Security and Ethics
Employment Privacy
Business/IT
Health Security Crime
Ethics and
Society
Individuality Working
Conditions
Security and Ethics
Ethical Responsibility
• Business Ethics
• Stockholder Theory
• Social Contract Theory
• Stakeholder Theory
Security and Ethics
Ethical Responsibility
Security and Ethics
Technology Ethics
Security and Ethics
Ethical Guidelines
Privacy Issues
Right to Privacy
Privacy on the Internet
Acxiom, Inc. Challenges to
Consumer Privacy
• Acxiom – 30 Years Amassing
Massive Database
• Sells Data to Subscribers
• Use by Telemarketers and Credit
Firms
Privacy Issues
Right to Privacy
• Computer Profiling
• Computer Matching
• Privacy Laws
• Computer Libel and Censorship
• Spamming
• Flaming
Privacy Issues
Other Challenges
• Employment Challenges
• Working Conditions
• Individuality Issues
• Health Issues
Privacy Issues
Ergonomics
Security Management
Security Technology Used
Antivirus
96%
Virtual Private Networks
86%
Intrusion-Detection Systems
85%
Content Filtering/Monitoring
77%
Public-Key Infrastructure
45%
Smart Cards
43%
Biometrics
19%
Security Management
Computer Crime
• Hacking
• Cyber Theft
• Unauthorized Use of Work
• Piracy of Intellectual Property
• Computer Viruses and Worms
Security Management
Examples of Common Hacking
Security Management
Internet Abuses in the Workplace
Security Management
Network Monitoring Software
Security Management
Copying Music CDs: Intellectual
Property Controversy
• RIAA Crack Down on Music Piracy
• Web Sites Fighting Back
• 140 Million Writable Drives In Use
• Billions of Blank CDs Sold While
Music CD Sales Are Going Down
• Pirates Reluctant to Go Away
Security Management
Facts About Recent Computer
Viruses and Worms
Security Management of
Information Technology
Tools of Security Management
Security Management of
Information Technology
Encryption
Security Management of
Information Technology
Firewalls 1 External Firewall
Blocks Outsiders
2 Internal Firewall
3 4 5 Blocks Restricted
Materials
Intranet Host
Server System 3 Use of Passwords
and Browser
Security
Firewall 4 Performs
Authentication and
Encryption
Router Router 1 Careful Network
5
Interface Design
2
Internet
Firewall
4
Intranet
Server
Security Management of
Information Technology
Defending Against Denial of
Service Attacks
Security Management of
Information Technology
Other Security Measures
• Security Codes
• Multilevel Password System
– Smart Cards
• Backup Files
– Child, Parent, Grandparent Files
• System Security Monitors
• Biometric Security
Security Management of
Information Technology
Evaluation of Biometric Security
Security Management of
Information Technology
Computer Failure Controls
• Fault Tolerant Systems
–Fail-Over
–Fail-Safe
–Fail-Soft
• Disaster Recovery
Security Management of
Information Technology
Methods of Fault Tolerance
Systems Controls and
Audits
Processing
Controls
Input Output
Software Controls
Controls Hardware Controls Controls
Firewalls
Checkpoints
Security Codes Security Codes
Encryption Encryption
Data Entry Screens Control Totals
Error Signals Control Listings
Control Totals End User Feedback
Storage
Controls
Security Codes
Encryption
Backup Files
Library Procedures
Database Administration