Professional Documents
Culture Documents
Chapter - 13: Mcgraw-Hill/Irwin
Chapter - 13: Mcgraw-Hill/Irwin
Chapter - 13
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
2
Learning Objectives
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
3
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
4
Section I
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
5
Ethical Responsibility
The use of IT presents major security challenges,
poses serious ethical questions, and affects society in
significant ways.
IT raises ethical issues in the areas of..
Crime
Privacy
Individuality
Employment
Health
Working conditions
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
6
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
7
Business Ethics
Basic categories of ethical issues
Employee privacy
Security of company records
Workplace safety
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
8
Stockholder theory
Managers are agents of the stockholders.
Their only ethical responsibility is to increase
profit without violating the law or engaging
in fraud
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
9
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
10
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
11
Employees
Customers
Suppliers
Local community
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
12
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
13
Technology Ethics
Four Principles :
1. Proportionality
Good must outweigh any harm or risk
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
14
2. Informed consent
Those affected should understand and accept
the risks
3. Justice
Benefits and burdens should be distributed
fairly
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
15
4. Minimized Risk
Even if judged acceptable by the other three
guidelines, the technology must be
implemented so as to avoid all unnecessary risk
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
16
Ethical Guidelines
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
17
Computer Crime
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
19
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
20
Hacking
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
21
Cyber Theft
Involves unauthorized network entry and the
fraudulent alteration of computer databases
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
22
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
23
Software Piracy
Unauthorized copying of software
Software is intellectual property protected by
copyright law and user licensing agreement
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
24
Videos
Images
Articles
Books
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
25
Worm
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
26
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
27
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
28
Privacy Issues
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
30
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
31
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
32
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
33
remailers
Ask your ISP not to sell your information to
mailing list providers and other marketers
Decline to reveal personal data and interests
online
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
34
Computer Matching
Computer profiling and matching personal data to that
profile.
Individuals have been mistakenly arrested and jailed
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
35
Privacy laws
Attempt to enforce the privacy of computer-based
files and communications
‘Electronic
Communications Privacy Act’
‘Computer Fraud and Abuse Act’
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
36
press)
Spamming
Flaming
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
37
Other Challenges
Employment
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
38
Computer Monitoring
Concerns workplace privacy
Monitors individuals, not just work
Is done continually. May be seen as violating
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
39
Working Conditions
IT has eliminated many monotonous, obnoxious
tasks, but has created others
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
40
Individuality
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
41
Health Issues
Jobstress
Muscle damage
Eye strain
Radiation exposure
Accidents
Some solutions
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
42
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
43
Societal Solutions
Beneficial effects on society
Solve human and social problems
Medical diagnosis
Computer-assisted instruction
Law enforcement
Crime control
Job placement
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
44
Section II
Security Management
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
45
Goal
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
46
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
47
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
48
1. Encryption
Passwords, messages, files, and other data is
transmitted in scrambled form and unscrambled
for authorized users
Involves using special mathematical algorithms to
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
49
2. Firewalls
Serves as a “gatekeeper” system that protects a
company’s intranets and other computer networks
from intrusion
Provides a filter and safe transfer point
Screens all network traffic for proper passwords
or other security codes
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
50
Victim’s ISP
4. E-mail Monitoring
“Spot checks just aren’t good enough anymore.
The tide is turning toward systematic monitoring
of corporate e-mail traffic using content-monitoring
software that scans for troublesome words that
might compromise corporate security.”
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
52
5. Virus Defenses
Protection may accomplished through
Centralized distribution and updating of
antivirus software
Outsourcing the virus protection responsibility
to ISPs or to telecommunications or security
management companies
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
53
Security codes
Multilevel password system
Log onto the computer system
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
54
Backup Files
Duplicate files of data or programs
File retention measures
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
55
Security Monitors
Programs that monitor the use of computer
systems and networks and protect them from
unauthorized use, fraud, and destruction
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
56
Biometric Security
Measure physical traits that make each individual unique
Voice
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
57
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
58
Disaster Recovery
Disaster recovery plan
Which employees will participate and their
duties
What hardware, software, and facilities will be
used
Priority of applications that will be processed
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
60
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
61
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
62
Discussion Questions
What can be done to improve e-commerce
security on the Internet?
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
63
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
64
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.
65
McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved.