320 likes | 787 Views
Privacy. Employment. Business/IT Security Ethics and Society. Health. Crime. Working Conditions. Individuality. Security and Ethics. Security and Ethics. Ethical Responsibility. Business Ethics Stockholder Theory Social Contract Theory Stakeholder Theory. Security and Ethics.
E N D
Privacy Employment Business/IT Security Ethics and Society Health Crime Working Conditions Individuality Security and Ethics
Security and Ethics Ethical Responsibility • Business Ethics • Stockholder Theory • Social Contract Theory • Stakeholder Theory
Security and Ethics Ethical Responsibility
Security and Ethics Technology Ethics
Security and Ethics Ethical Guidelines
Privacy Issues Right to Privacy Privacy on the Internet Acxiom, Inc. Challenges to Consumer Privacy • Acxiom – 30 Years Amassing Massive Database • Sells Data to Subscribers • Use by Telemarketers and Credit Firms
Privacy Issues Right to Privacy • Computer Profiling • Computer Matching • Privacy Laws • Computer Libel and Censorship • Spamming • Flaming
Privacy Issues Other Challenges • Employment Challenges • Working Conditions • Individuality Issues • Health Issues
Privacy Issues Ergonomics
Security Management Security Technology Used Antivirus 96% Virtual Private Networks 86% Intrusion-Detection Systems 85% Content Filtering/Monitoring 77% Public-Key Infrastructure 45% Smart Cards 43% Biometrics 19%
Security Management Computer Crime • Hacking • Cyber Theft • Unauthorized Use of Work • Piracy of Intellectual Property • Computer Viruses and Worms
Security Management Examples of Common Hacking
Security Management Internet Abuses in the Workplace
Security Management Network Monitoring Software
Security Management Copying Music CDs: Intellectual Property Controversy • RIAA Crack Down on Music Piracy • Web Sites Fighting Back • 140 Million Writable Drives In Use • Billions of Blank CDs Sold While Music CD Sales Are Going Down • Pirates Reluctant to Go Away
Security Management Facts About Recent Computer Viruses and Worms
Security Management of Information Technology Tools of Security Management
Security Management of Information Technology Firewalls External Firewall Blocks Outsiders 1 Internal Firewall Blocks Restricted Materials 2 3 4 5 Host System Intranet Server Use of Passwords and Browser Security 3 Firewall Performs Authentication and Encryption 4 1 Router Router Careful Network Interface Design 5 2 Internet Firewall 4 Intranet Server
Security Management of Information Technology Defending Against Denial of Service Attacks
Security Management of Information Technology Other Security Measures • Security Codes • Multilevel Password System • Smart Cards • Backup Files • Child, Parent, Grandparent Files • System Security Monitors • Biometric Security
Security Management of Information Technology Evaluation of Biometric Security
Security Management of Information Technology Computer Failure Controls • Fault Tolerant Systems • Fail-Over • Fail-Safe • Fail-Soft • Disaster Recovery
Security Management of Information Technology Methods of Fault Tolerance
Storage Controls Systems Controls and Audits Processing Controls Software Controls Hardware Controls Firewalls Checkpoints Input Controls Output Controls Security Codes Encryption Data Entry Screens Error Signals Control Totals Security Codes Encryption Control Totals Control Listings End User Feedback Security Codes Encryption Backup Files Library Procedures Database Administration