Unit V
Unit V
Lecture by:
Unit-V
Security and Ethical Challenges: IS
controls - facility control and
procedural control - Risks to online
operations - Denial of service,
spoofing - Ethics for IS professional Societical challenges of Information
technology.
Security Issues
Ethical Issues
Advancements in technology present many new ethical
Ethical Responsibility
Computer Crime
Hacking
The obsessive use of computers, or the unauthorized
access and use of networked computer systems
Cyber Theft
Involves unauthorized network entry and the
fraudulent alteration of computer databases
Unauthorized use at work
Also called time and resource theft
May range from doing private consulting or personal
finances, to playing video games, to unauthorized use
of the Internet on company networks
Privacy Issues
Privacy issues are at the top of the list in regards
Misuse of information
Risk to physical privacy
Privacy laws
Attempt to enforce the privacy of
computer-based files and
communications
Electronic Communications Privacy Act
Employment Challenges
Other Challenges
Health Issues
- Job stress
- Muscle damage
- Eye strain
- Radiation exposure
- Accidents
Individuality
Computer-based systems criticized as impersonal systems that
dehumanize and depersonalize activities
Working Conditions
Security Measures
Encryption
Passwords, messages, files, and other data is
transmitted in scrambled form and unscrambled for
authorized users
Firewalls
Serves as a gatekeeper system that protects
a companys intranets and other computer
networks from intrusion
Provides a filter and safe transfer point
Screens all network traffic for proper
passwords or other security codes
Victims ISP
Sites of zombie or slave computers
E-mail Monitoring
Spot checks just arent good enough anymore. The tide is
turning toward systematic monitoring of corporate e-mail traffic
Security codes
Multilevel password system
Log onto the computer system, Gain access into the
system, Access individual files
Backup Files
Duplicate files of data or programs
File retention measures
Security Monitors
Programs that monitor the use of computer systems and networks and
protect them from unauthorized use, fraud, and destruction
Biometric Security
Measure physical traits that make each individual unique
Voice
Fingerprints
Hand geometry
Signature dynamics
Retina scanning
Face recognition and Genetic pattern analysis
Facility control:
The Facility Assignment and Control System (FACS) is an
integrated Network component system that most perhaps and
hackers know of from an old file named 'FACS FACTS. While
System
COSMOS - Computers System for Main Frame
Operations
WM
- Work Manager
Procedural control:
Procedural control is a method of providing air traffic
control services without the use of radar. It is used in regions
of the world, specifically sparsely-populated land areas and
oceans, where radar coverage is either prohibitively expensive
or is simply not feasible. It also may be used at very low-