Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Information

System
Security
Anchal Mishra
ETHICS IN INFORMATION SOCIETY

Ethics determine generally accepted and


encouraging activities within a company and the
larger society. Ethical computer users define
acceptable practices more strictly than just
reframing from committing crimes. They consider
the effects of their activities including Internet
usage, on other people and organizations. There
are many associations who have developed a
code of ethics that provide useful guidance.
The Association for Computing Machinery (ACM)
has developed a numbers of specific professional
responsibilities. These responsibilities include the
following:
• Access computing and communication resources
only when authorized to do so.
• Honour contracts, agreements and assigned
responsibilities.
• Give comprehensive and thorough evaluations of
computer systems and their impacts, including
analysis of possible risks.
• Accept and provide appropriate professional review.
• Strive to achieve the highest quality, effectiveness
and dignity in both the process and products of
professional work.
The above 5 code of conduct for his deeds if a person
accesses some data without proper authorization,
he held responsible. The person cannot say that
data should have been protected and get away with
it. The information system and their impact must be
audited like other systems. Information system is
like any other product and the users must be aware
of the risks involved. The unethical use of
information system can devastate an organization.
INFORMATION RIGHTS, PRIVACY AND
FREEDOM IN AN INFORMATION SOCIETY

Privacy is an important social issue involved in information


society. Privacy deals with the collection and use or misuse
of data. Data is constantly being collected and stored on
each of us. This data is often distributed, sold or used
without our knowledge. The health care provider and
retail shops have, for instance, forms of data on its clients
and customers. The fundamental question is “who owns
this data and information?” We know for sure that we
would not like to share our medical records with others,
definitely not with insurance company or our employers.
Cont….
The employer can use information technology to
monitor the employees. The time spent by an
employee on computer can be recorded along
with his activities. The employer can use this data
to estimate the number of breaks an employee
takes. The employer can easily monitor
electronic communication in the form email. At
the same time, an employee can reveal company
data to monitor employee’s emails. The deleted
emails can be retrieved and used a evidence if
required.
Cont….
Privacy of hardware and software consumers is another
important issue. If hardware companies give a unique
identification to each major component, the software
company can use this number to uniquely identify each
electronic documents created. This could be useful in
checking the piracy of users is compromised. LAN card is
the only hardware component that has unique
identification, which is used in communication.
The Indian Constitution of 1950 doesn’t expressly recognize
the right to privacy. However, the Supreme Court first
recognized in 1964 that there is a right of privacy implicit
in the constitution under Article 21, which states, “No
person shall be deprived established by law”.
PROTECTING COMPUTER EQUIPMENT AND
FILES
Crimes involving illegal system access and use of
computer services are also a concern. The
systems left unattended over weekends without
proper security have been used for commercial
use Computer magazines regularly report case
where employees have used the facilities for
their personal benefit sometimes at the cost of
their employers.
Cont….
Hackers make use of their computer knowledge to
gain access to others computers. Sometimes,
files passwords, programs, or processing power
are stolen. An intruder may alter the data or
destroy the data making it unusable and useless.
A hacker writes a small password snifter that is
hidde from the computer owner. A password
snifter can steal passwords and gain access to
data and files There are Ant sniff Programs that
can detect and block a password snifter.
Cont….
All types of computer systems and equipments
have also been stolen from offices. In one recent
incident, all hardware components from the
computer age were removed and carried away,
leaving the cage behind.

You might also like