SlideShare a Scribd company logo
Chapter - 13
Security & Ethical
Challenges
Introduction
• Use of IT in business can
– Present major security
challenges
– Poses serious ethical questions
– Affect society in significant ways
• IT has both beneficial &
detrimental effects on society
and people
– Manage work activities to
minimize the detrimental effects
of IT
– Optimize the beneficial effects
Ethical responsibility
of business professionals
• Business professionals have responsibility to
promote ethical uses of information technology
in the workplace
• Should you electronically access your
employees’ personnel records or workstation
files?
• Should you sell customer information extracted
from transaction processing systems to other
companies?
Categories of Ethical Business Issues
Corporate Social Responsibility Theories
• Stockholder Theory
– Managers are agents of the stockholders
– Their only ethical responsibility is to increase the profits of the
business without violating the law or engaging in fraudulent
practices
• Social Contract Theory
– Companies have ethical responsibilities to all members of
society, who allow corporations to exist
• Stakeholder Theory
– Managers have an ethical responsibility to manage a firm for the
benefit of all its stakeholders
– Stakeholders are all individuals and groups that have a stake in,
or claim on, a company
Principles of Technology Ethics
• Proportionality - The good achieved by the technology must
outweigh the harm or risk; there must be no alternative that
achieves the same or comparable benefits with less harm or risk
• Informed Consent - Those affected by the technology should
understand and accept the risks
• Justice
– Fair and equal distribution of benefits and burdens of the
technology
– Those who benefit should bear their fair share of the risks, and
those who do not benefit should not suffer a significant increase
in risk
• Minimized Risk - Even if judged acceptable by the other three
guidelines, the technology must be implemented so as to avoid all
unnecessary risk
Ethical Guidelines
• Most policies specify that company computer
workstations and networks are company resources
that must be used only for work-related uses
• A responsible professional
– Acts with integrity
– Increases personal competence
– Sets high standards of personal performance
– Accepts responsibility for his/her work
– Advances the health, privacy, and general
welfare of the public
Computer Crime
• Unauthorized use, access, modification, or
destruction of hardware, software, data, or
network resources
• The unauthorized release of information
• The unauthorized copying of software
• Denying an end user access to his/her own
hardware, software, data, or network resources
• Using or conspiring to use computer or network
resources illegally to obtain information or tangible
property
Cybercrime Protection Measures
Hacking
• Hacking is
– The obsessive use of computers
– The unauthorized access and use of networked
computer systems
• Electronic Breaking and Entering
– Hacking into a computer system and reading files,
but neither stealing nor damaging anything
• Cracker
– A malicious or criminal hacker who maintains
knowledge of the vulnerabilities found for
private advantage
Common Hacking Tactics
• Denial of Service
– Hammering a website’s equipment with too many requests for
information
– Clogging the system, slowing performance, or crashing the site
• Scans
– Widespread probes of the Internet to determine types of computers,
services, and connections
– Looking for weaknesses
• Sniffer
– Programs that search individual packets of data as they pass through
the Internet
– Capturing passwords or entire contents
• Spoofing
– Faking an e-mail address or Web page to trick users into passing along
critical information like passwords or credit card numbers
Common Hacking Tactics
• Trojan House
– A program that, unknown to the user, contains instructions that
exploit a known vulnerability in some software
• Back Doors
– A hidden point of entry to be used in case the original entry point is
detected or blocked
• Malicious Applets
– Tiny Java programs that misuse your computer’s resources, modify
files on the hard disk, send fake email, or steal passwords
• War Dialing
– Programs that automatically dial thousands of telephone numbers in
search of a way in through a modem connection
• Logic Bombs
– An instruction in a computer program that triggers a malicious act
Common Hacking Tactics
• Buffer Overflow
– Crashing or gaining control of a computer by sending too much data to
buffer memory
• Password Crackers
– Software that can guess passwords
• Social Engineering
– Gaining access to computer systems by talking unsuspecting company
