Security, Privacy, and Ethical Issues in Information Systems and the Internet - PowerPoint PPT Presentation

1 / 34
About This Presentation
Title:

Security, Privacy, and Ethical Issues in Information Systems and the Internet

Description:

Software and Internet piracy. Computer-related scams. International computer crime ... Internet Laws for Libel and Protection of Decency ... – PowerPoint PPT presentation

Number of Views:394
Avg rating:3.0/5.0
Slides: 35
Provided by: ndsuN
Category:

less

Transcript and Presenter's Notes

Title: Security, Privacy, and Ethical Issues in Information Systems and the Internet


1
Security, Privacy, and Ethical Issues in
Information Systems and the Internet
  • Chapter 9

2
Principles and Learning Objectives
  • Policies and procedures must be established to
    avoid computer waste and mistakes.
  • Describe some examples of waste and mistakes in
    an IS environment, their causes, and possible
    solutions.
  • Identify policies and procedures useful in
    eliminating waste and mistakes.

3
Principles and Learning Objectives
  • Computer crime is a serious and rapidly growing
    area of concern requiring management attention.
  • Explain the types and effects of computer crime.
  • Identify specific measures to prevent computer
    crime.
  • Discuss the principles and limits of an
    individuals right to privacy.

4
Principles and Learning Objectives
  • Jobs, equipment, and working conditions must be
    designed to avoid negative health effects.
  • List the important effects of computers on the
    work environment.
  • Identify specific actions that must be taken to
    ensure the health and safety of employees.

5
Computer Waste Mistakes
6
Social Issues in Information Systems
7
Computer Waste
  • Discard technology
  • Unused systems
  • Personal use of corporate time and technology

8
Preventing Computer Waste and Mistakes
  • Establish Policies and Procedures
  • Implement Policies and Procedures
  • Monitor Policies and Procedures
  • Review Policies and Procedures

9
Types of Computer-Related Mistakes
10
Useful Policies to Eliminate Waste and Mistakes
11
Computer Crime
12
Number of Incidents Reported to CERT
13
Computer Crime and Security Survey
14
The Computer as a Tool to Commit Crime
  • Social engineering
  • Dumpster diving
  • Identity theft
  • Cyberterrorism

15
Computers as Objects of Crime
  • Illegal access and use
  • Hackers
  • Crackers
  • Information and equipment theft
  • Software and Internet piracy
  • Computer-related scams
  • International computer crime

16
How to Respond to a Security Incident
17
Data Alteration and Destruction
  • Virus
  • Worm
  • Logic bomb
  • Trojan horse

18
The Six Computer Incidents with the Greatest
Worldwide Economic Impact
19
Top Viruses July 2002
20
Preventing Computer-Related Crime
  • Crime prevention by state and federal agencies
  • Crime prevention by corporations
  • Public Key Infrastructure (PKI)
  • Biometrics
  • Anti-virus programs

21
Preventing Computer-Related Crime
  • Intrusion Detection Software
  • Managed Security Service Providers (MSSPs)
  • Internet Laws for Libel and Protection of Decency

22
Preventing Crime on the Internet
  • Develop effective Internet and security policies
  • Use a stand-alone firewall with network
    monitoring capabilities
  • Monitor managers and employees
  • Use Internet security specialists to perform
    audits

23
Common Methods Used to Commit Computer Crimes
24
How to Protect Your Corporate Data from Hackers
25
Antivirus Software
26
Privacy
27
Privacy Issues
  • Privacy and the Federal Government
  • Privacy at work
  • E-mail privacy
  • Privacy and the Internet

28
The Right to Know and the Ability to Decide
29
Federal Privacy Laws and Provisions
30
The Work Environment
31
Health Concerns
  • Repetitive stress injury (RSI)
  • Repetitive motion disorder
  • Carpal tunnel syndrome (CTS)
  • Ergonomics

32
Avoiding Health and Environment Problems
  • Maintain good posture and positioning.
  • Do not ignore pain or discomfort.
  • Use stretching and strengthening exercises.
  • Find a good physician who is familiar with RSI
    and how to treat it.
  • After treatment, start back slowly and pace
    yourself.

33
Medical Topics on the Internet
34
Summary
  • Computer waste - the inappropriate use of
    computer technology and resources in both the
    public and private sectors
  • Identity theft - a crime in which an imposter
    obtains key pieces of personal identification
    information in order to impersonate someone else
  • Software and Internet piracy - represent the most
    common computer crime
Write a Comment
User Comments (0)
About PowerShow.com