BDT9e CH05 Student PPT Accessible

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Because learning changes everything.

CHAPTER FIVE
ETHICS AND
INFORMATION SECURITY

Copyright 2022 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.
CHAPTER FIVE: OVERVIEW
Ethics.
Information Security.

© McGraw Hill 2
LEARNING OUTCOMES
1. Explain the ethical issues in the use of the
information age.
2. Describe information security and the difference
between hackers and viruses.

© McGraw Hill 3
INFORMATION ETHICS 1

• Ethics – The principles and standards that guide our


behavior toward other people.
• Information ethics – Govern the ethical and moral
issues arising from the development and use of
information technologies, as well as the creation,
collection, duplication, distribution, and processing of
information itself.

© McGraw Hill 4
INFORMATION ETHICS 2

Business issues related to information ethics.


• Copyright.
• Counterfeit software.
• Digital rights management.
• Intellectual property.
• Patent.
• Pirated software.

© McGraw Hill 5
INFORMATION ETHICS 3

Privacy is a major ethical issue


Privacy – The right to be left
alone when you want to be, to
have control over your own
personal possessions, and not to
be observed without your consent
Confidentiality – the assurance
that messages and information
are available only to those who
are authorized to view them

© McGraw Hill 6
INFORMATION ETHICS 4

Individuals form the only ethical


component of MIS.
• Individuals copy, use, and distribute
software.
• Search organizational databases for
sensitive and personal information.
• Individuals create and spread viruses.
• Individuals hack into computer
systems to steal information.
• Employees destroy and steal
information.

© McGraw Hill 7
INFORMATION ETHICS 5

• Acting ethically and legally are not always the same.

Access the text alternative for slide images.

© McGraw Hill 8
INFORMATION DOES NOT HAVE
ETHICS, PEOPLE DO
Information does not care how it is used, it will not stop itself
from sending spam, viruses, or highly-sensitive information.
Tools to prevent information misuse.
• Information management.
• Information governance.
• Information compliance.
• Information Secrecy.
• Information Property.

© McGraw Hill 9
PROTECTING INTELLECTUAL
ASSETS 1

• Organizational information is
intellectual capital - it must be
protected.
• Information security – The
protection of information from
accidental or intentional
misuse by persons inside or
outside an organization.
• Downtime – Refers to a
period of time when a system
is unavailable.

© McGraw Hill 10
PROTECTING INTELLECTUAL
ASSETS 2

Sources of Unplanned Downtime


Bomb threat Hacker Snowstorm
Burst pipe Hail Sprinkler malfunction
Chemical spill Hurricane Static electricity
Construction Ice storm Strike
Corrupted data Insects Terrorism
Earthquake Lightning Theft
Electrical short Network failure Tornado
Epidemic Plane crash Train derailment
Equipment failure Frozen pipe Smoke damage
Evacuation Power outage Vandalism
Explosion Power surge Vehicle crash
Fire Rodents Virus
Flood Sabotage Water damage (various)
Fraud Shredded data Wind

© McGraw Hill 11
PROTECTING INTELLECTUAL
ASSETS 3

How Much Will Downtime Cost Your Business?

Access the text alternative for slide images.

© McGraw Hill 12
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 1

Hacker – Experts in technology


who use their knowledge to break
into computers and computer
networks, either for profit or just
motivated by the challenge.
• Black-hat hacker.
• Cracker.
• Cyberterrorist.
• Hactivist.
• Script kiddies or script bunnies.
• White-hat hacker.

© McGraw Hill 13
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 2

Virus - Software written with malicious intent to cause


annoyaance or damage.

• Worm.
• Malware.
• Adware.
• Spyware.
• Ransomware.
• Scareware.

© McGraw Hill 14
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 3

Virus - Software written with malicious intent to cause


annoyance or damage.

• Backdoor program.
• Denial-of-service attack (DoS).
• Distributed denial-of-service
attack (DDoS).
• Polymorphic virus.
• Trojan-horse virus.

© McGraw Hill 15
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 4

How Computer Viruses Spread

Access the text alternative for slide images.

© McGraw Hill 16
SECURITY THREATS CAUSED BY
HACKERS AND VIRUSES 5

Security threats to ebusiness


include.
• Elevation of privilege.
• Hoaxes.
• Malicious code.
• Packet tampering.
• Sniffer.
• Spoofing.
• Splogs.
• Spyware.

© McGraw Hill 17
LEARNING OUTCOME REVIEW
• Now that you have finished the chapter please review the
learning outcomes in your text.

© McGraw Hill 18
End of Main Content

Because learning changes everything. ®

www.mheducation.com

Copyright 2022 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written consent of McGraw Hill LLC.

You might also like