Successfully reported this slideshow.

Module 8 security and ethical challenges

945 views

Published on

MODULE 8 VTU ppt

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

Module 8 security and ethical challenges

  1. 1. Module 8Security and Ethical Challenges
  2. 2. Ethics• It is a set of principles prescribing a behaviour code, explains what is good and right and wrong• It outlines moral duties and obligations• Business Ethics are concerned with moral issues in business just like medical ethics in medical practice
  3. 3. Computer Crime/ Cyber Crime• It is defined by the Association of Information Technology Professionals (AITP) as: 1. The unauthorized use , access modification and destruction of hardware, software, data or network resources 2. Unauthorized release of information 3. Unauthorized copying of software 4. Denying end user access to his own hardware, software, data and network resources 5. Using or conspiring to use computer to obtain intangible property illegally
  4. 4. Computer Crime/ Cyber Crime• It is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and internet• It poses serious threat to the integrity, safety and survival of most business systems
  5. 5. Hacking and Cracking• Hacking- It is the obsessive use of computers or the unauthorized access and use of networked computer systems• Hacker can be outsider or company employee• Commits only electronic breaking and entering, that is, gets access to a computer system and read some files but neither steals nor damages anything• Can monitor e-mail, web server access or files transfers to extract passwords, steal network files or plant data that will cause a system to welcome intruders
  6. 6. Common Hacking Tactics1. Denial of service2. Scans3. Sniffer4. Spoofing5. Trojan horse6. Back doors7. Malicious applets8. War dialing9. Logic bombs10.Buffer overflow11.Password crackers12.Social engineering13.Dumpster diving
  7. 7. Cracking• Cracker refers to people who attempt to gain unauthorized access to computer systems• Maintains knowledge of the vulnerabilities and exploits them for private advantage, not revealing either to general public or the manufacturer for correction
  8. 8. Cyber Theft• Computer crimes leading to theft of money• Insiders involve unauthorized network entry and fraudulent alteration of computer databases• Early e.g. was the theft of $ 11 million from Citibank in 1994
  9. 9. Unauthorized Use at Work• Can also be called time and resource theft• Network monitoring software, called sniffers, is frequently used to monitor network traffic to evaluate network capacity, as well as to reveal evidences of improper use
  10. 10. Software Piracy• Unauthorized copying of software is a major form of SW theft• Unauthorized copying is illegal as SW is intellectual property protected by copying right law and user licensing agreements
  11. 11. Theft of Intellectual Property• Occurs in the form of infringements of copyrighted material, such as music, videos, images, articles, books
  12. 12. Privacy Issues• Accessing private e-mail conversations and computer records and collecting and sharing information about individuals gained from their visits to Internet Web sites and newsgroups• Always knowing where the person is• Using customer information gained from many sources to market additional business services• Collecting telephone numbers, e-mail addresses, credit card numbers and other personal information to build individual customer profiles (unauthorised personal profile)
  13. 13. Privacy on the Internet• E-mail, chat and newsgroups are still a wide open unsecured electronic frontier• Beware of – Collection of data about you without your knowledge
  14. 14. Cyber Law• It is a term used to describe laws intended to regulate activities over the internet or via the use of electronic data communication• It encompasses wide variety of legal and political issues related to internet and other communication technologies including Intellectual Property, privacy, freedom of expression and jurisdiction
  15. 15. Challenges1. Employment challenges2. Computer monitoring3. Challenges in working conditions4. Challenges to individuality5. Health issues6. Ergonomics
  16. 16. Thank you

×