SlideShare une entreprise Scribd logo
1  sur  24
Ethical Implications & Social Impacts of Information
                                         Technology
                                                   &
                    Information Technology Security



                               Radhika Sharma (93)
                                Rahul Sharma (94)
Information security means protecting information 
and information systems from unauthorized access, 
  use, disclosure, disruption, modification, perusal, 
         inspection, recording or destruction.
Objectives
   Information Security
       The Threats
       Scope of Security Management
       Tools for Computer Security
Information Security
   Information security is more than just protecting
    hardware and software from being crashed…
   It’s about protecting the information resources that
    keep the company operating
   Goals are to ensure:
       Data integrity, availability and confidentiality
       Business continuity
Threats from outside…
Common Attacks - Corporate
   Virus/Worm: A computer program that appears to
    perform a legitimate task, but is a hidden malware
         E.g., wipe out a hard drive; send out an unauthorized email,
          etc.
   Sniffing: Interception and reading of electronic messages
    as they travel over the Internet
         E.g., copy passwords, or credit card information
   Denial of Service: Attacks from coordinated computers
    that floods a site with so many requests until the site
    crashes
         Thousands of page requests/minute on an ecommerce site
          (virus as well)
Common Attacks - Personal
   Spoofing: Masquerade as a legitimate web site and
    redirect traffic to a fraudulent site
   Con artists: calling to offer credit card account to obtain
    info about email, SSN, etc.
   Phishing or Fishing: Fraudulent email attempt to obtain
    sensitive information
         E.g., email notifying a bank account owner that s/he account
          had a security breach, and request the owner to log in a
          fraudulent website to “reset the password”
Threats from inside….
   Employee illegally accesses email accounts
   Angry / misguided technical personnel:
       Deletes sensitive data
       Rewrites a program so that data is corrupted/company can’t operate
       Leaves a ‘cyber bomb’ that detonates in the event he/she is fired
   Employee steals sensitive data (customer) and sells it to a
    competitor
Dimensions of security
Security’s Five Pillars
    Authentication: Verifying the authenticity of users – ensuring
     people are who they say they are.
          ID/Password, biometric, questions
    Identification: Identifying users to grant them appropriate
     access
          Allowing system to know who someone is to give appropriate
           access rights
    Privacy: Protecting information from being seen
          E.g., against spyware installed without consent in a computer to
           collect information
Security’s Five Pillars(Contd..)
   Integrity: Keeping information in its original form
         Ensuring data is not altered in any way




   Non-repudiation: Preventing parties from denying
    actions they have taken
         Ensuring that the parties in a transaction are who they say
          they are and cannot deny that transaction took place
Technical Countermeasures
   Firewalls:
       hardware/software to control access between networks
        / blocking unwanted access
            >   Windows Vista
   Encryption/decryption:
       Using an algorithm (cipher) to make a plain text
        unreadable to anyone that does not have a key
           SSL
Technical Countermeasures
   Virtual Private Networks (VPNs)
       Allow strong protection for data communications
       Cheaper than private networks, but do not provide
        100% end-to-end security
Encryption / SSL
                                                               An SSL Certificate
                                                                enables encryption of
                                                                sensitive information
                                                                during online
                                                                transactions.
                                                               Each SSL Certificate
                                                                contains unique,
                                                                authenticated
                                                                information about the
                                                                certificate owner.
     Each SSL Certificate consists of a public key and a
                                                               A Certificate Authority
      private key. Public key: scramble; Private Key:
                                                                verifies the identity of
      unscramble
                                                                the certificate owner
     Secure Sockets Layer handshake authenticates              when it is issued.
      the server (Web site) and the client (Web
      browser).
     Unique session key established and secure
      transmission can begin.
Ethics Defined

   Ethics refers to the principles of right and wrong that
    individuals, acting as free moral agents, use to make choices
    to guide their behaviors.

   Information systems raise new ethical questions for
    both individuals and societies because they create
    opportunities for intense social change, and thus threaten
    existing distributions of power, money, rights, and
    obligations.
   Ethical issues in information systems have been given new
    urgency by the rise of the Internet and electronic
    commerce.

   Internet and digital firm technologies make it easier than
    ever to assemble, integrate, and distribute information,
    unleashing new concerns about the appropriate use of
    customer information, the protection of personal privacy,
    and the protection of intellectual property.

   Insiders with special knowledge can “fool” information
    systems by submitting phony records, and diverting cash, on
    a scale unimaginable in the pre-computer era.
The major ethical, social, and political issues raised by information systems
include the following moral dimensions:

Information   rights and obligations. What information rights do individuals
and organizations possess with respect to themselves? What can they protect?
What obligations do individuals and organizations have concerning this
information?
Property rights and obligations. How will traditional intellectual property
rights be protected in a digital society in which tracing and accounting for
ownership are difficult and ignoring such property rights is so easy?
Accountability and control. Who can and will be held accountable and liable
for the harm done to individual and collective information and property rights?
System quality. What standards of data and system quality should we demand
to protect individual rights and the safety of society?
Quality of life. What values should be preserved in an information- and
knowledge-based society? Which institutions should we protect from violation?
Which cultural values and practices are supported by the new information
technology?
Ethics in Information Technology
The increased use of information technology has raised
many ethical issues for today’s IT professional. Various
ethical issues are:

Plagiarism
Piracy
Hacking
Computer     crime
Viruses
•   Intellectual property
Work     pressures imposed on computer professionals
Social Impacts
   This infrastructure might affect real-time transactions
    and make intermediaries such as sales clerks, stock
    brokers and travel agents, whose function is to
    provide an essential information link between buyers
    and sellers, redundant.