employees out of valuable information, such as passwords
• Dumpster Diving
– Sifting through a company’s garbage to find information to help break
into their computers
Cyber Theft
• Many computer crimes involve the theft of
money
• The majority are “inside jobs” that involve
unauthorized network entry and alternation
of computer databases to cover the tracks of
the employees involved
• Many attacks occur through the Internet
• Most companies don’t reveal that they have
been targets or victims of cybercrime
Unauthorized Use at Work
• Unauthorized use of computer systems and
networks is time and resource theft
– Doing private consulting
– Doing personal finances
– Playing video games
– Unauthorized use of the Internet or company
networks
• Sniffers
– Used to monitor network traffic or capacity
– Find evidence of improper use
Internet Abuses in the Workplace
– General email abuses
– Unauthorized usage and access
– Copyright infringement/plagiarism
– Newsgroup postings
– Transmission of confidential data
– Pornography
– Hacking
– Non-work-related download/upload
– Leisure use of the Internet
– Use of external ISPs
– Moonlighting
Software Piracy
• Software Piracy
– Unauthorized copying of computer programs
– Software is an intellectual property
• Licensing
– Purchasing software is really a payment
for a license for fair use
– Site license allows a certain number of copies
A third of the software
industry’s revenues are
lost to piracy
Theft of Intellectual Property
• Intellectual Property
– Copyrighted material
– Includes such things as music, videos, images,
articles, books, and software
• Copyright Infringement is Illegal
– Peer-to-peer networking techniques have made it
easy to trade pirated intellectual property
• Publishers Offer Inexpensive Online Music
– Illegal downloading of music and video is
down and continues to drop
Viruses and Worms
• A virus is a program that cannot work without
being inserted into another program
– A worm can run unaided
• These programs copy annoying or destructive
routines into networked computers
• Commonly transmitted through
– The Internet and online services
– Email and file attachments
– Disks from contaminated computers
– Shareware
Adware and Spyware
• Adware
– Software that purports to serve a useful purpose,
and often does
– Allows advertisers to display pop-up and banner
ads without the consent of the computer users
• Spyware
– Adware that uses an Internet connection in the
background, without the user’s permission
or knowledge
– Captures information about the user and sends it
over the Internet
Spyware Problems
• Spyware can steal private information and also
– Add advertising links to Web pages
– Redirect affiliate payments
– Change a users home page and search settings
– Make a modem randomly call premium-rate phone
numbers
– Leave security holes that let Trojans in
– Degrade system performance
• Removal programs are often not completely
successful in eliminating spyware
Privacy Issues
• The power of information technology to store
and retrieve information can have a negative
effect on every individual’s right to privacy
– Personal information is collected with every
visit to a Web site
– Confidential information stored by credit
bureaus, credit card companies, and the
government has been stolen or misused
Opt-in Versus Opt-out
• Opt-In
– You explicitly consent to allow data to be compiled
about you
– This is the default in Europe
• Opt-Out
– Data can be compiled about you unless you
specifically request it not be
– This is the default in the U.S.
Privacy Issues
• Violation of Privacy
– Accessing individuals’ private email conversations and computer
records
– Collecting and sharing information about individuals gained from
their visits to Internet websites
• Computer Monitoring
– Always knowing where a person is
– Mobile and paging services are becoming more closely associated
with people than with places
• Computer Matching
– Using customer information gained from many sources to market
additional business services
• Unauthorized Access of Personal Files
– Collecting telephone numbers, email addresses, credit card
numbers, and other information to build customer profiles
Protecting Your Privacy on the
Internet
• There are multiple ways to protect your privacy
– Encrypt email
– Send newsgroup postings through anonymous
remailers
– Ask your ISP not to sell your name and information to
mailing list providers and
other marketers
– Don’t reveal personal data and interests on
online service and website user profiles
Privacy Laws
• Electronic Communications Privacy Act
and Computer Fraud and Abuse Act
– Prohibit intercepting data communications messages, stealing or
destroying data, or trespassing in federal-related computer systems
