1 / 25

Security and Ethics

Privacy. Employment. Business/IT Security Ethics and Society. Health. Crime. Working Conditions. Individuality. Security and Ethics. Security and Ethics. Ethical Responsibility. Business Ethics Stockholder Theory Social Contract Theory Stakeholder Theory. Security and Ethics.

vevina
Download Presentation

Security and Ethics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Employment Business/IT Security Ethics and Society Health Crime Working Conditions Individuality Security and Ethics

  2. Security and Ethics Ethical Responsibility • Business Ethics • Stockholder Theory • Social Contract Theory • Stakeholder Theory

  3. Security and Ethics Ethical Responsibility

  4. Security and Ethics Technology Ethics

  5. Security and Ethics Ethical Guidelines

  6. Privacy Issues Right to Privacy Privacy on the Internet Acxiom, Inc. Challenges to Consumer Privacy • Acxiom – 30 Years Amassing Massive Database • Sells Data to Subscribers • Use by Telemarketers and Credit Firms

  7. Privacy Issues Right to Privacy • Computer Profiling • Computer Matching • Privacy Laws • Computer Libel and Censorship • Spamming • Flaming

  8. Privacy Issues Other Challenges • Employment Challenges • Working Conditions • Individuality Issues • Health Issues

  9. Privacy Issues Ergonomics

  10. Security Management Security Technology Used Antivirus 96% Virtual Private Networks 86% Intrusion-Detection Systems 85% Content Filtering/Monitoring 77% Public-Key Infrastructure 45% Smart Cards 43% Biometrics 19%

  11. Security Management Computer Crime • Hacking • Cyber Theft • Unauthorized Use of Work • Piracy of Intellectual Property • Computer Viruses and Worms

  12. Security Management Examples of Common Hacking

  13. Security Management Internet Abuses in the Workplace

  14. Security Management Network Monitoring Software

  15. Security Management Copying Music CDs: Intellectual Property Controversy • RIAA Crack Down on Music Piracy • Web Sites Fighting Back • 140 Million Writable Drives In Use • Billions of Blank CDs Sold While Music CD Sales Are Going Down • Pirates Reluctant to Go Away

  16. Security Management Facts About Recent Computer Viruses and Worms

  17. Security Management of Information Technology Tools of Security Management

  18. Security Management of Information Technology Encryption

  19. Security Management of Information Technology Firewalls External Firewall Blocks Outsiders 1 Internal Firewall Blocks Restricted Materials 2 3 4 5 Host System Intranet Server Use of Passwords and Browser Security 3 Firewall Performs Authentication and Encryption 4 1 Router Router Careful Network Interface Design 5 2 Internet Firewall 4 Intranet Server

  20. Security Management of Information Technology Defending Against Denial of Service Attacks

  21. Security Management of Information Technology Other Security Measures • Security Codes • Multilevel Password System • Smart Cards • Backup Files • Child, Parent, Grandparent Files • System Security Monitors • Biometric Security

  22. Security Management of Information Technology Evaluation of Biometric Security

  23. Security Management of Information Technology Computer Failure Controls • Fault Tolerant Systems • Fail-Over • Fail-Safe • Fail-Soft • Disaster Recovery

  24. Security Management of Information Technology Methods of Fault Tolerance

  25. Storage Controls Systems Controls and Audits Processing Controls Software Controls Hardware Controls Firewalls Checkpoints Input Controls Output Controls Security Codes Encryption Data Entry Screens Error Signals Control Totals Security Codes Encryption Control Totals Control Listings End User Feedback Security Codes Encryption Backup Files Library Procedures Database Administration

More Related