company networks
 Sniffers
 Used to monitor network traffic or capacity
 Find evidence of improper use
14
 General email abuses
 Unauthorized usage and access
 Transmission of confidential data
 Pornography
 Hacking
 Non-work-related download/upload
 Leisure use of the Internet
 Use of external ISPs
15
 Software Piracy
 Unauthorized copying of computer programs
 Licensing
 Purchasing software is really a payment
for a license for fair use
 Site license allows a certain number of copies
16
A third of the software
industry’s revenues are lost to
piracy
 Intellectual Property
 Copyrighted material
 Includes such things as
music, videos, images, articles, books, and software
 Copyright Infringement is Illegal
 Peer-to-peer networking techniques have made it easy to
trade pirated intellectual property
 Publishers Offer Inexpensive Online Music
 Illegal downloading of music and video is
down and continues to drop
17
 A virus is a program that cannot work without being
inserted into another program
 A worm can run unaided
 These programs copy annoying or destructive routines
into networked computers
 Copy routines spread the virus
 Commonly transmitted through
 The Internet and online services
 Email and file attachments
 Disks from contaminated computers
 Shareware
18
 My Doom, 2004
 Spread via email and over Kazaa file-sharing network
 Installs a back door on infected computers
 Infected email poses as returned message or one that can’t be opened
correctly, urging recipient to click on attachment
 Opens up TCP ports that stay open even after termination of the worm
 Upon execution, a copy of Notepad is opened, filled with nonsense
characters
 Netsky, 2004
 Mass-mailing worm that spreads by emailing itself to all email
addresses found on infected computers
 Tries to spread via peer-to-peer file sharing by copying itself into the
shared folder
 It renames itself to pose as one of 26 other common files along the
way
19
 SoBig, 2004
 Mass-mailing email worm that arrives as
an attachment
▪ Examples: Movie_0074.mpg.pif, Document003.pif
 Scans all .WAB, .WBX, .HTML, .EML, and .TXT files looking for
email addresses to which it can send itself
 Also attempts to download updates for itself
 Klez, 2002
 A mass-mailing email worm that arrives with a randomly named
attachment
 Exploits a known vulnerability in MS Outlook to auto-execute on
unpatched clients
 Tries to disable virus scanners and then copy itself to all local and
networked drives with a random file name
 Deletes all files on the infected machine and any mapped network
drives on the 13th of all even-numbered months
20
 Sasser, 2004
 Exploits a Microsoft vulnerability to spread from
computer to computer with no user intervention
 Spawns multiple threads that scan local subnets for
vulnerabilities
21
 Cost of the top five virus families
 Nearly 115 million computers in 200 countries
were infected in 2004
 Up to 11 million computers are believed to
be permanently infected
 In 2004, total economic damage from virus
proliferation was $166 to $202 billion
 Average damage per computer is between
$277 and $366
22
 Adware
 Software that purports to serve a useful
purpose, and often does
 Allows advertisers to display pop-up and banner
ads without the consent of the computer users
 Spyware
 Adware that uses an Internet connection in the
background, without the user’s permission
or knowledge
 Captures information about the user and sends it
over the Internet
23
 Spyware can steal private information and also
 Add advertising links to Web pages
 Redirect affiliate payments
 Change a users home page and search settings
 Make a modem randomly call premium-rate phone
numbers
 Leave security holes that let Trojans in
 Degrade system performance
 Removal programs are often not completely
successful in eliminating spyware
24
 The power of information technology to store
and retrieve information can have a negative
effect on every individual’s right to privacy
 Personal information is collected with every
visit to a Web site
 Confidential information stored by credit
bureaus, credit card companies, and the
government has been stolen or misused
25
 Opt-In
 You explicitly consent to allow data to be compiled
about you
 This is the default in Europe
 Opt-Out
 Data can be compiled about you unless you
specifically request it not be
 This is the default in the U.S.
26
 There are multiple ways to protect your privacy
 Encrypt email
 Send newsgroup postings through anonymous
remailers
 Ask your ISP not to sell your name and information to
mailing list providers and
other marketers
 Don’t reveal personal data and interests on
online service and website user profiles
27
 Cumulative Trauma Disorders (CTDs)
 Disorders suffered by people who sit at a
PC or terminal and do fast-paced repetitive
keystroke jobs
 Carpal Tunnel Syndrome
 Painful, crippling ailment of the hand
and wrist
 Typically requires surgery to cure
28
 The Internet was developed for inter-
operability, not impenetrability
 Business managers and professionals alike
are responsible for the security, quality, and
performance of business information systems
 Hardware, software, networks, and data
resources must be protected by a variety
of security measures
29
 The goal of security
management is the
accuracy, integrity,
and safety of all
information system
processes and
resources
30
 Encryption
 Data is transmitted in scrambled form
 It is unscrambled by computer systems for
authorized users only
 The most widely used method uses a pair of public
and private keys unique to each individual
31
32
 Firewalls
 A gatekeeper system that protects a company’s
intranets and other computer networks from
intrusion
 Provides a filter and safe transfer point for
access to/from the Internet and other networks
 Important for individuals who connect to the
Internet with DSL or cable modems
 Can deter hacking, but cannot prevent it
33
34
 Email Monitoring
 Use of content monitoring software that scans
for troublesome words that might compromise
corporate security
 Virus Defenses
 Centralize the updating and distribution of
antivirus software
 Use a security suite that integrates virus protection
with firewalls, Web security,
and content blocking features
35
 Methods and
devices that
attempt to
ensure the
accuracy, validit
y, and propriety
of information
system activities
36
37

