security and ethical challenges.ppt
TRANSCRIPT
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
1/61
Chapter 13 Security and
Ethical Challenges
James A. O'Brien, and George Marakas.ManagementInformation Systems with MISource2!, "thed. Boston, MA# McGraw$%i&&, Inc.,2!. ISB# () *!"!))2)*(
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
2/61
+earning O-ecties Identify seera& ethica& issues in how the use of
information techno&ogies in usiness affects#em/&oyment, indiidua&ity, working conditions,0riacy, crime, hea&th, and so&utions to societa&
/ro&ems Identify seera& ty/es of security management
strategies and defenses, and e1/&ain how they cane used to ensure the security of usiness
a//&ications of information techno&ogy 0ro/ose seera& ways that usiness managers and
/rofessiona&s can he&/ to &essen the harmfu& effectsand increase the eneficia& effects of the use of I
23ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
3/61
3ase ( 3yerscams and
3yercrimina&s 3yerscams are today5s fastest$growing
crimina& niche
"! /ercent of com/anies sureyed re/orteda security incidenthe 6.S. 7edera& rade 3ommission says
identity theft is its to/ com/&aint
eBay has 8 /eo/&e comating fraud9Microsoft has 8:
Sto&en credit card account numers areregu&ar&y so&d on&ine
)3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
4/61
3ase Study ;uestions ? 41/&ain why the reasons you gie contriute to the growth
of cyerscams
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
5/61
I Security, 4thics, and Society
:3ha/ter () Security and 4thica& 3ha&&enges
I has oth eneficia&and detrimenta&effects on society and/eo/&eManage work
actiities tominimie thedetrimenta& effects
of IO/timie the
eneficia& effects
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
6/61
Business 4thics
4thics uestions that managers confront as /artof their dai&y usiness decision making inc&ude#4uity
Cights%onesty41ercise of cor/orate /ower
83ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
7/61
3ategories of 4thica& Business
Issues
!3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
8/61
3or/orate Socia& Ces/onsii&ity
heories Stockho&der heory Managers are agents of the stockho&ders heir on&y ethica& res/onsii&ity is to increase the /rofits of
the usiness without io&ating the &aw or engaging in
fraudu&ent /ractices Socia& 3ontract heory
3om/anies hae ethica& res/onsii&ities to a&& memers ofsociety, who a&&ow cor/orations to e1ist
Stakeho&der heory
Managers hae an ethica& res/onsii&ity to manage a firmfor the enefit of a&& its stakeho&ders
Stakeho&ders are a&& indiidua&s and grou/s that hae astake in, or c&aim on, a com/any
"3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
9/61
0rinci/&es of echno&ogy 4thics 0ro/ortiona&ity $ he good achieed y the techno&ogy must
outweigh the harm or risk9 there must e no a&ternatie thatachiees the same or com/ara&e enefits with &ess harm orrisk
Informed 3onsent $ hose affected y the techno&ogy shou&d
understand and acce/t the risks Justice he enefits and urdens of the techno&ogy shou&d e
distriuted fair&y hose who enefit shou&d ear their fair share of the risks,
and those who do not enefit shou&d not suffer a significantincrease in risk
Minimied Cisk $ 4en if -udged acce/ta&e y the other threeguide&ines, the techno&ogy must e im/&emented so as toaoid a&& unnecessary risk
*3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
10/61
AI0 Standards of 0rofessiona&
3onduct
(3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
11/61
Ces/onsi&e 0rofessiona&
Guide&ines A res/onsi&e /rofessiona&Acts with integrity
Increases /ersona& com/etenceSets high standards of /ersona& /erformanceAcce/ts res/onsii&ity for hisDher workAdances the hea&th, /riacy, and genera&
we&fare of the /u&ic
((3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
12/61
3om/uter 3rime
3om/uter crime inc&udes6nauthoried use, access, modification, or
destruction of hardware, software, data, ornetwork resources
he unauthoried re&ease of informationhe unauthoried co/ying of softwareEenying an end user access to hisDher own
