security and ethical challenges


Published on

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

security and ethical challenges

  1. 1. Security and Ethical Challenges Management Information Systems Presented by:- Section-C (Group-8) Varun Rai Sood (BM-010162) Vibhav Gupta (BM-010163) Vijay Kr. Sharma (BM-010164) Vineet Kr. Dubey(BM-010165)
  2. 2. Security challenges <ul><li>Computer crimes that exist in the present society are:- </li></ul><ul><li>Hacking </li></ul><ul><li>Cyber Theft </li></ul><ul><li>Unauthorized use at work </li></ul><ul><li>Software Piracy </li></ul><ul><li>Piracy of intellectual property </li></ul><ul><li>Computer viruses and worms </li></ul>
  3. 3. Hacking <ul><li>Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. Hackers usually </li></ul><ul><li>Steal or damage data </li></ul><ul><li>Get unauthorized access to computer files </li></ul><ul><li>Monitor e-mails or web server access </li></ul><ul><li>May use remote services that allow one computer to execute programs on another </li></ul><ul><li>Plant data that will cause system to welcome intruders </li></ul>
  4. 4. Cyber Theft <ul><li>Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases. </li></ul>
  5. 5. Unauthorized use at Work <ul><li>Unauthorized use of computer resources especially by employees </li></ul><ul><li>Playing video games </li></ul><ul><li>Unauthorized use of internet </li></ul><ul><li>Non-work related upload/download </li></ul><ul><li>Transmission or confidential data </li></ul><ul><li>Moonlighting </li></ul>
  6. 6. Software Piracy <ul><li>Unauthorized copying of data is called software piracy or software theft </li></ul><ul><li>Software is protected by copyright law and user license agreement that allows only limited copies to be made </li></ul>
  7. 7. Piracy of Intellectual Property <ul><li>Materials other than software are also pirated by making multiple copies </li></ul><ul><li>Piracy of music, video, images, articles, books etc. </li></ul><ul><li>Dissemination of these material through internet websites </li></ul>
  8. 8. Computer viruses and worms <ul><li>A virus is a program code that cannot work without being inserted into another program </li></ul><ul><li>A worm is a distinct program that can run unaided </li></ul><ul><li>These programs copy annoying or destructive routines into the networked computer systems of anyone who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected computers </li></ul><ul><li>They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted external memory. </li></ul>
  9. 9. Privacy Issues <ul><li>Privacy on the internet </li></ul><ul><li>Computer Matching </li></ul><ul><li>Privacy Laws </li></ul><ul><li>Computer libel and censorship (threats are spamming and flaming) </li></ul>
  10. 10. Other Challenges <ul><li>Employment challenges because a lot of tasks have been automated </li></ul><ul><li>Computer monitoring causes intrusion in personal space for workers </li></ul><ul><li>Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs </li></ul><ul><li>Challenges to individuality as they eliminate the human relationships between people </li></ul>
  11. 11. Health issues <ul><li>Cumulative trauma disorders </li></ul><ul><li>Carpal tunnel syndrome </li></ul><ul><li>Radiation caused by cathode ray tubes (CRTs) is also a health concern </li></ul>
  12. 12. Benefits <ul><li>Medical diagnosis </li></ul><ul><li>Crime control </li></ul><ul><li>Environmental monitoring </li></ul><ul><li>Urban planning </li></ul><ul><li>Computer based training </li></ul><ul><li>Distance learning </li></ul>
  13. 13. Security management of IT <ul><li>Encryption </li></ul><ul><li>Firewalls </li></ul><ul><li>Denial of service attacks </li></ul><ul><li>E-mail monitoring </li></ul><ul><li>Virus defense </li></ul><ul><li>Security codes </li></ul><ul><li>Backup files </li></ul><ul><li>Security monitors </li></ul><ul><li>Biometric security </li></ul><ul><li>Computer failure controls </li></ul><ul><li>Fault tolerant systems </li></ul><ul><li>Disaster recovery </li></ul><ul><li>System controls and audits </li></ul>
  14. 14. Encryption <ul><li>The concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations. </li></ul><ul><li>Password Authentication protocol </li></ul><ul><li>Challenge Handshake authentication Protocol </li></ul><ul><li>Extensible Authentication Protocol </li></ul>
  15. 15. Firewall <ul><li>Firewalls are used to restrict access to one network from another network. Different types of firewalls exist. </li></ul><ul><li>Packet Filtering </li></ul><ul><li>Stateful firewalls </li></ul><ul><li>Proxy Firewalls </li></ul><ul><li>Kernel Proxy firewalls </li></ul>
  16. 16. Ethical responsibility of business professionals <ul><li>Business ethics are concerned with </li></ul><ul><li>Equity </li></ul><ul><li>Rights </li></ul><ul><li>Honesty </li></ul><ul><li>Exercise of corporate power </li></ul>
  17. 17. Categories of Ethical Business Issues
  18. 18. Theories of corporate social responsibility <ul><li>The stockholders theory holds that managers are agents of the stockholders and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent activities. </li></ul><ul><li>The social contract theory states that companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract </li></ul><ul><li>The stakeholders theory states that managers have ethical responsibility to manage a firm for the benefit of all of its stakeholders i.e. stockholders, employees, customers, suppliers and local community. </li></ul>
  19. 19. Principles of technology ethics <ul><li>Proportionality of benefits to risk </li></ul><ul><li>Informed consent to risks </li></ul><ul><li>Justice in distribution of risk with benefits derived to each subunit </li></ul><ul><li>Minimized risk by the selected option </li></ul>
  20. 20. Ethical guideline <ul><li>Acting with integrity </li></ul><ul><li>Increasing your professional competence </li></ul><ul><li>Setting high standards of personal performance </li></ul><ul><li>Accepting responsibility for your work </li></ul><ul><li>Advancing the health, privacy, and general welfare of the public </li></ul>
  21. 21. Case 1 Cyber scams and Cybercriminals <ul><li>Cyber scams are today ’s fastest-growing criminal niche </li></ul><ul><ul><li>87 percent of companies surveyed reported a security incident </li></ul></ul><ul><ul><li>The U.S. Federal Trade Commission says identity theft is its top complaint </li></ul></ul><ul><ul><li>eBay has 60 people combating fraud; Microsoft has 65 </li></ul></ul><ul><ul><li>Stolen credit card account numbers are regularly sold online </li></ul></ul>
  22. 22. Case Study <ul><li>What are several reasons why “cyber scams are today’s fastest-growing criminal niche”? </li></ul><ul><ul><li>Explain why the reasons you give contribute to the growth of cyber scams </li></ul></ul><ul><li>What are several security measures that could be implemented to combat the spread of cyber scams? </li></ul><ul><ul><li>Explain why your suggestions would be effective in limiting the spread of cyber scams </li></ul></ul><ul><li>Which one or two of the four top cybercriminals described in this case poses the greatest threat to businesses? To consumers? </li></ul><ul><ul><li>Explain the reasons for your choices, and how businesses and consumers can protect themselves from these cyber scammers </li></ul></ul>
  23. 23. Thank You