security and ethics employment health individuality privacy working conditions crime business/it...

25
Security and Ethics Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Upload: everett-fleming

Post on 02-Jan-2016

230 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Security and EthicsSecurity and Ethics

Employment

Health

Individuality

Privacy

WorkingConditions

CrimeBusiness/IT

SecurityEthics and

Society

Page 2: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Security and EthicsSecurity and Ethics

• Business Ethics• Stockholder Theory• Social Contract Theory• Stakeholder Theory

Ethical ResponsibilityEthical Responsibility

Page 3: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Security and EthicsSecurity and Ethics

Ethical ResponsibilityEthical Responsibility

Page 4: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Security and EthicsSecurity and Ethics

Technology EthicsTechnology Ethics

Page 5: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Security and EthicsSecurity and EthicsEthical GuidelinesEthical Guidelines

Page 6: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Right to PrivacyRight to Privacy

Privacy on the InternetAcxiom, Inc. Challenges to Acxiom, Inc. Challenges to

Consumer PrivacyConsumer Privacy• Acxiom – 30 Years Amassing

Massive Database• Sells Data to Subscribers• Use by Telemarketers and Credit

Firms

Privacy IssuesPrivacy Issues

Page 7: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Right to PrivacyRight to Privacy

• Computer Profiling• Computer Matching• Privacy Laws• Computer Libel and Censorship• Spamming• Flaming

Privacy IssuesPrivacy Issues

Page 8: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Other ChallengesOther Challenges

• Employment Challenges

• Working Conditions

• Individuality Issues

• Health Issues

Privacy IssuesPrivacy Issues

Page 9: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

ErgonomicsErgonomics

Privacy IssuesPrivacy Issues

Page 10: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Antivirus 96%

Virtual Private Networks86%

Intrusion-Detection Systems85%

Content Filtering/Monitoring77%

Public-Key Infrastructure 45%

Smart Cards43%

Biometrics19%

Security Technology UsedSecurity Technology UsedSecurity ManagementSecurity Management

Page 11: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Computer CrimeComputer Crime

• Hacking• Cyber Theft• Unauthorized Use of Work• Piracy of Intellectual Property• Computer Viruses and Worms

Security ManagementSecurity Management

Page 12: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Examples of Common HackingExamples of Common HackingSecurity ManagementSecurity Management

Page 13: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Internet Abuses in the WorkplaceInternet Abuses in the Workplace

Security Management

Page 14: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Network Monitoring SoftwareNetwork Monitoring Software

Security ManagementSecurity Management

Page 15: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Copying Music CDs: Intellectual Copying Music CDs: Intellectual Property ControversyProperty Controversy

• RIAA Crack Down on Music Piracy• Web Sites Fighting Back• 140 Million Writable Drives In Use• Billions of Blank CDs Sold While

Music CD Sales Are Going Down• Pirates Reluctant to Go Away

Security ManagementSecurity Management

Page 16: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Facts About Recent Computer Facts About Recent Computer Viruses and WormsViruses and Worms

Security ManagementSecurity Management

Page 17: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Tools of Security ManagementTools of Security Management

Security Management of Information Technology

Page 18: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

EncryptionEncryption

Security Management of Security Management of Information TechnologyInformation Technology

Page 19: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

FirewallsFirewalls

Security Management of Security Management of Information TechnologyInformation Technology

Firewall

IntranetServer

Firewall

Router Router

IntranetServer

Host System

Internet

1

2

3

4

4 5

1 External FirewallBlocks Outsiders

2 Internal FirewallBlocks Restricted Materials

3 Use of Passwords and Browser Security

4 Performs Authentication and Encryption

5 Careful Network Interface Design

Page 20: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Defending Against Denial of Defending Against Denial of Service AttacksService Attacks

Security Management of Security Management of Information TechnologyInformation Technology

Page 21: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Other Security MeasuresOther Security Measures

Security Management of Security Management of Information TechnologyInformation Technology

• Security Codes• Multilevel Password System

– Smart Cards• Backup Files

– Child, Parent, Grandparent Files• System Security Monitors• Biometric Security

Page 22: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Evaluation of Biometric SecurityEvaluation of Biometric Security

Security Management of Security Management of Information TechnologyInformation Technology

Page 23: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Computer Failure ControlsComputer Failure Controls

Security Management of Security Management of Information TechnologyInformation Technology

• Fault Tolerant Systems–Fail-Over–Fail-Safe–Fail-Soft

• Disaster Recovery

Page 24: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Methods of Fault ToleranceMethods of Fault Tolerance

Security Management of Security Management of Information TechnologyInformation Technology

Page 25: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society

Systems Controls and Systems Controls and AuditsAudits

Security CodesEncryption

Data Entry ScreensError Signals

Control Totals

Security CodesEncryption

Control TotalsControl Listings

End User Feedback

Security CodesEncryption

Backup FilesLibrary Procedures

Database Administration

InputControls

OutputControls

StorageControls

ProcessingControls

Software ControlsHardware Controls

FirewallsCheckpoints