1 / 10

Security and Ethical Challenges of E-Business

11. Security and Ethical Challenges of E-Business. Security and Ethical Challenges. Privacy. Employment. Health. Crime. Security Ethics and Society. Working Conditions. Individuality. Hacking. Cyber Theft. Computer Viruses. Unauthorized Use at work. Piracy. Computer Crime.

happy
Download Presentation

Security and Ethical Challenges of E-Business

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 11 Security andEthical Challengesof E-Business

  2. Security and Ethical Challenges Privacy Employment Health Crime Security Ethics and Society Working Conditions Individuality

  3. Hacking Cyber Theft Computer Viruses Unauthorized Use at work Piracy Computer Crime

  4. Lost Job Opportunities Lost Individuality Working Conditions Computer Monitoring Health Issues Employment Challenges

  5. Ethical Principles Proportionality Informed Consent Justice Minimized Risk Standard of Conduct Act with integrity Protect the privacy and confidentiality of information Do not misrepresent or withhold information Do not misuse resources Do not exploit weakness of systems Set high standards Advance the health and welfare of general public Ethical Considerations

  6. Encryption Fire Walls Virus Defenses Denial of Service Defenses Monitor E-mail Security Management of E-Business

  7. Security Codes Backup Files Security Monitors Biometric Security Controls Other E-Business Security Measures

  8. Fault Tolerant Systems Fail-Over Fail-Safe Fail-Soft Layer Threat Fault Tolerant Methods Computer System Failure Controls

  9. Disaster Recovery • Who will participate? • What will be their duties? • What hardware and software will be used? • Priority of applications to be run? • What alternative facilities will be used? • Where will databases be stored?

  10. Processing Controls Fire walls Software Hardware Checkpoints Output Controls Input Controls Security Codes Encryption Control Totals User Feedback Security Codes Encryption Error Signals Security Codes Encryption Backup Files Storage Controls E-Business System Controls and Audits

More Related