• U.S. Computer Matching and Privacy Act
– Regulates the matching of data held in federal agency files to verify
eligibility for federal programs
• Other laws impacting privacy and how
much a company spends on compliance
– Sarbanes-Oxley
– Health Insurance Portability and Accountability Act (HIPAA)
– Gramm-Leach-Bliley
– USA Patriot Act
– California Security Breach Law
– Securities and Exchange Commission rule 17a-4
Computer Libel and Censorship
• The opposite side of the privacy debate…
– Freedom of information, speech, and press
• Biggest battlegrounds - bulletin boards, email boxes, and online
files of Internet and public networks
• Weapons used in this battle – spamming, flame mail, libel laws, and
censorship
• Spamming - Indiscriminate sending of unsolicited email messages
to many Internet users
• Flaming
– Sending extremely critical, derogatory, and often vulgar email
messages or newsgroup posting to other users on the Internet
or online services
– Especially prevalent on special-interest newsgroups
Cyberlaw
• Laws intended to regulate activities over the Internet or via
electronic communication devices
– Encompasses a wide variety of legal and political issues
– Includes intellectual property, privacy, freedom of expression,
and jurisdiction
• The intersection of technology and the law is controversial
– Some feel the Internet should not be regulated
– Encryption and cryptography make traditional form of
regulation difficult
– The Internet treats censorship as damage and simply routes
around it
• Cyberlaw only began to emerge in 1996
– Debate continues regarding the applicability of legal principles
derived from issues that had nothing to do with cyberspace
Other Challenges
• Employment
– IT creates new jobs and increases productivity
– Cause significant reductions in some job opportunities
– Jobs created by IT require new job skills
• Internet Web masters, e-commerce directors, system analysts, user
consultants
• Computer Monitoring
– Using computers to monitor the productivity and
behavior of employees as they work
– Criticized as unethical because it monitors individuals, not
just work, and is done constantly
– Criticized as invasion of privacy because many employees
do not know they are being monitored
Other Challenges
• Working Conditions
– IT has eliminated monotonous or obnoxious tasks
– Shift allows people to concentrate on more challenging
and interesting assignments
– Sadly data entry jobs are quite repetitive and routine
– But some skilled craftsperson jobs have been replaced by
jobs requiring routine, repetitive tasks or standby roles
• Individuality
– Dehumanizes and depersonalizes activities because
computers eliminate human relationships
– Inflexible systems due to strict adherence to standards
– But it’s changing due to personalization in e-commerce
Health Issues
• Cumulative Trauma Disorders (CTDs)
– Disorders suffered by people who sit at a
PC or terminal and do fast-paced repetitive
keystroke jobs
– Strained muscles, back pain, nerve damage
• Carpal Tunnel Syndrome
– Painful, crippling ailment of the hand
and wrist
– Typically requires surgery to cure
Ergonomics
• Designing healthy
work environments
– Safe, comfortable,
and pleasant for
people to work in
– GUI, hardware, job
design ergonomics
– Increases employee
morale and
productivity
– Also called human
factors engineering
Ergonomics Factors
Societal Solutions
• Using information technologies to solve human
and social problems
– Medical diagnosis
– Computer-assisted instruction
– Governmental program planning
– Environmental quality control
– Law enforcement
– Job placement
• The detrimental effects of IT
– Often caused by individuals or organizations not
accepting ethical responsibility for their actions
Security Management of IT
• The Internet was developed for inter-
operability, not impenetrability
– Business managers and professionals alike
are responsible for the security, quality, and
performance of business information systems
– Hardware, software, networks, and data
resources must be protected by a variety
of security measures
Security Management
• The goal of security
management is the
accuracy, integrity,
and safety of all
information system
processes and
resources
Internetworked Security Defenses
• Encryption
– Data is transmitted in scrambled form
– It is unscrambled by computer systems for
authorized users only
– The most widely used method uses a pair of
public and private keys unique to each individual
Internetworked Security Defenses
• Firewalls
– A gatekeeper system that protects a company’s
intranets and other computer networks from
intrusion
– Provides a filter and safe transfer point for
access to/from the Internet and other networks
– Important for individuals who connect to the
Internet with DSL or cable modems
– Can deter hacking, but cannot prevent it
Internet and Intranet Firewalls
38
Chapter 13 Security and
Ethical Challenges
Denial of Service Attacks
• Denial of service attacks depend on three
layers of networked computer systems
– The victim’s website
– The victim’s Internet service provider
– Zombie or slave computers that have been
commandeered by the cybercriminals
Defending Against Denial of Service
• At Zombie Machines
– Set and enforce security policies
– Scan for vulnerabilities
• At the ISP
– Monitor and block traffic spikes
• At the Victim’s Website
– Create backup servers and network connections
Internetworked Security Defenses
• Email Monitoring
– Use of content monitoring software that scans
for troublesome words that might compromise
corporate security
• Virus Defenses
– Centralize the updating and distribution of
antivirus software
– Use a security suite that integrates virus
protection with firewalls, Web security,
and content blocking features
Other Security Measures
• Security Codes
– Multilevel password system
– Encrypted passwords
– Smart cards with microprocessors
• Backup Files
– Duplicate files of data or programs
• Security Monitors
– Monitor the use of computers and networks
– Protects them from unauthorized use, fraud, and destruction
• Biometrics
– Computer devices measure physical traits that make each individual
unique
• Voice recognition, fingerprints, retina scan
• Computer Failure Controls
– Prevents computer failures or minimizes its effects
– Preventive maintenance
– Arrange backups with a disaster recovery organization
Other Security Measures
• In the event of a system failure, fault-tolerant systems have redundant
processors, peripherals, and software that provide
– Fail-over capability: shifts to back up components
– Fail-save capability: the system continues to operate at the same level
– Fail-soft capability: the system continues to operate at a reduced but
acceptable level
• A disaster recovery plan contains formalized procedures to follow in the
event of a disaster
– Which employees will participate
– What their duties will be
– What hardware, software, and facilities will be used
– Priority of applications that will be processed
– Use of alternative facilities
– Offsite storage of databases
Information System Controls
• Methods and
devices that
attempt to
ensure the
accuracy,
validity, and
propriety of
information
system
activities
Auditing IT Security
• IT Security Audits
– Performed by internal or external auditors
– Review and evaluation of security measures
and management policies
– Goal is to ensure that that proper and adequate
measures and policies are in place
Protecting Yourself from Cybercrime

More Related Content

PDF
Privacy and Data Security
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
PPT
MIS-CH01: IS in Business Today
PDF
Chapter 3_dp-pertemuan 4&5
PPTX
Data Security - English
PPTX
Ethics in Information Technology
PDF
Data Protection and Privacy
PPT
Etical and professional issues of computer
Privacy and Data Security
Chapter 4 Computer Science :: Computer Ethics and Security
MIS-CH01: IS in Business Today
Chapter 3_dp-pertemuan 4&5
Data Security - English
Ethics in Information Technology
Data Protection and Privacy
Etical and professional issues of computer

What's hot (20)

PPTX
Privacy , Security and Ethics Presentation
PPTX
Information Privacy
PPTX
Computer misuse and criminal law
PDF
Chapter 8 securing information systems
PPT
Chapter2 the need to security
PPT
Ethical And Social Issues in MIS - Management Information System
PPTX
Cyber crime types & laws
PPTX
Cyber crime and cyber laws
PPTX
Digital Transformation & Internet of Everything
PPTX
Introduction to Information Security
PDF
e commerce security and fraud protection
PPT
Securing information systems
PPT
MIS-CH04: Ethical and Social Issues in INformation Systems
PPTX
Privacy and Freedom of Expression
PPTX
Chapter 4 Ethical and Social Issues in Information Systems
PPTX
Ethics and computing profession
PDF
Legal ethical issues E commerce
PPTX
Hacking ppt
PPT
Ethics in it
Privacy , Security and Ethics Presentation
Information Privacy
Computer misuse and criminal law
Chapter 8 securing information systems
Chapter2 the need to security
Ethical And Social Issues in MIS - Management Information System
Cyber crime types & laws
Cyber crime and cyber laws
Digital Transformation & Internet of Everything
Introduction to Information Security
e commerce security and fraud protection
Securing information systems
MIS-CH04: Ethical and Social Issues in INformation Systems
Privacy and Freedom of Expression
Chapter 4 Ethical and Social Issues in Information Systems
Ethics and computing profession
Legal ethical issues E commerce
Hacking ppt
Ethics in it
Ad

Similar to Chapter 13 security and ethical challenges (20)

PPT
9. Computer Ethics.ppt
PPTX
c13.security_and_ethics.pptx managemet info
PPT
Psi 10 security and ethical challenges
PPTX
9 - Security
PPTX
Module 8 security and ethical challenges
 
PPT
Understanding the need for security measures
PPT
css ppt.ppt
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPT
Chap11
PPT
Security and privacy
PPTX
Chap11
PPT
Security and privacy
PDF
Information Security Awareness Training
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PDF
Lecture 7---Security (1).pdf
PPTX
BCE L-3omputer security Basics.pptx
PPTX
Computer ethics cyber security and technology of it
PPTX
Lecture 5.1.pptx
PPTX
Chapter8
9. Computer Ethics.ppt
c13.security_and_ethics.pptx managemet info
Psi 10 security and ethical challenges
9 - Security
Module 8 security and ethical challenges
 
Understanding the need for security measures
css ppt.ppt
Lecture 6 Cybersecurity-Basics and .pptx
Chap11
Security and privacy
Chap11
Security and privacy
Information Security Awareness Training
Chapter 5 - Digital Security, Ethics, Privacy.pptx
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Lecture 7---Security (1).pdf
BCE L-3omputer security Basics.pptx
Computer ethics cyber security and technology of it
Lecture 5.1.pptx
Chapter8
Ad

More from Advance Saraswati Prakashan Pvt Ltd (20)

PPTX
004 04 identifying market segment,
PPTX
Chapter 3 Marketing info system and demand Management- MBS
PPTX
Chapter 2 Market Opportunity analysis- MBS
PPTX
Chapter 1 introduction- MBS Marketing Management
PPTX
003 Managerial Economics- chapter 03
PPTX
Managerial Economics MBS -chapter 04 (book)
PPTX
Sociology case study BBA-BI/TT/BHM/BCIS/BHCM
PPTX
Managing Cross-cultural Diversity: Issues and Challenges in Global Organizations
PPTX
Presentation on virtual maangement
PPTX
Managing a Virtual Workplace by Wayne F. Cascio
PPTX
Outsourcing- MBA/ MBS- Masters level
PPTX
Innovation management- MBA
PPTX
Employee empowerment-MBA
PPTX
Corporate Governance-MBA
PPTX
Chapter 7 e business systems
PPTX
Chapter 14 enterprise and global management of it
PPTX
Chapter 12 developiong business&it solutions
PPTX
Chapter 11 developiong business&it strategies
PPTX
Chapter 10 supporting decision making
PPTX
Chapter 9 e-commerce systems
004 04 identifying market segment,
Chapter 3 Marketing info system and demand Management- MBS
Chapter 2 Market Opportunity analysis- MBS
Chapter 1 introduction- MBS Marketing Management
003 Managerial Economics- chapter 03
Managerial Economics MBS -chapter 04 (book)
Sociology case study BBA-BI/TT/BHM/BCIS/BHCM
Managing Cross-cultural Diversity: Issues and Challenges in Global Organizations
Presentation on virtual maangement
Managing a Virtual Workplace by Wayne F. Cascio
Outsourcing- MBA/ MBS- Masters level
Innovation management- MBA
Employee empowerment-MBA
Corporate Governance-MBA
Chapter 7 e business systems
Chapter 14 enterprise and global management of it
Chapter 12 developiong business&it solutions
Chapter 11 developiong business&it strategies
Chapter 10 supporting decision making
Chapter 9 e-commerce systems

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PPTX
master seminar digital applications in india
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
master seminar digital applications in india
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Renaissance Architecture: A Journey from Faith to Humanism
STATICS OF THE RIGID BODIES Hibbelers.pdf
Sports Quiz easy sports quiz sports quiz
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Computing-Curriculum for Schools in Ghana
Abdominal Access Techniques with Prof. Dr. R K Mishra
TR - Agricultural Crops Production NC III.pdf
Pharma ospi slides which help in ospi learning
VCE English Exam - Section C Student Revision Booklet
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Chapter 13 security and ethical challenges

  • 1. Chapter - 13 Security & Ethical Challenges
  • 2. Introduction • Use of IT in business can – Present major security challenges – Poses serious ethical questions – Affect society in significant ways • IT has both beneficial & detrimental effects on society and people – Manage work activities to minimize the detrimental effects of IT – Optimize the beneficial effects
  • 3. Ethical responsibility of business professionals • Business professionals have responsibility to promote ethical uses of information technology in the workplace • Should you electronically access your employees’ personnel records or workstation files? • Should you sell customer information extracted from transaction processing systems to other companies?
  • 4. Categories of Ethical Business Issues
  • 5. Corporate Social Responsibility Theories • Stockholder Theory – Managers are agents of the stockholders – Their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices • Social Contract Theory – Companies have ethical responsibilities to all members of society, who allow corporations to exist • Stakeholder Theory – Managers have an ethical responsibility to manage a firm for the benefit of all its stakeholders – Stakeholders are all individuals and groups that have a stake in, or claim on, a company
  • 6. Principles of Technology Ethics • Proportionality - The good achieved by the technology must outweigh the harm or risk; there must be no alternative that achieves the same or comparable benefits with less harm or risk • Informed Consent - Those affected by the technology should understand and accept the risks • Justice – Fair and equal distribution of benefits and burdens of the technology – Those who benefit should bear their fair share of the risks, and those who do not benefit should not suffer a significant increase in risk • Minimized Risk - Even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk
  • 7. Ethical Guidelines • Most policies specify that company computer workstations and networks are company resources that must be used only for work-related uses • A responsible professional – Acts with integrity – Increases personal competence – Sets high standards of personal performance – Accepts responsibility for his/her work – Advances the health, privacy, and general welfare of the public
  • 8. Computer Crime • Unauthorized use, access, modification, or destruction of hardware, software, data, or network resources • The unauthorized release of information • The unauthorized copying of software • Denying an end user access to his/her own hardware, software, data, or network resources • Using or conspiring to use computer or network resources illegally to obtain information or tangible property
  • 10. Hacking • Hacking is – The obsessive use of computers – The unauthorized access and use of networked computer systems • Electronic Breaking and Entering – Hacking into a computer system and reading files, but neither stealing nor damaging anything • Cracker – A malicious or criminal hacker who maintains knowledge of the vulnerabilities found for private advantage
  • 11. Common Hacking Tactics • Denial of Service – Hammering a website’s equipment with too many requests for information – Clogging the system, slowing performance, or crashing the site • Scans – Widespread probes of the Internet to determine types of computers, services, and connections – Looking for weaknesses • Sniffer – Programs that search individual packets of data as they pass through the Internet – Capturing passwords or entire contents • Spoofing – Faking an e-mail address or Web page to trick users into passing along critical information like passwords or credit card numbers
  • 12. Common Hacking Tactics • Trojan House – A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software • Back Doors – A hidden point of entry to be used in case the original entry point is detected or blocked • Malicious Applets – Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake email, or steal passwords • War Dialing – Programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection • Logic Bombs – An instruction in a computer program that triggers a malicious act
  • 13. Common Hacking Tactics • Buffer Overflow – Crashing or gaining control of a computer by sending too much data to buffer memory • Password Crackers – Software that can guess passwords • Social Engineering – Gaining access to computer systems by talking unsuspecting company employees out of valuable information, such as passwords • Dumpster Diving – Sifting through a company’s garbage to find information to help break into their computers
  • 14. Cyber Theft • Many computer crimes involve the theft of money • The majority are “inside jobs” that involve unauthorized network entry and alternation of computer databases to cover the tracks of the employees involved • Many attacks occur through the Internet • Most companies don’t reveal that they have been targets or victims of cybercrime
  • 15. Unauthorized Use at Work • Unauthorized use of computer systems and networks is time and resource theft – Doing private consulting – Doing personal finances – Playing video games – Unauthorized use of the Internet or company networks • Sniffers – Used to monitor network traffic or capacity – Find evidence of improper use
  • 16. Internet Abuses in the Workplace – General email abuses – Unauthorized usage and access – Copyright infringement/plagiarism – Newsgroup postings – Transmission of confidential data – Pornography – Hacking – Non-work-related download/upload – Leisure use of the Internet – Use of external ISPs – Moonlighting
  • 17. Software Piracy • Software Piracy – Unauthorized copying of computer programs – Software is an intellectual property • Licensing – Purchasing software is really a payment for a license for fair use – Site license allows a certain number of copies A third of the software industry’s revenues are lost to piracy
