Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
256 views25 pages

Security Ethics

The document discusses several topics related to security and ethics in information technology including ethical responsibility in business, privacy issues on the internet, challenges to consumer privacy from companies like Acxiom that collect and sell consumer data, security management techniques used by organizations like antivirus software and firewalls, computer crimes like hacking and intellectual property theft, and methods for ensuring security of information systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
256 views25 pages

Security Ethics

The document discusses several topics related to security and ethics in information technology including ethical responsibility in business, privacy issues on the internet, challenges to consumer privacy from companies like Acxiom that collect and sell consumer data, security management techniques used by organizations like antivirus software and firewalls, computer crimes like hacking and intellectual property theft, and methods for ensuring security of information systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 25

Security and Ethics

Employment Privacy

Business/IT
Health Security Crime
Ethics and
Society

Individuality Working
Conditions
Security and Ethics
Ethical Responsibility
• Business Ethics
• Stockholder Theory
• Social Contract Theory
• Stakeholder Theory
Security and Ethics
Ethical Responsibility
Security and Ethics
Technology Ethics
Security and Ethics
Ethical Guidelines
Privacy Issues
Right to Privacy
Privacy on the Internet
Acxiom, Inc. Challenges to
Consumer Privacy
• Acxiom – 30 Years Amassing
Massive Database
• Sells Data to Subscribers
• Use by Telemarketers and Credit
Firms
Privacy Issues
Right to Privacy
• Computer Profiling
• Computer Matching
• Privacy Laws
• Computer Libel and Censorship
• Spamming
• Flaming
Privacy Issues
Other Challenges

• Employment Challenges
• Working Conditions
• Individuality Issues
• Health Issues
Privacy Issues
Ergonomics
Security Management
Security Technology Used
Antivirus
96%
Virtual Private Networks
86%
Intrusion-Detection Systems
85%
Content Filtering/Monitoring
77%
Public-Key Infrastructure
45%
Smart Cards
43%
Biometrics
19%
Security Management
Computer Crime
• Hacking
• Cyber Theft
• Unauthorized Use of Work
• Piracy of Intellectual Property
• Computer Viruses and Worms
Security Management
Examples of Common Hacking
Security Management
Internet Abuses in the Workplace
Security Management
Network Monitoring Software
Security Management
Copying Music CDs: Intellectual
Property Controversy
• RIAA Crack Down on Music Piracy
• Web Sites Fighting Back
• 140 Million Writable Drives In Use
• Billions of Blank CDs Sold While
Music CD Sales Are Going Down
• Pirates Reluctant to Go Away
Security Management
Facts About Recent Computer
Viruses and Worms
Security Management of
Information Technology
Tools of Security Management
Security Management of
Information Technology
Encryption
Security Management of
Information Technology
Firewalls 1 External Firewall
Blocks Outsiders
2 Internal Firewall
3 4 5 Blocks Restricted
Materials
Intranet Host
Server System 3 Use of Passwords
and Browser
Security
Firewall 4 Performs
Authentication and
Encryption
Router Router 1 Careful Network
5
Interface Design

2
Internet
Firewall

4
Intranet
Server
Security Management of
Information Technology
Defending Against Denial of
Service Attacks
Security Management of
Information Technology
Other Security Measures
• Security Codes
• Multilevel Password System
– Smart Cards
• Backup Files
– Child, Parent, Grandparent Files
• System Security Monitors
• Biometric Security
Security Management of
Information Technology
Evaluation of Biometric Security
Security Management of
Information Technology
Computer Failure Controls

• Fault Tolerant Systems


–Fail-Over
–Fail-Safe
–Fail-Soft
• Disaster Recovery
Security Management of
Information Technology
Methods of Fault Tolerance
Systems Controls and
Audits
Processing
Controls
Input Output
Software Controls
Controls Hardware Controls Controls
Firewalls
Checkpoints

Security Codes Security Codes


Encryption Encryption
Data Entry Screens Control Totals
Error Signals Control Listings
Control Totals End User Feedback

Storage
Controls

Security Codes
Encryption
Backup Files
Library Procedures
Database Administration

You might also like