Chapter 9 information systems ethics computer crime and security
1 / 26

Chapter 9 Information Systems Ethics, Computer Crime, and Security - PowerPoint PPT Presentation

  • Uploaded on

Chapter 9 Information Systems Ethics, Computer Crime, and Security. Chapter 9 Objectives. Understand how computer ethics affects IS Understand information privacy, accuracy, property, and accessibility Understand types of computer crime

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Chapter 9 Information Systems Ethics, Computer Crime, and Security' - hei

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Chapter 9 information systems ethics computer crime and security

Chapter 9Information Systems Ethics, Computer Crime, and Security

Chapter 9 objectives
Chapter 9 Objectives

  • Understand how computer ethics affects IS

  • Understand information privacy, accuracy, property, and accessibility

  • Understand types of computer crime

  • Understand the terms virus, worm, Trojan horse, and logic or time bomb

  • Understand computer security

Information systems ethics
Information Systems Ethics

  • Toffler’s three waves of change

    • Agriculture

    • Industrial Revolution

    • Information Age

Information systems ethics1
Information Systems Ethics

  • Computer Literacy

    • Knowing how to use a computer

  • Digital Divide

    • That gap between those with computer access and those who don’t have it

  • Computer Ethics

    • Standards of conduct as they pertain to the use of information systems

Information systems ethics2
Information Systems Ethics

  • Privacy

    • Protecting one’s personal information

  • Identity theft

    • Stealing of another’s social security number, credit card number, or other personal information

Information systems ethics3
Information Systems Ethics

  • Information accuracy

    • Deals with authentication and fidelity of information

  • Information property

    • Deals with who owns information about individuals and how information can be sold and exchanged

Information systems ethics4
Information Systems Ethics

  • Information accessibility

    • Deals with what information a person has the right to obtain about others and how the information can be used

  • Issues in information accessibility

    • Carnivore: software application designed to be connected to Internet Service Providers’ computers and eavesdrops on all communications.

    • Electronic Communications Privacy Act (ECPA): it offered stronger support for voice mail than it did for e-mail. No other laws at federal or state levels protect e-mail privacy

    • Monitoring e-mail

Information systems ethics5
Information Systems Ethics

  • The need for a code of ethical conduct

    • Business ethics

    • Plagiarism

    • Cybersquatting: registering a domain name and then trying to sell the name for big bucks to a person, company. Domain names are a scarce resource – one of the few scarce resources in cyberspace

Computer crime
Computer Crime

  • Definition: the act of using a computer to commit an illegal act

    • Authorized and unauthorized computer access

    • Examples

      • Stealing time on company computers

      • Breaking into government Web sites

      • Stealing credit card information

Computer crime1
Computer Crime

  • Federal and State Laws

    • Stealing or compromising data

    • Gaining unauthorized computer access

    • Violating data belonging to banks

    • Intercepting communications

    • Threatening to damage computer systems

    • Disseminating viruses

Computer crime2
Computer Crime

  • Hacking and Cracking

    • Hacker – one who gains unauthorized computer access, but without doing damage

    • Cracker – one who breaks into computer systems for the purpose of doing damage

Computer crime3
Computer Crime

  • Who commits computer crime?

Computer crime4
Computer Crime

  • Types of computer crime

    • Data diddling: modifying data

    • Salami slicing: skimming small amounts of money

    • Phreaking: making free long distance calls

    • Cloning: cellular phone fraud using scanners

    • Carding: stealing credit card numbers online

    • Piggybacking: stealing credit card numbers by spying

    • Social engineering: tricking employees to gain access

    • Dumpster diving: finding private info in garbage cans

    • Spoofing: stealing passwords through a false login page

Computer crime5
Computer Crime

  • Software piracy

    • North America – 25%

    • Western Europe – 34%

    • Asia / Pacific – 51%

    • Mid East / Africa – 55%

    • Latin America – 58%

    • Eastern Europe – 63%

Computer crime6
Computer Crime

  • Computer viruses and destructive code

    • Virus – a destructive program that disrupts the normal functioning of computer systems

    • Types:

      • Worm: usually does not destroy files; copies itself

      • Trojan horses: Activates without being detected; does not copy itself

      • Logic or time bombs: A type of Trojan horse that stays dormant for a period of time before activating

Computer security
Computer Security

  • Computer Security – precautions taken to keep computers and the information they contain safe from unauthorized access

Computer security1
Computer Security

  • Recommended Safeguards

    • Implement a security plan to prevent break-ins

    • Have a plan if break-ins do occur

    • Make backups!

    • Only allow access to key employees

    • Change passwords frequently

    • Keep stored information secure

    • Use antivirus software

    • Use biometrics for access to computing resources

    • Hire trustworthy employees

Computer security2
Computer Security

  • Encryption – the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer

Computer security3
Computer Security

  • How encryption works

    • Symmetric secret key system

      • Both sender and recipient use the same key

      • Key management can be a problem

    • Public key technology

      • A private key and a public key

    • Certificate authority

      • To implement public-key encryption on a busy Web site, requires a more sophisticated solution. A third party, called certificate authority, is used.

      • A trusted middleman verifies that a Web site is a trusted site (provides public keys to trusted partners)

      • Secure socket layers (SSL), developed by Netscape, is a popular public-key encryption method

Computer security4
Computer Security

  • Other encryption approaches

    • Pretty good privacy (PGP)

      • Phil Zimmerman

    • Clipper Chip: a chip that could generate uncrackable codes.

      There was a flaw.

Computer security5
Computer Security

  • Internet Security

    • Firewall – hardware and software designed to keep unauthorized users out of network systems

Computer security7
Computer Security

  • Virus prevention

    • Install antivirus software

    • Make backups

    • Avoid unknown sources of shareware

    • Delete e-mails from unknown sources

    • If your computer gets a virus…

Computer security8
Computer Security

  • How to maintain your privacy online

    • Choose Web sites monitored by privacy advocates

    • Avoid “cookies”

    • Visit sites anonymously

    • Use caution when requesting confirming e-mail

Computer security9
Computer Security

  • Avoid getting conned in cyberspace

    • Internet auctions

    • Internet access

    • International modem dialing

    • Web cramming

    • Multilevel marketing (pyramid schemes)

    • Travel/vacations

    • Business opportunities

    • Investments

    • Health-care products