  • 18. Theft of Intellectual Property • Intellectual Property – Copyrighted material – Includes such things as music, videos, images, articles, books, and software • Copyright Infringement is Illegal – Peer-to-peer networking techniques have made it easy to trade pirated intellectual property • Publishers Offer Inexpensive Online Music – Illegal downloading of music and video is down and continues to drop
  • 19. Viruses and Worms • A virus is a program that cannot work without being inserted into another program – A worm can run unaided • These programs copy annoying or destructive routines into networked computers • Commonly transmitted through – The Internet and online services – Email and file attachments – Disks from contaminated computers – Shareware
  • 20. Adware and Spyware • Adware – Software that purports to serve a useful purpose, and often does – Allows advertisers to display pop-up and banner ads without the consent of the computer users • Spyware – Adware that uses an Internet connection in the background, without the user’s permission or knowledge – Captures information about the user and sends it over the Internet
  • 21. Spyware Problems • Spyware can steal private information and also – Add advertising links to Web pages – Redirect affiliate payments – Change a users home page and search settings – Make a modem randomly call premium-rate phone numbers – Leave security holes that let Trojans in – Degrade system performance • Removal programs are often not completely successful in eliminating spyware
  • 22. Privacy Issues • The power of information technology to store and retrieve information can have a negative effect on every individual’s right to privacy – Personal information is collected with every visit to a Web site – Confidential information stored by credit bureaus, credit card companies, and the government has been stolen or misused
  • 23. Opt-in Versus Opt-out • Opt-In – You explicitly consent to allow data to be compiled about you – This is the default in Europe • Opt-Out – Data can be compiled about you unless you specifically request it not be – This is the default in the U.S.
  • 24. Privacy Issues • Violation of Privacy – Accessing individuals’ private email conversations and computer records – Collecting and sharing information about individuals gained from their visits to Internet websites • Computer Monitoring – Always knowing where a person is – Mobile and paging services are becoming more closely associated with people than with places • Computer Matching – Using customer information gained from many sources to market additional business services • Unauthorized Access of Personal Files – Collecting telephone numbers, email addresses, credit card numbers, and other information to build customer profiles
  • 25. Protecting Your Privacy on the Internet • There are multiple ways to protect your privacy – Encrypt email – Send newsgroup postings through anonymous remailers – Ask your ISP not to sell your name and information to mailing list providers and other marketers – Don’t reveal personal data and interests on online service and website user profiles
  • 26. Privacy Laws • Electronic Communications Privacy Act and Computer Fraud and Abuse Act – Prohibit intercepting data communications messages, stealing or destroying data, or trespassing in federal-related computer systems • U.S. Computer Matching and Privacy Act – Regulates the matching of data held in federal agency files to verify eligibility for federal programs • Other laws impacting privacy and how much a company spends on compliance – Sarbanes-Oxley – Health Insurance Portability and Accountability Act (HIPAA) – Gramm-Leach-Bliley – USA Patriot Act – California Security Breach Law – Securities and Exchange Commission rule 17a-4
  • 27. Computer Libel and Censorship • The opposite side of the privacy debate… – Freedom of information, speech, and press • Biggest battlegrounds - bulletin boards, email boxes, and online files of Internet and public networks • Weapons used in this battle – spamming, flame mail, libel laws, and censorship • Spamming - Indiscriminate sending of unsolicited email messages to many Internet users • Flaming – Sending extremely critical, derogatory, and often vulgar email messages or newsgroup posting to other users on the Internet or online services – Especially prevalent on special-interest newsgroups
  • 28. Cyberlaw • Laws intended to regulate activities over the Internet or via electronic communication devices – Encompasses a wide variety of legal and political issues – Includes intellectual property, privacy, freedom of expression, and jurisdiction • The intersection of technology and the law is controversial – Some feel the Internet should not be regulated – Encryption and cryptography make traditional form of regulation difficult – The Internet treats censorship as damage and simply routes around it • Cyberlaw only began to emerge in 1996 – Debate continues regarding the applicability of legal principles derived from issues that had nothing to do with cyberspace
  • 29. Other Challenges • Employment – IT creates new jobs and increases productivity – Cause significant reductions in some job opportunities – Jobs created by IT require new job skills • Internet Web masters, e-commerce directors, system analysts, user consultants • Computer Monitoring – Using computers to monitor the productivity and behavior of employees as they work – Criticized as unethical because it monitors individuals, not just work, and is done constantly – Criticized as invasion of privacy because many employees do not know they are being monitored
