Title: Security, Privacy, and Ethical Issues in Information Systems and the Internet
1Security, Privacy, and Ethical Issues in
Information Systems and the Internet
2Principles and Learning Objectives
- Policies and procedures must be established to
avoid computer waste and mistakes. - Describe some examples of waste and mistakes in
an IS environment, their causes, and possible
solutions. - Identify policies and procedures useful in
eliminating waste and mistakes.
3Principles and Learning Objectives
- Computer crime is a serious and rapidly growing
area of concern requiring management attention. - Explain the types and effects of computer crime.
- Identify specific measures to prevent computer
crime. - Discuss the principles and limits of an
individuals right to privacy.
4Principles and Learning Objectives
- Jobs, equipment, and working conditions must be
designed to avoid negative health effects. - List the important effects of computers on the
work environment. - Identify specific actions that must be taken to
ensure the health and safety of employees.
5Computer Waste Mistakes
6Social Issues in Information Systems
7Computer Waste
- Discard technology
- Unused systems
- Personal use of corporate time and technology
8Preventing Computer Waste and Mistakes
- Establish Policies and Procedures
- Implement Policies and Procedures
- Monitor Policies and Procedures
- Review Policies and Procedures
9 Types of Computer-Related Mistakes
10 Useful Policies to Eliminate Waste and Mistakes
11Computer Crime
12 Number of Incidents Reported to CERT
13Computer Crime and Security Survey
14The Computer as a Tool to Commit Crime
- Social engineering
- Dumpster diving
- Identity theft
- Cyberterrorism
15Computers as Objects of Crime
- Illegal access and use
- Hackers
- Crackers
- Information and equipment theft
- Software and Internet piracy
- Computer-related scams
- International computer crime
16 How to Respond to a Security Incident
17Data Alteration and Destruction
- Virus
- Worm
- Logic bomb
- Trojan horse
18 The Six Computer Incidents with the Greatest
Worldwide Economic Impact
19 Top Viruses July 2002
20Preventing Computer-Related Crime
- Crime prevention by state and federal agencies
- Crime prevention by corporations
- Public Key Infrastructure (PKI)
- Biometrics
- Anti-virus programs
21Preventing Computer-Related Crime
- Intrusion Detection Software
- Managed Security Service Providers (MSSPs)
- Internet Laws for Libel and Protection of Decency
22Preventing Crime on the Internet
- Develop effective Internet and security policies
- Use a stand-alone firewall with network
monitoring capabilities - Monitor managers and employees
- Use Internet security specialists to perform
audits
23 Common Methods Used to Commit Computer Crimes
24 How to Protect Your Corporate Data from Hackers
25Antivirus Software
26Privacy
27Privacy Issues
- Privacy and the Federal Government
- Privacy at work
- E-mail privacy
- Privacy and the Internet
28 The Right to Know and the Ability to Decide
29 Federal Privacy Laws and Provisions
30The Work Environment
31Health Concerns
- Repetitive stress injury (RSI)
- Repetitive motion disorder
- Carpal tunnel syndrome (CTS)
- Ergonomics
32Avoiding Health and Environment Problems
- Maintain good posture and positioning.
- Do not ignore pain or discomfort.
- Use stretching and strengthening exercises.
- Find a good physician who is familiar with RSI
and how to treat it. - After treatment, start back slowly and pace
yourself.
33 Medical Topics on the Internet
34Summary
- Computer waste - the inappropriate use of
computer technology and resources in both the
public and private sectors - Identity theft - a crime in which an imposter
obtains key pieces of personal identification
information in order to impersonate someone else - Software and Internet piracy - represent the most
common computer crime