Professional Documents
Culture Documents
BDT9e CH05 Student PPT Accessible
BDT9e CH05 Student PPT Accessible
BDT9e CH05 Student PPT Accessible
CHAPTER FIVE
ETHICS AND
INFORMATION SECURITY
Copyright 2022 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
CHAPTER FIVE: OVERVIEW
Ethics.
Information Security.
© McGraw Hill 2
LEARNING OUTCOMES
1. Explain the ethical issues in the use of the
information age.
2. Describe information security and the difference
between hackers and viruses.
© McGraw Hill 3
INFORMATION ETHICS 1
© McGraw Hill 4
INFORMATION ETHICS 2
© McGraw Hill 5
INFORMATION ETHICS 3
© McGraw Hill 6
INFORMATION ETHICS 4
© McGraw Hill 7
INFORMATION ETHICS 5
© McGraw Hill 8
INFORMATION DOES NOT HAVE
ETHICS, PEOPLE DO
Information does not care how it is used, it will not stop itself
from sending spam, viruses, or highly-sensitive information.
Tools to prevent information misuse.
• Information management.
• Information governance.
• Information compliance.
• Information Secrecy.
• Information Property.
© McGraw Hill 9
PROTECTING INTELLECTUAL
ASSETS 1
• Organizational information is
intellectual capital - it must be
protected.
• Information security – The
protection of information from
accidental or intentional
misuse by persons inside or
outside an organization.
• Downtime – Refers to a
period of time when a system
is unavailable.
© McGraw Hill 10
PROTECTING INTELLECTUAL
ASSETS 2
© McGraw Hill 11
PROTECTING INTELLECTUAL
ASSETS 3
© McGraw Hill 12
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 1
© McGraw Hill 13
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 2
• Worm.
• Malware.
• Adware.
• Spyware.
• Ransomware.
• Scareware.
© McGraw Hill 14
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 3
• Backdoor program.
• Denial-of-service attack (DoS).
• Distributed denial-of-service
attack (DDoS).
• Polymorphic virus.
• Trojan-horse virus.
© McGraw Hill 15
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 4
© McGraw Hill 16
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 5
© McGraw Hill 17
LEARNING OUTCOME REVIEW
• Now that you have finished the chapter please review the
learning outcomes in your text.
© McGraw Hill 18
End of Main Content
www.mheducation.com
Copyright 2022 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.