  • 30. Other Challenges • Working Conditions – IT has eliminated monotonous or obnoxious tasks – Shift allows people to concentrate on more challenging and interesting assignments – Sadly data entry jobs are quite repetitive and routine – But some skilled craftsperson jobs have been replaced by jobs requiring routine, repetitive tasks or standby roles • Individuality – Dehumanizes and depersonalizes activities because computers eliminate human relationships – Inflexible systems due to strict adherence to standards – But it’s changing due to personalization in e-commerce
  • 31. Health Issues • Cumulative Trauma Disorders (CTDs) – Disorders suffered by people who sit at a PC or terminal and do fast-paced repetitive keystroke jobs – Strained muscles, back pain, nerve damage • Carpal Tunnel Syndrome – Painful, crippling ailment of the hand and wrist – Typically requires surgery to cure
  • 32. Ergonomics • Designing healthy work environments – Safe, comfortable, and pleasant for people to work in – GUI, hardware, job design ergonomics – Increases employee morale and productivity – Also called human factors engineering Ergonomics Factors
  • 33. Societal Solutions • Using information technologies to solve human and social problems – Medical diagnosis – Computer-assisted instruction – Governmental program planning – Environmental quality control – Law enforcement – Job placement • The detrimental effects of IT – Often caused by individuals or organizations not accepting ethical responsibility for their actions
  • 34. Security Management of IT • The Internet was developed for inter- operability, not impenetrability – Business managers and professionals alike are responsible for the security, quality, and performance of business information systems – Hardware, software, networks, and data resources must be protected by a variety of security measures
  • 35. Security Management • The goal of security management is the accuracy, integrity, and safety of all information system processes and resources
  • 36. Internetworked Security Defenses • Encryption – Data is transmitted in scrambled form – It is unscrambled by computer systems for authorized users only – The most widely used method uses a pair of public and private keys unique to each individual
  • 37. Internetworked Security Defenses • Firewalls – A gatekeeper system that protects a company’s intranets and other computer networks from intrusion – Provides a filter and safe transfer point for access to/from the Internet and other networks – Important for individuals who connect to the Internet with DSL or cable modems – Can deter hacking, but cannot prevent it
  • 38. Internet and Intranet Firewalls 38 Chapter 13 Security and Ethical Challenges
  • 39. Denial of Service Attacks • Denial of service attacks depend on three layers of networked computer systems – The victim’s website – The victim’s Internet service provider – Zombie or slave computers that have been commandeered by the cybercriminals
  • 40. Defending Against Denial of Service • At Zombie Machines – Set and enforce security policies – Scan for vulnerabilities • At the ISP – Monitor and block traffic spikes • At the Victim’s Website – Create backup servers and network connections
  • 41. Internetworked Security Defenses • Email Monitoring – Use of content monitoring software that scans for troublesome words that might compromise corporate security • Virus Defenses – Centralize the updating and distribution of antivirus software – Use a security suite that integrates virus protection with firewalls, Web security, and content blocking features
  • 42. Other Security Measures • Security Codes – Multilevel password system – Encrypted passwords – Smart cards with microprocessors • Backup Files – Duplicate files of data or programs • Security Monitors – Monitor the use of computers and networks – Protects them from unauthorized use, fraud, and destruction • Biometrics – Computer devices measure physical traits that make each individual unique • Voice recognition, fingerprints, retina scan • Computer Failure Controls – Prevents computer failures or minimizes its effects – Preventive maintenance – Arrange backups with a disaster recovery organization
  • 43. Other Security Measures • In the event of a system failure, fault-tolerant systems have redundant processors, peripherals, and software that provide – Fail-over capability: shifts to back up components – Fail-save capability: the system continues to operate at the same level – Fail-soft capability: the system continues to operate at a reduced but acceptable level • A disaster recovery plan contains formalized procedures to follow in the event of a disaster – Which employees will participate – What their duties will be – What hardware, software, and facilities will be used – Priority of applications that will be processed – Use of alternative facilities – Offsite storage of databases
  • 44. Information System Controls • Methods and devices that attempt to ensure the accuracy, validity, and propriety of information system activities
  • 45. Auditing IT Security • IT Security Audits – Performed by internal or external auditors – Review and evaluation of security measures and management policies – Goal is to ensure that that proper and adequate measures and policies are in place