hardware, software, data, or network resources6sing or cons/iring to use com/uter or
network resources i&&ega&&y to otaininformation or tangi&e /ro/erty
(23ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
13/61
3yercrime 0rotection Measures
()3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
14/61
%acking %acking ishe osessie use of com/utershe unauthoried access and use of networked
com/uter systems 4&ectronic Breaking and 4ntering%acking into a com/uter system and reading
fi&es, ut neither stea&ing nor damaging anything
3rackerA ma&icious or crimina& hacker who maintainsknow&edge of the u&nerai&ities found for/riate adantage
(@3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
15/61
3ommon %acking actics
Eenia& of Serice %ammering a wesite5s eui/ment with too many reuests forinformation
3&ogging the system, s&owing /erformance, or crashing the site Scans
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
16/61
3ommon %acking actics
ro-an %ouse A /rogram that, unknown to the user, contains instructions thate1/&oit a known u&nerai&ity in some software
Back Eoors A hidden /oint of entry to e used in case the origina& entry
/oint is detected or &ocked Ma&icious A//&ets
iny Jaa /rograms that misuse your com/uter5s resources,modify fi&es on the hard disk, send fake emai&, or stea&/asswords
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
17/61
3ommon %acking actics
Buffer Oerf&ow 3rashing or gaining contro& of a com/uter y sending too muchdata to uffer memory
0assword 3rackers Software that can guess /asswords
Socia& 4ngineering Gaining access to com/uter systems y ta&king unsus/ecting
com/any em/&oyees out of a&ua&e information, such as/asswords
Eum/ster Eiing Sifting through a com/any5s garage to find information to he&/
reak into their com/uters
(!3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
18/61
3yer heft
Many com/uter crimes ino&e the theft ofmoney
he ma-ority are =inside -os> that ino&e
unauthoried network entry and a&ternation ofcom/uter dataases to coer the tracks of theem/&oyees ino&ed
Many attacks occur through the Internet
Most com/anies don5t reea& that they haeeen targets or ictims of cyercrime
("3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
19/61
6nauthoried 6se at
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
20/61
Internet Auses in the
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
21/61
Software 0iracy
Software 0iracy6nauthoried co/ying of com/uter /rograms
+icensing0urchasing software is rea&&y a /ayment
for a &icense for fair useSite &icense a&&ows a certain numer of co/ies
2(
A third of the softwareindustry5s reenues are
&ost to /iracy
3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
22/61
heft of Inte&&ectua& 0ro/erty
Inte&&ectua& 0ro/erty3o/yrighted materia& Inc&udes such things as music, ideos,
images, artic&es, ooks, and software 3o/yright Infringement is I&&ega&0eer$to$/eer networking techniues hae
made it easy to trade /irated inte&&ectua&/ro/erty
0u&ishers Offer Ine1/ensie On&ine Music I&&ega& down&oading of music and ideo is
down and continues to dro/
223ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
23/61
Firuses and
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
24/61
o/ 7ie Firus 7ami&ies of a&& ime
My Eoom, 2@ S/read ia emai& and oer aaa fi&e$sharing network Insta&&s a ack door on infected com/uters Infected emai& /oses as returned message or one that can5t e
o/ened correct&y, urging reci/ient to c&ick on attachment O/ens u/ 30 /orts that stay o/en een after termination of the
worm 6/on e1ecution, a co/y of ote/ad is o/ened, fi&&ed with
nonsense characters etsky, 2@
Mass$mai&ing worm that s/reads y emai&ing itse&f to a&& emai&
addresses found on infected com/uters ries to s/read ia /eer$to$/eer fi&e sharing y co/ying itse&f into
the shared fo&der It renames itse&f to /ose as one of 28 other common fi&es a&ong
the way
2@3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
25/61
o/ 7ie Firus 7ami&ies of a&& ime SoBig, 2@
Mass$mai&ing emai& worm that arries asan attachment 41am/&es# [email protected]/g./if, Eocument)./if
Scans a&& .
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
26/61
o/ 7ie Firus 7ami&ies of a&& ime Sasser, 2@
41/&oits a Microsoft u&nerai&ity to s/read from com/uter tocom/uter with no user interention
S/awns mu&ti/&e threads that scan &oca& sunets foru&nerai&ities
283ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
27/61
he 3ost of Firuses, ro-ans,
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
28/61
Adware and S/yware
AdwareSoftware that /ur/orts to sere a usefu& /ur/ose,and often does
A&&ows adertisers to dis/&ay /o/$u/ and anner
ads without the consent of the com/uter users S/ywareAdware that uses an Internet connection in the
ackground, without the user5s /ermission
or know&edge3a/tures information aout the user and sends itoer the Internet
2"3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
29/61
S/yware 0ro&ems
S/yware can stea& /riate information and a&soAdd adertising &inks to
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
30/61
0riacy Issues he /ower of information techno&ogy to store
and retriee information can hae a negatieeffect on eery indiidua&5s right to /riacy
0ersona& information is co&&ected with eeryisit to a
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
31/61
O/t$in Fersus O/t$out
O/t$InKou e1/&icit&y consent to a&&ow data to e
com/i&ed aout youhis is the defau&t in 4uro/e
O/t$OutEata can e com/i&ed aout you un&ess you
s/ecifica&&y reuest it not ehis is the defau&t in the 6.S.
)(3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
32/61
0riacy Issues Fio&ation of 0riacy
Accessing indiidua&s5 /riate emai& conersations andcom/uter records
3o&&ecting and sharing information aout indiidua&s gainedfrom their isits to Internet wesites
3om/uter MonitoringA&ways knowing where a /erson is Moi&e and /aging serices are ecoming more c&ose&y
associated with /eo/&e than with /&aces 3om/uter Matching
6sing customer information gained from many sources tomarket additiona& usiness serices
6nauthoried Access of 0ersona& 7i&es 3o&&ecting te&e/hone numers, emai& addresses, credit card
numers, and other information to ui&d customer /rofi&es
)23ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
33/61
0rotecting Kour 0riacy on the
Internet here are mu&ti/&e ways to /rotect your /riacy4ncry/t emai&Send newsgrou/ /ostings through
anonymous remai&ersAsk your IS0 not to se&& your name and
information to mai&ing &ist /roiders and
other marketersEon5t reea& /ersona& data and interests onon&ine serice and wesite user /rofi&es
))3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
34/61
0riacy +aws 4&ectronic 3ommunications 0riacy Act
and 3om/uter 7raud and Ause Act 0rohiit interce/ting data communications messages, stea&ing or
destroying data, or tres/assing in federa&$re&ated com/utersystems
6.S. 3om/uter Matching and 0riacy Act Cegu&ates the matching of data he&d in federa& agency fi&es to
erify e&igii&ity for federa& /rograms Other &aws im/acting /riacy and how
much a com/any s/ends on com/&iance Saranes$O1&ey
%ea&th Insurance 0ortai&ity and Accountai&ity Act L%I0AA Gramm$+each$B&i&ey 6SA 0atriot Act 3a&ifornia Security Breach +aw Securities and 41change 3ommission ru&e (!a$@
)@3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
35/61
3om/uter +ie& and 3ensorshi/ he o//osite side of the /riacy deateN
7reedom of information, s/eech, and /ress Biggest att&egrounds $ u&&etin oards, emai& o1es, and
on&ine fi&es of Internet and /u&ic networks
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
36/61
3yer&aw +aws intended to regu&ate actiities oer the Internet or ia
e&ectronic communication deices 4ncom/asses a wide ariety of &ega& and /o&itica& issues Inc&udes inte&&ectua& /ro/erty, /riacy, freedom of
e1/ression, and -urisdiction he intersection of techno&ogy and the &aw is controersia&
Some fee& the Internet shou&d not e regu&ated 4ncry/tion and cry/togra/hy make traditiona& form of
