security and ethics employment health individuality privacy working conditions crime business/it...
TRANSCRIPT
Security and EthicsSecurity and Ethics
Employment
Health
Individuality
Privacy
WorkingConditions
CrimeBusiness/IT
SecurityEthics and
Society
Security and EthicsSecurity and Ethics
• Business Ethics• Stockholder Theory• Social Contract Theory• Stakeholder Theory
Ethical ResponsibilityEthical Responsibility
Security and EthicsSecurity and Ethics
Ethical ResponsibilityEthical Responsibility
Security and EthicsSecurity and Ethics
Technology EthicsTechnology Ethics
Security and EthicsSecurity and EthicsEthical GuidelinesEthical Guidelines
Right to PrivacyRight to Privacy
Privacy on the InternetAcxiom, Inc. Challenges to Acxiom, Inc. Challenges to
Consumer PrivacyConsumer Privacy• Acxiom – 30 Years Amassing
Massive Database• Sells Data to Subscribers• Use by Telemarketers and Credit
Firms
Privacy IssuesPrivacy Issues
Right to PrivacyRight to Privacy
• Computer Profiling• Computer Matching• Privacy Laws• Computer Libel and Censorship• Spamming• Flaming
Privacy IssuesPrivacy Issues
Other ChallengesOther Challenges
• Employment Challenges
• Working Conditions
• Individuality Issues
• Health Issues
Privacy IssuesPrivacy Issues
ErgonomicsErgonomics
Privacy IssuesPrivacy Issues
Antivirus 96%
Virtual Private Networks86%
Intrusion-Detection Systems85%
Content Filtering/Monitoring77%
Public-Key Infrastructure 45%
Smart Cards43%
Biometrics19%
Security Technology UsedSecurity Technology UsedSecurity ManagementSecurity Management
Computer CrimeComputer Crime
• Hacking• Cyber Theft• Unauthorized Use of Work• Piracy of Intellectual Property• Computer Viruses and Worms
Security ManagementSecurity Management
Examples of Common HackingExamples of Common HackingSecurity ManagementSecurity Management
Internet Abuses in the WorkplaceInternet Abuses in the Workplace
Security Management
Network Monitoring SoftwareNetwork Monitoring Software
Security ManagementSecurity Management
Copying Music CDs: Intellectual Copying Music CDs: Intellectual Property ControversyProperty Controversy
• RIAA Crack Down on Music Piracy• Web Sites Fighting Back• 140 Million Writable Drives In Use• Billions of Blank CDs Sold While
Music CD Sales Are Going Down• Pirates Reluctant to Go Away
Security ManagementSecurity Management
Facts About Recent Computer Facts About Recent Computer Viruses and WormsViruses and Worms
Security ManagementSecurity Management
Tools of Security ManagementTools of Security Management
Security Management of Information Technology
EncryptionEncryption
Security Management of Security Management of Information TechnologyInformation Technology
FirewallsFirewalls
Security Management of Security Management of Information TechnologyInformation Technology
Firewall
IntranetServer
Firewall
Router Router
IntranetServer
Host System
Internet
1
2
3
4
4 5
1 External FirewallBlocks Outsiders
2 Internal FirewallBlocks Restricted Materials
3 Use of Passwords and Browser Security
4 Performs Authentication and Encryption
5 Careful Network Interface Design
Defending Against Denial of Defending Against Denial of Service AttacksService Attacks
Security Management of Security Management of Information TechnologyInformation Technology
Other Security MeasuresOther Security Measures
Security Management of Security Management of Information TechnologyInformation Technology
• Security Codes• Multilevel Password System
– Smart Cards• Backup Files
– Child, Parent, Grandparent Files• System Security Monitors• Biometric Security
Evaluation of Biometric SecurityEvaluation of Biometric Security
Security Management of Security Management of Information TechnologyInformation Technology
Computer Failure ControlsComputer Failure Controls
Security Management of Security Management of Information TechnologyInformation Technology
• Fault Tolerant Systems–Fail-Over–Fail-Safe–Fail-Soft
• Disaster Recovery
Methods of Fault ToleranceMethods of Fault Tolerance
Security Management of Security Management of Information TechnologyInformation Technology
Systems Controls and Systems Controls and AuditsAudits
Security CodesEncryption
Data Entry ScreensError Signals
Control Totals
Security CodesEncryption
Control TotalsControl Listings
End User Feedback
Security CodesEncryption
Backup FilesLibrary Procedures
Database Administration
InputControls
OutputControls
StorageControls
ProcessingControls
Software ControlsHardware Controls
FirewallsCheckpoints