More Related Content

What's hot

Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
anjana1994
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
Wisnu Dewobroto
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information systemRohit Kumar
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
FaHaD .H. NooR
 
Modern trends in information systems
Modern trends in information systemsModern trends in information systems
Modern trends in information systems
Preeti Sontakke
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
Tushar B Kute
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
Kdnk Kiriti
 
E business strategy
E business strategyE business strategy
E business strategy
Not currently emloyed
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
amazing19
 
Information Systems, Organizations and Strategy - Management Information System
Information Systems, Organizations and Strategy - Management Information SystemInformation Systems, Organizations and Strategy - Management Information System
Information Systems, Organizations and Strategy - Management Information System
FaHaD .H. NooR
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)Sayantan Sur
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applications
Shubham Upadhyay
 
Business application of internet
Business application of internetBusiness application of internet
Business application of internet
Nelson Kuriakose
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information System
Muhammad Hashaam Shinystar
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
raviteja reddy
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )
QualitativeIn
 
MIS-executive information system
MIS-executive information systemMIS-executive information system
MIS-executive information system
Rohit Raina
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 

What's hot (20)

Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Concepts and components of information system
Concepts  and components of information systemConcepts  and components of information system
Concepts and components of information system
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Modern trends in information systems
Modern trends in information systemsModern trends in information systems
Modern trends in information systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 
E business strategy
E business strategyE business strategy
E business strategy
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
 
The role of information system
The role of information system The role of information system
The role of information system
 
Information Systems, Organizations and Strategy - Management Information System
Information Systems, Organizations and Strategy - Management Information SystemInformation Systems, Organizations and Strategy - Management Information System
Information Systems, Organizations and Strategy - Management Information System
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Information System & Business applications
Information System & Business applicationsInformation System & Business applications
Information System & Business applications
 
Business application of internet
Business application of internetBusiness application of internet
Business application of internet
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information System
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )
 
MIS-executive information system
MIS-executive information systemMIS-executive information system
MIS-executive information system
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 

Similar to Security and ethical challenges in mis

Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
Aqib Syed
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
Pradeep513562
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
jnallnmnl
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
jnallnmnl
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
Katy Kate
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
SeniorGaming
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crimeangbeelee
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 

Similar to Security and ethical challenges in mis (20)

Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)Safety, Security and Ethics (Empowerment Technologies)
Safety, Security and Ethics (Empowerment Technologies)
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
Internet security
Internet securityInternet security
Internet security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

More from I P Abir

A comparative study
A comparative studyA comparative study
A comparative studyI P Abir
 
Sale of goods act, 1930 (bangladesh)
Sale of goods act, 1930 (bangladesh)Sale of goods act, 1930 (bangladesh)
Sale of goods act, 1930 (bangladesh)I P Abir
 
Hollywood leading actors & actress
Hollywood leading actors & actressHollywood leading actors & actress
Hollywood leading actors & actressI P Abir
 
Marketing strategy
Marketing strategyMarketing strategy
Marketing strategyI P Abir
 
Crdit risk
Crdit riskCrdit risk
Crdit riskI P Abir
 
Investment in subordinated bond
Investment in subordinated bondInvestment in subordinated bond
Investment in subordinated bondI P Abir
 
A comparative study of Mortgage Market in both USA & Bangladesh
A comparative study of Mortgage Market in both USA & BangladeshA comparative study of Mortgage Market in both USA & Bangladesh
A comparative study of Mortgage Market in both USA & BangladeshI P Abir
 
Mortgage markets
Mortgage marketsMortgage markets
Mortgage marketsI P Abir
 

More from I P Abir (9)

A comparative study
A comparative studyA comparative study
A comparative study
 
Sale of goods act, 1930 (bangladesh)
Sale of goods act, 1930 (bangladesh)Sale of goods act, 1930 (bangladesh)
Sale of goods act, 1930 (bangladesh)
 
Hollywood leading actors & actress
Hollywood leading actors & actressHollywood leading actors & actress
Hollywood leading actors & actress
 
Marketing strategy
Marketing strategyMarketing strategy
Marketing strategy
 
IFIC
IFICIFIC
IFIC
 
Crdit risk
Crdit riskCrdit risk
Crdit risk
 
Investment in subordinated bond
Investment in subordinated bondInvestment in subordinated bond
Investment in subordinated bond
 
A comparative study of Mortgage Market in both USA & Bangladesh
A comparative study of Mortgage Market in both USA & BangladeshA comparative study of Mortgage Market in both USA & Bangladesh
A comparative study of Mortgage Market in both USA & Bangladesh
 
Mortgage markets
Mortgage marketsMortgage markets
Mortgage markets
 

Recently uploaded

MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
PinkySharma900491
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
ThalapathyVijay15
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Amil baba
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
freshgammer09
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
ArjunJain44
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
kywwoyk
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
eemet
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
kywwoyk
 

Recently uploaded (9)

MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...
 
Drugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptxDrugs used in parkinsonism and other movement disorders.pptx
Drugs used in parkinsonism and other movement disorders.pptx
 
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
web-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jerweb-tech-lab-manual-final-abhas.pdf. Jer
web-tech-lab-manual-final-abhas.pdf. Jer
 
F5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptxF5 LTM TROUBLESHOOTING Guide latest.pptx
F5 LTM TROUBLESHOOTING Guide latest.pptx
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
一比一原版UVM毕业证佛蒙特大学毕业证成绩单如何办理
 