regu&ation difficu&t he Internet treats censorshi/ as damage and sim/&y
routes around it 3yer&aw on&y egan to emerge in (**8 Eeate continues regarding the a//&icai&ity of &ega&
/rinci/&es deried from issues that had nothing to do withcyers/ace
)83ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
37/61
Other 3ha&&enges 4m/&oyment
I creates new -os and increases /roductiity It can a&so cause significant reductions in -o o//ortunities, as we&& as
reuiring new -o ski&&s 3om/uter Monitoring
6sing com/uters to monitor the /roductiity and ehaior of em/&oyees asthey work
3riticied as unethica& ecause it monitors indiidua&s, not -ust work, and isdone constant&y
3riticied as inasion of /riacy ecause many em/&oyees do not knowthey are eing monitored
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
38/61
%ea&th Issues
3umu&atie rauma Eisorders L3EsEisorders suffered y /eo/&e who sit at a
03 or termina& and do fast$/aced re/etitiekeystroke -os
3ar/a& unne& Syndrome0ainfu&, cri//&ing ai&ment of the hand
and wristy/ica&&y reuires surgery to cure
)"3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
39/61
4rgonomics
Eesigning hea&thywork enironments Safe, comforta&e,
and /&easant for
/eo/&e to work in Increasesem/&oyee mora&eand /roductiity
A&so ca&&ed humanfactors
engineering
)*3ha/ter () Security and 4thica& 3ha&&enges
4rgonomics 7actors
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
40/61
Societa& So&utions
6sing information techno&ogies to so&e humanand socia& /ro&emsMedica& diagnosis3om/uter$assisted instruction
Goernmenta& /rogram /&anning4nironmenta& ua&ity contro&+aw enforcementJo /&acement
he detrimenta& effects of IOften caused y indiidua&s or organiations
not acce/ting ethica& res/onsii&ity for theiractions
@3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
41/61
Security Management of I
he Internet was dee&o/ed for inter$o/erai&ity,not im/enetrai&ityBusiness managers and /rofessiona&s a&ike
are res/onsi&e for the security, ua&ity, and
/erformance of usiness information systems%ardware, software, networks, and data
resources must e /rotected y a arietyof security measures
@(3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
42/61
3ase 2 Eata Security 7ai&ures
Security Breach %ead&ines Identity thiees sto&e information on (@:,
/eo/&e from 3hoice0ointBank of America &ost acku/ ta/es that he&d
data on oer ( mi&&ion credit card ho&dersES< had its stores5 credit card data
reached9 oer ( mi&&ion had een accessed
3or/orate America is fina&&y owning u/ to a &ong$he&d secret It can5t safeguard its most a&ua&e data
@23ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
43/61
3ase Study ;uestions
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
44/61
Security Management
he goa& of securitymanagement is theaccuracy, integrity,
and safety of a&&information system/rocesses andresources
@@3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
45/61
Internetworked Security Eefenses
4ncry/tionEata is transmitted in scram&ed form It is unscram&ed y com/uter systems for
authoried users on&yhe most wide&y used method uses a /air of
/u&ic and /riate keys uniue to eachindiidua&
@:3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
46/61
0u&icD0riate ey 4ncry/tion
@83ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
47/61
Internetworked Security Eefenses
7irewa&&sA gatekee/er system that /rotects a
com/any5s intranets and other com/uternetworks from intrusion
0roides a fi&ter and safe transfer /oint foraccess toDfrom the Internet and othernetworks
Im/ortant for indiidua&s who connect to theInternet with ES+ or ca&e modems3an deter hacking, ut cannot /reent it
@!3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
48/61
Internet and Intranet 7irewa&&s
@"3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
49/61
Eenia& of Serice Attacks
