+ All Categories
Home > Documents > Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT...

Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT...

Date post: 02-Jan-2016
Category:
Upload: everett-fleming
View: 231 times
Download: 5 times
Share this document with a friend
Popular Tags:
25
Security and Ethics Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society
Transcript
Page 1: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Security and EthicsSecurity and Ethics

Employment

Health

Individuality

Privacy

WorkingConditions

CrimeBusiness/IT

SecurityEthics and

Society

Page 2: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Security and EthicsSecurity and Ethics

• Business Ethics• Stockholder Theory• Social Contract Theory• Stakeholder Theory

Ethical ResponsibilityEthical Responsibility

Page 3: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Security and EthicsSecurity and Ethics

Ethical ResponsibilityEthical Responsibility

Page 4: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Security and EthicsSecurity and Ethics

Technology EthicsTechnology Ethics

Page 5: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Security and EthicsSecurity and EthicsEthical GuidelinesEthical Guidelines

Page 6: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Right to PrivacyRight to Privacy

Privacy on the InternetAcxiom, Inc. Challenges to Acxiom, Inc. Challenges to

Consumer PrivacyConsumer Privacy• Acxiom – 30 Years Amassing

Massive Database• Sells Data to Subscribers• Use by Telemarketers and Credit

Firms

Privacy IssuesPrivacy Issues

Page 7: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Right to PrivacyRight to Privacy

• Computer Profiling• Computer Matching• Privacy Laws• Computer Libel and Censorship• Spamming• Flaming

Privacy IssuesPrivacy Issues

Page 8: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Other ChallengesOther Challenges

• Employment Challenges

• Working Conditions

• Individuality Issues

• Health Issues

Privacy IssuesPrivacy Issues

Page 9: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

ErgonomicsErgonomics

Privacy IssuesPrivacy Issues

Page 10: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Antivirus 96%

Virtual Private Networks86%

Intrusion-Detection Systems85%

Content Filtering/Monitoring77%

Public-Key Infrastructure 45%

Smart Cards43%

Biometrics19%

Security Technology UsedSecurity Technology UsedSecurity ManagementSecurity Management

Page 11: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Computer CrimeComputer Crime

• Hacking• Cyber Theft• Unauthorized Use of Work• Piracy of Intellectual Property• Computer Viruses and Worms

Security ManagementSecurity Management

Page 12: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Examples of Common HackingExamples of Common HackingSecurity ManagementSecurity Management

Page 13: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Internet Abuses in the WorkplaceInternet Abuses in the Workplace

Security Management

Page 14: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Network Monitoring SoftwareNetwork Monitoring Software

Security ManagementSecurity Management

Page 15: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Copying Music CDs: Intellectual Copying Music CDs: Intellectual Property ControversyProperty Controversy

• RIAA Crack Down on Music Piracy• Web Sites Fighting Back• 140 Million Writable Drives In Use• Billions of Blank CDs Sold While

Music CD Sales Are Going Down• Pirates Reluctant to Go Away

Security ManagementSecurity Management

Page 16: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Facts About Recent Computer Facts About Recent Computer Viruses and WormsViruses and Worms

Security ManagementSecurity Management

Page 17: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Tools of Security ManagementTools of Security Management

Security Management of Information Technology

Page 18: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

EncryptionEncryption

Security Management of Security Management of Information TechnologyInformation Technology

Page 19: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

FirewallsFirewalls

Security Management of Security Management of Information TechnologyInformation Technology

Firewall

IntranetServer

Firewall

Router Router

IntranetServer

Host System

Internet

1

2

3

4

4 5

1 External FirewallBlocks Outsiders

2 Internal FirewallBlocks Restricted Materials

3 Use of Passwords and Browser Security

4 Performs Authentication and Encryption

5 Careful Network Interface Design

Page 20: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Defending Against Denial of Defending Against Denial of Service AttacksService Attacks

Security Management of Security Management of Information TechnologyInformation Technology

Page 21: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Other Security MeasuresOther Security Measures

Security Management of Security Management of Information TechnologyInformation Technology

• Security Codes• Multilevel Password System

– Smart Cards• Backup Files

– Child, Parent, Grandparent Files• System Security Monitors• Biometric Security

Page 22: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Evaluation of Biometric SecurityEvaluation of Biometric Security

Security Management of Security Management of Information TechnologyInformation Technology

Page 23: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Computer Failure ControlsComputer Failure Controls

Security Management of Security Management of Information TechnologyInformation Technology

• Fault Tolerant Systems–Fail-Over–Fail-Safe–Fail-Soft

• Disaster Recovery

Page 24: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Methods of Fault ToleranceMethods of Fault Tolerance

Security Management of Security Management of Information TechnologyInformation Technology

Page 25: Security and Ethics Employment Health Individuality Privacy Working Conditions Crime Business/IT Security Ethics and Society.

Systems Controls and Systems Controls and AuditsAudits

Security CodesEncryption

Data Entry ScreensError Signals

Control Totals

Security CodesEncryption

Control TotalsControl Listings

End User Feedback

Security CodesEncryption

Backup FilesLibrary Procedures

Database Administration

InputControls

OutputControls

StorageControls

ProcessingControls

Software ControlsHardware Controls

FirewallsCheckpoints


Recommended