Security and ethical challenges in mis

  • 1. Welcome to Our Presentation Angry Birds 1
  • 2. 2
  • 3.
  • 4.  IT Security, Ethics, and Society  Business Ethics  Categories of Ethical Business Issues  Computer Crime  Hacking  Common Hacking Tactics  Cyber Theft  Unauthorized Use at Work  Internet Abuses in the Workplace  Software Piracy  Theft of Intellectual Property  Viruses and Worms  Top Five Virus Families of all Time  The Cost of Viruses, Trojans, Worms  Adware and Spyware  Spyware Problems  Privacy Issues  Opt-in Versus Opt-out  Protecting Your Privacy on the Internet  Health Issues  Security Management of IT  Security Management  Internetworked Security Defenses  Public/Private Key Encryption  Internetworked Security Defenses  Internet and Intranet Firewalls  Internetworked Security Defenses  Information System Controls 4
  • 5.  IT has both beneficial and detrimental effects on society and people  Manage work activities to minimize the detrimental effects of IT  Optimize the beneficial effects 5
  • 6.  Ethics questions that managers confront as part of their daily business decision making include:  Equity  Rights  Honesty  Exercise of corporate power 6
  • 7. 7
  • 8.  Computer crime includes  Unauthorized use, access, modification, or destruction of hardware, software, data, or network resources  The unauthorized release of information  The unauthorized copying of software  Denying an end user access to his/her own hardware, software, data, or network resources  Using or conspiring to use computer or network resources illegally to obtain information or tangible property 8
  • 9.  Hacking is  The obsessive use of computers  The unauthorized access and use of networked computer systems  Electronic Breaking and Entering  Hacking into a computer system and reading files, but neither stealing nor damaging anything  Cracker  A malicious or criminal hacker who maintains knowledge of the vulnerabilities found for private advantage 9
  • 10.  Denial of Service  Hammering a website’s equipment with too many requests for information  Clogging the system, slowing performance, or crashing the site  Scans  Widespread probes of the Internet to determine types of computers, services, and connections  Looking for weaknesses  Sniffer  Programs that search individual packets of data as they pass through the Internet  Capturing passwords or entire contents  Spoofing  Faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers 10
  • 11.  Trojan House  A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software  Back Doors  A hidden point of entry to be used in case the original entry point is detected or blocked  Malicious Applets  Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords  War Dialing  Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection  Logic Bombs  An instruction in a computer program that triggers a malicious act 11
  • 12.  Buffer Overflow  Crashing or gaining control of a computer by sending too much data to buffer memory  Password Crackers  Software that can guess passwords  Social Engineering  Gaining access to computer systems by talking unsuspecting company employees out of valuable information, such as passwords  Dumpster Diving  Sifting through a company’s garbage to find information to help break into their computers 12
  • 13.  Many computer crimes involve the theft of money  The majority are “inside jobs” that involve unauthorized network entry and alternation of computer databases to cover the tracks of the employees involved  Many attacks occur through the Internet  Most companies don’t reveal that they have been targets or victims of cybercrime 13
  • 14.  Unauthorized use of computer systems and networks is time and resource theft  Doing private consulting  Doing personal finances  Playing video games  Unauthorized use of the Internet or company networks  Sniffers  Used to monitor network traffic or capacity  Find evidence of improper use 14
  • 15.  General email abuses  Unauthorized usage and access  Transmission of confidential data  Pornography  Hacking  Non-work-related download/upload  Leisure use of the Internet  Use of external ISPs 15
  • 16.  Software Piracy  Unauthorized copying of computer programs  Licensing  Purchasing software is really a payment for a license for fair use  Site license allows a certain number of copies 16 A third of the software industry’s revenues are lost to piracy
  • 17.  Intellectual Property  Copyrighted material  Includes such things as music, videos, images, articles, books, and software  Copyright Infringement is Illegal  Peer-to-peer networking techniques have made it easy to trade pirated intellectual property  Publishers Offer Inexpensive Online Music  Illegal downloading of music and video is down and continues to drop 17
  • 18.  A virus is a program that cannot work without being inserted into another program  A worm can run unaided  These programs copy annoying or destructive routines into networked computers  Copy routines spread the virus  Commonly transmitted through  The Internet and online services  Email and file attachments  Disks from contaminated computers  Shareware 18