Eenia& of serice attacks de/end on three&ayers of networked com/uter systemshe ictim5s wesitehe ictim5s Internet serice /roider
Pomie or s&ae com/uters that hae eencommandeered y the cyercrimina&s
@*3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
50/61
Eefending Against Eenia& of Serice
At Pomie MachinesSet and enforce security /o&iciesScan for u&nerai&ities
At the IS0
Monitor and &ock traffic s/ikes At the Fictim5s
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
51/61
Internetworked Security Eefenses
4mai& Monitoring6se of content monitoring software that scans
for trou&esome words that might com/romisecor/orate security
Firus Eefenses3entra&ie the u/dating and distriution of
antiirus software6se a security suite that integrates irus
/rotection with firewa&&s,
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
52/61
Other Security Measures Security 3odes
Mu&ti&ee& /assword system 4ncry/ted /asswords Smart cards with micro/rocessors
Backu/ 7i&es Eu/&icate fi&es of data or /rograms
Security Monitors Monitor the use of com/uters and networks 0rotects them from unauthoried use, fraud, and destruction
Biometrics 3om/uter deices measure /hysica& traits that make each
indiidua& uniue Foice recognition, finger/rints, retina scan
3om/uter 7ai&ure 3ontro&s 0reents com/uter fai&ures or minimies its effects 0reentie maintenance Arrange acku/s with a disaster recoery organiation
:23ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
53/61
Other Security Measures In the eent of a system fai&ure, fault-tolerant systemshae
redundant /rocessors, /eri/hera&s, and software that /roide Fail-over capability# shifts to ack u/ com/onents Fail-save capability# the system continues to o/erate at the
same &ee& Fail-soft capability# the system continues to o/erate at a
reduced ut acce/ta&e &ee& A disaster recovery plancontains forma&ied /rocedures to fo&&ow
in the eent of a disaster
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
54/61
Information System 3ontro&s
Methods anddeices thatattem/t to
ensure theaccuracy,a&idity, and/ro/riety ofinformation
systemactiities
:@3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
55/61
Auditing I Security
I Security Audits0erformed y interna& or e1terna& auditorsCeiew and ea&uation of security measures
and management /o&iciesGoa& is to ensure that that /ro/er and
adeuate measures and /o&icies are in /&ace
::3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
56/61
0rotecting Kourse&f from
3yercrime
:83ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
57/61
3ase ) Managing Information
Security O3AF4 Security 0rocess Methodo&ogy Cisk 4a&uation
Se&f$direction y /eo/&e in the organiationAda/ta&e measures that can change with techno&ogyA defined /rocess and standard ea&uation /roceduresA foundation for a continua& /rocess that im/roes
security oer time Cisk Management
A forward$&ooking iewA focus on a =critica& few> security issues Integrated management of security /o&icies and
strategies
:!3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
58/61
3ase ) Managing Information
SecurityOrganiationa& and 3u&tura&
O/en communication of risk information
and actiities ui&d around co&&aorationA g&oa& /ers/ectie on risk in the conte1t
of the organiation5s mission and usinesso-ecties
eamwork
:"3ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
59/61
3ase Study ;uestions
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
60/61
3ase @ Maintaining Software
Security Security /rofessiona&s hae ! to 2( days eforehacker5s too&s used to e1/&oit the most recentu&nerai&ities ecome aai&a&e on the InternetMicrosoft5s month&y /atch$re&ease date is
known as =0atch uesday>Security software com/anies go to work
immediate&y to u/date their /roducts6/date must e thorough&y tested eforeeing de/&oyed
83ha/ter () Security and 4thica& 3ha&&enges
-
7/25/2019 SECURITY AND ETHICAL CHALLENGES.ppt
61/61
3ase Study ;uestions