security and ethical challenges

20
Security and Ethical Challenges Management Information Systems 1 Management Information Systems

Upload: ram-dutt-shukla

Post on 13-Nov-2014

10.042 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Security And  Ethical  Challenges

Security and Ethical Challenges

Management Information Systems

1Management Information Systems

Page 2: Security And  Ethical  Challenges

Security challengesComputer crimes that exist in the present

society are:-• Hacking• Cyber Theft• Unauthorized use at work• Software Piracy• Piracy of intellectual property• Computer viruses and worms

Management Information Systems 2

Page 3: Security And  Ethical  Challenges

HackingHacking is the obsessive use of computers, or the

unauthorized access and use of networked computer systems. Hackers usually

• Steal or damage data• Get unauthorized access to computer files• Monitor e-mails or web server access• May use remote services that allow one computer to

execute programs on another• Plant data that will cause system to welcome

intruders

Management Information Systems 3

Page 4: Security And  Ethical  Challenges

Cyber Theft

Cyber theft involves theft of money by unauthorized network entry and fraudulent alteration of computer databases.

Management Information Systems 4

Page 5: Security And  Ethical  Challenges

Unauthorized use at Work

Unauthorized use of computer resources especially by employees

• Playing video games• Unauthorized use of internet• Non-work related upload/download• Transmission or confidential data• Moonlighting

Management Information Systems 5

Page 6: Security And  Ethical  Challenges

Software Piracy

Unauthorized copying of data is called software piracy or software theft

Software is protected by copyright law and user license agreement that allows only limited copies to be made

Management Information Systems 6

Page 7: Security And  Ethical  Challenges

Piracy of Intellectual Property

Materials other than software are also pirated by making multiple copies

• Piracy of music, video, images, articles, books etc.

• Dissemination of these material through internet websites

Management Information Systems 7

Page 8: Security And  Ethical  Challenges

Computer viruses and worms• A virus is a program code that cannot work without being

inserted into another program• A worm is a distinct program that can run unaidedThese programs copy annoying or destructive routines into the

networked computer systems of anyone who accesses computers affected with the virus or who uses copies of magnetic disks taken from infected computers

They enter a computer through e-mail or file attachments, or through illegal software. A virus usually copies itself into the OS, and then spreads to main memory and thus hard disk and any inserted external memory.

Management Information Systems 8

Page 9: Security And  Ethical  Challenges

Privacy Issues

• Privacy on the internet• Computer Matching• Privacy Laws• Computer libel and censorship (threats are

spamming and flaming)

Management Information Systems 9

Page 10: Security And  Ethical  Challenges

Other Challenges

• Employment challenges because a lot of tasks have been automated

• Computer monitoring causes intrusion in personal space for workers

• Challenges in working conditions are caused by tasks which are monotonous in nature. But it also automates most of the work and gives way to more challenging jobs

• Challenges to individuality as they eliminate the human relationships between people

Management Information Systems 10

Page 11: Security And  Ethical  Challenges

Health issues

• Cumulative trauma disorders• Carpal tunnel syndrome• Radiation caused by cathode ray tubes (CRTs)

is also a health concern

Management Information Systems 11

Page 12: Security And  Ethical  Challenges

Benefits

• Medical diagnosis• Crime control• Environmental monitoring• Urban planning• Computer based training• Distance learning

Management Information Systems 12

Page 13: Security And  Ethical  Challenges

Security management of IT• Encryption• Firewalls• Denial of service attacks• E-mail monitoring• Virus defense

• Security codes• Backup files• Security monitors• Biometric security• Computer failure

controls• Fault tolerant systems• Disaster recovery• System controls and

auditsManagement Information Systems 13

Page 14: Security And  Ethical  Challenges

Encryption

The concept of private key and public key can be extended to authentication protocols. There are three types of authentication protocols followed by organizations.

1.Password Authentication protocol2.Challenge Handshake authentication Protocol3.Extensible Authentication Protocol

Management Information Systems 14

Page 15: Security And  Ethical  Challenges

Firewall

Firewalls are used to restrict access to one network from another network. Different types of firewalls exist.

1.Packet Filtering2.Stateful firewalls3.Proxy Firewalls4.Kernel Proxy firewalls

Management Information Systems 15

Page 16: Security And  Ethical  Challenges

Ethical responsibility of business professionals

Business ethics are concerned with• Equity• Rights• Honesty• Exercise of corporate power

Management Information Systems 16

Page 17: Security And  Ethical  Challenges

Management Information Systems 17

Page 18: Security And  Ethical  Challenges

Theories of corporate social responsibility

• The stockholders theory holds that managers are agents of the stockholders and their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent activities.

• The social contract theory states that companies have ethical responsibilities to all members of society, which allow corporations to exist based on a social contract

• The stakeholders theory states that managers have ethical responsibility to manage a firm for the benefit of all of its stakeholders i.e. stockholders, employees, customers, suppliers and local community.

Management Information Systems 18

Page 19: Security And  Ethical  Challenges

Principles of technology ethics

• Proportionality of benefits to risk• Informed consent to risks• Justice in distribution of risk with benefits

derived to each subunit• Minimized risk by the selected option

Management Information Systems 19

Page 20: Security And  Ethical  Challenges

Ethical guideline

• Acting with integrity• Increasing your professional competence• Setting high standards of personal

performance• Accepting responsibility for your work• Advancing the health, privacy, and general

welfare of the public

Management Information Systems 20