  • 19.  My Doom, 2004  Spread via email and over Kazaa file-sharing network  Installs a back door on infected computers  Infected email poses as returned message or one that can’t be opened correctly, urging recipient to click on attachment  Opens up TCP ports that stay open even after termination of the worm  Upon execution, a copy of Notepad is opened, filled with nonsense characters  Netsky, 2004  Mass-mailing worm that spreads by emailing itself to all email addresses found on infected computers  Tries to spread via peer-to-peer file sharing by copying itself into the shared folder  It renames itself to pose as one of 26 other common files along the way 19
  • 20.  SoBig, 2004  Mass-mailing email worm that arrives as an attachment ▪ Examples: Movie_0074.mpg.pif, Document003.pif  Scans all .WAB, .WBX, .HTML, .EML, and .TXT files looking for email addresses to which it can send itself  Also attempts to download updates for itself  Klez, 2002  A mass-mailing email worm that arrives with a randomly named attachment  Exploits a known vulnerability in MS Outlook to auto-execute on unpatched clients  Tries to disable virus scanners and then copy itself to all local and networked drives with a random file name  Deletes all files on the infected machine and any mapped network drives on the 13th of all even-numbered months 20
  • 21.  Sasser, 2004  Exploits a Microsoft vulnerability to spread from computer to computer with no user intervention  Spawns multiple threads that scan local subnets for vulnerabilities 21
  • 22.  Cost of the top five virus families  Nearly 115 million computers in 200 countries were infected in 2004  Up to 11 million computers are believed to be permanently infected  In 2004, total economic damage from virus proliferation was $166 to $202 billion  Average damage per computer is between $277 and $366 22
  • 23.  Adware  Software that purports to serve a useful purpose, and often does  Allows advertisers to display pop-up and banner ads without the consent of the computer users  Spyware  Adware that uses an Internet connection in the background, without the user’s permission or knowledge  Captures information about the user and sends it over the Internet 23
  • 24.  Spyware can steal private information and also  Add advertising links to Web pages  Redirect affiliate payments  Change a users home page and search settings  Make a modem randomly call premium-rate phone numbers  Leave security holes that let Trojans in  Degrade system performance  Removal programs are often not completely successful in eliminating spyware 24
  • 25.  The power of information technology to store and retrieve information can have a negative effect on every individual’s right to privacy  Personal information is collected with every visit to a Web site  Confidential information stored by credit bureaus, credit card companies, and the government has been stolen or misused 25
  • 26.  Opt-In  You explicitly consent to allow data to be compiled about you  This is the default in Europe  Opt-Out  Data can be compiled about you unless you specifically request it not be  This is the default in the U.S. 26
  • 27.  There are multiple ways to protect your privacy  Encrypt email  Send newsgroup postings through anonymous remailers  Ask your ISP not to sell your name and information to mailing list providers and other marketers  Don’t reveal personal data and interests on online service and website user profiles 27
  • 28.  Cumulative Trauma Disorders (CTDs)  Disorders suffered by people who sit at a PC or terminal and do fast-paced repetitive keystroke jobs  Carpal Tunnel Syndrome  Painful, crippling ailment of the hand and wrist  Typically requires surgery to cure 28
  • 29.  The Internet was developed for inter- operability, not impenetrability  Business managers and professionals alike are responsible for the security, quality, and performance of business information systems  Hardware, software, networks, and data resources must be protected by a variety of security measures 29
  • 30.  The goal of security management is the accuracy, integrity, and safety of all information system processes and resources 30
  • 31.  Encryption  Data is transmitted in scrambled form  It is unscrambled by computer systems for authorized users only  The most widely used method uses a pair of public and private keys unique to each individual 31
  • 32. 32
  • 33.  Firewalls  A gatekeeper system that protects a company’s intranets and other computer networks from intrusion  Provides a filter and safe transfer point for access to/from the Internet and other networks  Important for individuals who connect to the Internet with DSL or cable modems  Can deter hacking, but cannot prevent it 33
  • 34. 34
  • 35.  Email Monitoring  Use of content monitoring software that scans for troublesome words that might compromise corporate security  Virus Defenses  Centralize the updating and distribution of antivirus software  Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features 35
  • 36.  Methods and devices that attempt to ensure the accuracy, validit y, and propriety of information system activities 36
  • 37. 37