Title: Security, Privacy, and Ethical Issues in Information Systems and the Internet
1Security, Privacy, and Ethical Issues in
Information Systems and the Internet
2Principles and Learning Objectives
- Policies and procedures must be established to
avoid computer waste and mistakes. - Describe some examples of waste and mistakes in
an IS environment, their causes, and possible
solutions. - Identify policies and procedures useful in
eliminating waste and mistakes.
3Principles and Learning Objectives
- Computer crime is a serious and rapidly growing
area of concern requiring management attention. - Explain the types and effects of computer crime.
- Identify specific measures to prevent computer
crime. - Discuss the principles and limits of an
individuals right to privacy.
4Principles and Learning Objectives
- Jobs, equipment, and working conditions must be
designed to avoid negative health effects. - List the important effects of computers on the
work environment. - Identify specific actions that must be taken to
ensure the health and safety of employees. - Outline criteria for the ethical use of
information systems.
5Social Issues in Information Systems
6Computer Waste Mistakes
7Computer Waste
- Discard technology
- Unused systems
- Personal use of corporate time and technology
8Preventing Computer Waste and Mistakes
- Establish Policies and Procedures
- Implement Policies and Procedures
- Monitor Policies and Procedures
- Review Policies and Procedures
9Preventing Computer-Related Waste and Mistakes
10Implementing Policies and Procedures
11Computer Crime
12 Number of Incidents Reported to CERT
13Computer Crime and Security Survey
14The Computer as a Tool to Commit Crime
- Social engineering
- Dumpster diving
- Identity theft
- Cyberterrorism
15Cyber terrorism
16Computers as Objects of Crime
- Illegal access and use
- Hackers vs. crackers
- Script bunnies
- Insiders
17Illegal Access and Use
18Data Alteration and Destruction
- Virus
- Application virus
- System virus
- Macro virus
- Worm
- Logic bomb
19Data Alteration and Destruction
20 Top Viruses July 2002
21 Top Viruses July 2002
22Computers as Objects of Crime
- Information and equipment theft
- Software and Internet piracy
- Computer-related scams
- International computer crime
23Preventing Computer-Related Crime
- Crime prevention by state and federal agencies
- Crime prevention by corporations
- Public Key Infrastructure (PKI)
- Biometrics
- Antivirus programs
24Preventing Computer-Related Crime
- Intrusion Detection Software
- Managed Security Service Providers (MSSPs)
- Internet Laws for Libel and Protection of Decency
25Preventing Crime on the Internet
- Develop effective Internet and security policies
- Use a stand-alone firewall with network
monitoring capabilities - Monitor managers and employees
- Use Internet security specialists to perform
audits
26 Common Methods Used to Commit Computer Crimes
27 How to Protect Your Corporate Data from Hackers
28Privacy
29Privacy Issues
- Privacy and the Federal Government
- Privacy at work
- E-mail privacy
- Privacy and the Internet
30Using Antivirus Programs
31Fairness and Information Use
32Federal Privacy Laws and Regulations
- The Privacy Act of 1979
- Gramm-Leach-Bliley Act
- USA Patriot Act
33Other Federal Privacy Laws
34Other Federal Privacy Laws
35The Work Environment
36Health Concerns
- Repetitive stress injury (RSI)
- Carpal tunnel syndrome (CTS)
- Ergonomics
37Avoiding Health and Environment Problems
- Maintain good posture and positioning.
- Dont ignore pain or discomfort.
- Use stretching and strengthening exercises.
- Find a good physician who is familiar with RSI
and how to treat it.
38 Medical Topics on the Internet
39Ethical Issues in Information Systems
- The AITP Code of Ethics
- Obligation to management
- Obligation to fellow AITP members
- Obligation to society
- The ACM Code of Professional Conduct
- Acquire and maintain professional competence
40 AITP Code of Ethics
41Summary
- Computer waste - the inappropriate use of
computer technology and resources in both the
public and private sectors - Software and Internet piracy - represent the most
common computer crime - Ethics - determine generally accepted and
discouraged activities within a company
42End