chap1-security ethic

Upload: zunair

Post on 04-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Chap1-Security Ethic

    1/18

    SECURITY & ETHIC

    CHAPTER 1

    CFB2003

    Computer Ethics & Cyber LawsBy Mr. Hanizan Shaker Hussain

  • 7/30/2019 Chap1-Security Ethic

    2/18

    Security and EthicsEmployment

    Health

    Individuality

    Privacy

    WorkingConditions

    CrimeBusiness/IT

    SecurityEthics and

    Society

  • 7/30/2019 Chap1-Security Ethic

    3/18

    Professional Environment:Deals with codes of conduct, professionalexpectation

    Question:

    Can we influence individuals conduct bymaking them aware of theirprofessional/environment codes?

  • 7/30/2019 Chap1-Security Ethic

    4/18

    Professional Codes: General codes:

    UB code MIS related codes:

    ACMhttp://www.acm.org/constitution/bylaw17.html

    IEEE

    http://www.ieee.org/committee/ethics/

    AITPhttp://www.aitp.org/

  • 7/30/2019 Chap1-Security Ethic

    5/18

    Ethical Guidelines

  • 7/30/2019 Chap1-Security Ethic

    6/18

    James Rachels, moralist,

    suggest two criteria:1. Reason..

    Decision based on REASONS acceptable

    to other RATIONAL persons.

    2. Impartiality..

    Decision is impartial when INTERESTSof all those affected by it are taken intoaccount

  • 7/30/2019 Chap1-Security Ethic

    7/18

    State of Ethics in

    Corporate World Enron

    The Enronscandal was a corporate scandal involving the American energy company EnronCorporation based in Houston,Texas. Enron undoubtedly is the biggest audit failure.

    Merck --draws VIOXXMerck says it will fund the $4.85 billion settlement designed to resolve tens of thousands of lawsuits related to its Vioxxpainkiller, waiving its right to walk away from the settlement deal. Payments to claimants will begin to be made before theend of August. Nearly 60,000 people have registered a claim that the once-popular painkiller caused a heart attack orstroke.

    AIG, Marsh & McLennan - Insurance fraudThe America's biggest insurers are mired in a brewing scandal that many executives fear could shake the industry to itscore. Marsh & McLennan accused of price fixing (alleged conflicts of interest).

    Options back datingOptions backdating is the practice of granting an employee stock option that is dated prior to the date that the companyactually granted the option. This practice raises a number of legal and accounting issues. The practice of backdating itself isnot illegal, nor is granting of discounted stock options. What is illegal is the improper disclosures, both in financial recordsand in filings with the United States Securities and Exchange Commission (SEC).

    etc

  • 7/30/2019 Chap1-Security Ethic

    8/18

    Legal and Ethical IssuesLEGAL ILLEGAL

    ETHICAL I II

    UNETHICAL III IV

    I WORK WITHIN ETHICS AND LAW..

    II INTRODUCE A TESTED BUT UNFINISHED DRUG IN 3RD WORLD

    WHICH IS TIME SENSITIVE and MAY BENEFIT MASSES

    III INTRODUCE AN APPROVED BUT HARMFUL DRUG..IV GIVE BRIBES TO GET CONTRACTS..

    By : Haag & Cummins

  • 7/30/2019 Chap1-Security Ethic

    9/18

    Ethical Responsibility

    Business Ethics

    Stockholder Theory Social Contract Theory

    Stakeholder Theory

  • 7/30/2019 Chap1-Security Ethic

    10/18

    Ethical Responsibility

  • 7/30/2019 Chap1-Security Ethic

    11/18

    Technology Ethics

  • 7/30/2019 Chap1-Security Ethic

    12/18

    Ten Commandments Of Computer

    EthicsCreated by the Computer Ethics Institute

    Thou Shalt Not Use A Computer To Harm Other People. Thou Shalt Not Interfere With Other Peoples Computer Work.

    Thou Shalt Not SnoopAround In Other Peoples Computer Files. Thou Shalt Not Use A Computer To Steal. Thou Shalt Not Use A Computer To Bear False Witness. Thou Shalt Not Copy Or Use Proprietary Software For Which You have

    Not Paid. Thou Shalt Not Use Other Peoples Computer Resources Without

    Authorization Or Proper Compensation. Thou Shalt Not Appropriate Other Peoples Intellectual Output. Thou Shalt Think About The Social Consequences Of The Program You

    Are Writing Or The System You Are Designing. Thou Shalt Always Use A Computer In Ways That Insure Consideration

    And Respect For Your Fellow Humans.

  • 7/30/2019 Chap1-Security Ethic

    13/18

    Right to Privacy

    Computer Profiling Computer Matching Privacy Laws Computer Libel and Censorship Spamming

    Privacy Issues

  • 7/30/2019 Chap1-Security Ethic

    14/18

    Other Challenges

    Employment Challenges Working Conditions

    Individuality Issues

    Health Issues

    Privacy Issues

  • 7/30/2019 Chap1-Security Ethic

    15/18

    Ergonomics

    DESIGN HEALTHY WORK ENVIRONMENTwhich is:

    Safe

    Comfortable

    Pleasant

  • 7/30/2019 Chap1-Security Ethic

    16/18

    Ergonomics

    Privacy Issues

  • 7/30/2019 Chap1-Security Ethic

    17/18

    Antivirus96%

    Virtual Private Networks

    86%Intrusion-Detection Systems

    85%

    Content Filtering/Monitoring77%

    Public-Key Infrastructure45%

    Smart Cards43%

    Biometrics19%

    Security Technology Used

    Security Management

  • 7/30/2019 Chap1-Security Ethic

    18/18

    Computer Crime

    Hacking Cyber Theft Unauthorized Use of Work

    Piracy of Intellectual Property Computer Viruses and Worms

    Security Management