160 likes | 282 Views
CHAPTER 3. Ethics, Privacy and Information Security. LEARNING OBJECTIVES. Describe the major ethical issues related to information technology and identify situations in which they occur. Describe the many threats to information security.
E N D
CHAPTER 3 Ethics, Privacy and Information Security
LEARNING OBJECTIVES • Describe the major ethical issues related to information technology and identify situations in which they occur. • Describe the many threats to information security. • Understand the various defense mechanisms used to protect information systems. • Explain IT auditing and planning for disaster recovery.
Ethical Issues • – branch of philosophy that deals with what is considered to be right and wrong. • – a collection of principles that are intended to guide decision making by members of an organization. • Ethics • Code of Ethics
Fundamental Tenets of Ethics • – accepting any consequences of decisions and/or actions. • – determining who is responsible. • – means that individuals have the right to recover the damages done to them by other individuals, organizations, or systems. • Responsibility • Accountability • Liability
The Four Categories of Ethical Issues • Privacy Issues • Accuracy Issues • Property Issues • Accessibility Issues
Threats to Privacy • Data aggregators, digital dossiers, and profiling • Electronic Surveillance • Personal Information in Databases • Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites
Protecting Privacy • Privacy Codes and Policies • Opt-out Model • Opt-in Model • – organization’s guidelines with respect to protecting the privacy of customers, clients, and employees. • – collect personal information until the customer specifically requests that the data not be collected. • – prohibited from collecting any personal information unless the customer specifically authorizes it.
Factors Increasing the Threats to Information Security • Today’s interconnected, interdependent, wirelessly-networked business environment • Government legislation • Smaller, faster, cheaper computers and storage devices • Decreasing skills necessary to be a computer hacker
Factors Increasing the Threats to Information Security (continued) • International organized crime turning to cybercrime • Downstream liability • Increased employee use of unmanaged devices • Lack of management support
Key Information Security Terms • Threat • Exposure • Vulnerability • Risk
Categories of Threats to Information Systems • Unintentional acts • Natural disasters • Technical failures • Management failures • Deliberate acts
Risk Management • Risk • Risk management • Risk analysis • Risk mitigation
Risk Mitigation Strategies • Risk acceptance • Risk limitation • Risk transference
Access Controls • Authentication • Something the user is • Something the user has • Something the user does • Something the user knows
Network Controls • Firewalls • Antivirus software • Whitelisting and Blacklisting software • Encryption • Digital Certificates • VPN • Employee Monitoring Systems
What organizations can do... • Business Continuity Planning • Backup • Recovery • Information Security Auditing