   Computers and communication technologies allow
    individuals to communicate with one another in ways
    complementary to traditional face-to-face, telephonic,
    and written modes.
Social Impacts
   It would be easier for individuals to work on flexible
    schedules, to work part time, to share jobs, or to hold
    two or more jobs simultaneously.

   Beyond the net employment gains or losses brought
    about by these factors, it is apparent that workers with
    different skill levels will be affected differently.
Social Impacts
   Advances in information technology will affect the craft of
    teaching by complementing rather than eliminating
    traditional classroom instruction.

   Many issues also surround free speech and regulation of
    content on the Internet, and there continue to be calls
    for mechanisms to control objectionable content.
ACHIEVING ETHICS IN
INFORMATION TECHNOLOGY
   Companies can get assistance in the form of ethics codes
    and ethics educational programs to provide the
    foundation for their culture
   The ethics codes can be used as is or tailored to the firm
   Educational programs can assist in developing a
    corporate credo and in putting ethics programs in place
“The ongoing computing and communications revolution has numerous
 economic and social impacts on modern society and requires serious
 social science investigation in order to manage its risks and dangers.
  Such work would be valuable for both social policy and technology
                                  design”
Managing IT security and Business Ethics

Contenu connexe

Tendances

28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
Stichting ePortfolio Support
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
Rishav Gupta
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
Eduserv
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
Tania Fuchs
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 

Tendances (20)

Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Information security
Information securityInformation security
Information security
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 

Similaire à Managing IT security and Business Ethics

Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
Mohsin Ahmad
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
AnanthReddy38
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxTop 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
AnanthReddy38
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
caca1009
 

Similaire à Managing IT security and Business Ethics (20)

Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Information security
Information securityInformation security
Information security
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment Systems
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxTop 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
The Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesThe Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL Certificates
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Information security
Information securityInformation security
Information security
 
security IDS
security IDSsecurity IDS
security IDS
 

Plus de Rahul Sharma (11)

Preparing Detailed Project Report and Presenting Business Plan to Investors
Preparing Detailed Project Report  and Presenting Business Plan to InvestorsPreparing Detailed Project Report  and Presenting Business Plan to Investors
Preparing Detailed Project Report and Presenting Business Plan to Investors
 
Coal pricing(Domestic and International)
Coal pricing(Domestic and International)Coal pricing(Domestic and International)
Coal pricing(Domestic and International)
 
Latest Mergers and Acquisitions
Latest Mergers and AcquisitionsLatest Mergers and Acquisitions
Latest Mergers and Acquisitions
 
Consumer protection Act
Consumer protection ActConsumer protection Act
Consumer protection Act
 
Companies act 1956
Companies act 1956Companies act 1956
Companies act 1956
 
JSW Steel Ltd.
JSW Steel Ltd.JSW Steel Ltd.
JSW Steel Ltd.
 
Need of Power?
Need of Power?Need of Power?
Need of Power?
 
Unit trust of india
Unit trust of indiaUnit trust of india
Unit trust of india
 
Growth of indian money market
Growth of indian money marketGrowth of indian money market
Growth of indian money market
 
Strategic Fit
Strategic FitStrategic Fit
Strategic Fit
 
Group 7 load forecasting&harmonics final ppt
Group   7 load forecasting&harmonics final pptGroup   7 load forecasting&harmonics final ppt
Group 7 load forecasting&harmonics final ppt
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Managing IT security and Business Ethics

  • 1. Ethical Implications & Social Impacts of Information Technology & Information Technology Security Radhika Sharma (93) Rahul Sharma (94)
  • 2. Information security means protecting information  and information systems from unauthorized access,  use, disclosure, disruption, modification, perusal,  inspection, recording or destruction.
  • 3. Objectives  Information Security  The Threats  Scope of Security Management  Tools for Computer Security
  • 4. Information Security  Information security is more than just protecting hardware and software from being crashed…  It’s about protecting the information resources that keep the company operating  Goals are to ensure:  Data integrity, availability and confidentiality  Business continuity
  • 6. Common Attacks - Corporate  Virus/Worm: A computer program that appears to perform a legitimate task, but is a hidden malware  E.g., wipe out a hard drive; send out an unauthorized email, etc.  Sniffing: Interception and reading of electronic messages as they travel over the Internet  E.g., copy passwords, or credit card information  Denial of Service: Attacks from coordinated computers that floods a site with so many requests until the site crashes  Thousands of page requests/minute on an ecommerce site (virus as well)
  • 7. Common Attacks - Personal  Spoofing: Masquerade as a legitimate web site and redirect traffic to a fraudulent site  Con artists: calling to offer credit card account to obtain info about email, SSN, etc.  Phishing or Fishing: Fraudulent email attempt to obtain sensitive information  E.g., email notifying a bank account owner that s/he account had a security breach, and request the owner to log in a fraudulent website to “reset the password”
  • 8. Threats from inside….  Employee illegally accesses email accounts  Angry / misguided technical personnel:  Deletes sensitive data  Rewrites a program so that data is corrupted/company can’t operate  Leaves a ‘cyber bomb’ that detonates in the event he/she is fired  Employee steals sensitive data (customer) and sells it to a competitor
  • 10. Security’s Five Pillars  Authentication: Verifying the authenticity of users – ensuring people are who they say they are.  ID/Password, biometric, questions  Identification: Identifying users to grant them appropriate access  Allowing system to know who someone is to give appropriate access rights  Privacy: Protecting information from being seen  E.g., against spyware installed without consent in a computer to collect information
  • 11. Security’s Five Pillars(Contd..)  Integrity: Keeping information in its original form  Ensuring data is not altered in any way  Non-repudiation: Preventing parties from denying actions they have taken  Ensuring that the parties in a transaction are who they say they are and cannot deny that transaction took place
  • 12. Technical Countermeasures  Firewalls:  hardware/software to control access between networks / blocking unwanted access > Windows Vista  Encryption/decryption:  Using an algorithm (cipher) to make a plain text unreadable to anyone that does not have a key  SSL
  • 13. Technical Countermeasures  Virtual Private Networks (VPNs)  Allow strong protection for data communications  Cheaper than private networks, but do not provide 100% end-to-end security
  • 14. Encryption / SSL  An SSL Certificate enables encryption of sensitive information during online transactions.  Each SSL Certificate contains unique, authenticated information about the certificate owner.  Each SSL Certificate consists of a public key and a  A Certificate Authority private key. Public key: scramble; Private Key: verifies the identity of unscramble the certificate owner  Secure Sockets Layer handshake authenticates when it is issued. the server (Web site) and the client (Web browser).  Unique session key established and secure transmission can begin.
  • 15. Ethics Defined  Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors.  Information systems raise new ethical questions for both individuals and societies because they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights, and obligations.
  • 16. Ethical issues in information systems have been given new urgency by the rise of the Internet and electronic commerce.  Internet and digital firm technologies make it easier than ever to assemble, integrate, and distribute information, unleashing new concerns about the appropriate use of customer information, the protection of personal privacy, and the protection of intellectual property.  Insiders with special knowledge can “fool” information systems by submitting phony records, and diverting cash, on a scale unimaginable in the pre-computer era.
  • 17. The major ethical, social, and political issues raised by information systems include the following moral dimensions: Information rights and obligations. What information rights do individuals and organizations possess with respect to themselves? What can they protect? What obligations do individuals and organizations have concerning this information? Property rights and obligations. How will traditional intellectual property rights be protected in a digital society in which tracing and accounting for ownership are difficult and ignoring such property rights is so easy? Accountability and control. Who can and will be held accountable and liable for the harm done to individual and collective information and property rights? System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? Quality of life. What values should be preserved in an information- and knowledge-based society? Which institutions should we protect from violation? Which cultural values and practices are supported by the new information technology?
  • 18. Ethics in Information Technology The increased use of information technology has raised many ethical issues for today’s IT professional. Various ethical issues are: Plagiarism Piracy Hacking Computer crime Viruses • Intellectual property Work pressures imposed on computer professionals
  • 19. Social Impacts  This infrastructure might affect real-time transactions and make intermediaries such as sales clerks, stock brokers and travel agents, whose function is to provide an essential information link between buyers and sellers, redundant.  Computers and communication technologies allow individuals to communicate with one another in ways complementary to traditional face-to-face, telephonic, and written modes.
  • 20. Social Impacts  It would be easier for individuals to work on flexible schedules, to work part time, to share jobs, or to hold two or more jobs simultaneously.  Beyond the net employment gains or losses brought about by these factors, it is apparent that workers with different skill levels will be affected differently.
  • 21. Social Impacts  Advances in information technology will affect the craft of teaching by complementing rather than eliminating traditional classroom instruction.  Many issues also surround free speech and regulation of content on the Internet, and there continue to be calls for mechanisms to control objectionable content.
  • 22. ACHIEVING ETHICS IN INFORMATION TECHNOLOGY  Companies can get assistance in the form of ethics codes and ethics educational programs to provide the foundation for their culture  The ethics codes can be used as is or tailored to the firm  Educational programs can assist in developing a corporate credo and in putting ethics programs in place
  • 23. “The ongoing computing and communications revolution has numerous economic and social impacts on modern society and requires serious social science investigation in order to manage its risks and dangers. Such work would be valuable for both social policy and technology design”