Académique Documents
Professionnel Documents
Culture Documents
LECTURER , IT DEPARTMENT
Identify ethical issues in how the use of information
technologies in business affects
Employment
Individuality
Working Conditions
Privacy
Crime
Health
Solutions to societal problems
Hacking
The obsessive use of
computers, or the
unauthorized access and
use of networked
computer systems
Cyber Theft
Involves unauthorized
network entry and the
fraudulent alteration of
computer databases
24
Unauthorized use at work
Also called time and resource theft
May range from doing private consulting or personal finances,
to playing video games, to unauthorized use of the Internet on
company networks
Piracy of intellectual property
Other forms of intellectual property covered by copyright laws
Music
Videos
Images
Articles
Books
Other written works
25
Software Piracy
Unauthorized copying of software
Software is intellectual property protected by copyright law
and user licensing agreements
Computer viruses and worms
Virus
A program that cannot work without being inserted into
another program
Worm
A distinct program that can run unaided
26
IT makes it technically and economically feasible to
collect, store, integrate, interchange, and retrieve data
and information quickly and easily.
Benefit – increases efficiency and effectiveness
But, may also have a negative effect on individual’s
right to privacy
34
Firewalls
Serves as a “gatekeeper” system that protects a
company’s intranets and other computer networks from
intrusion
Provides a filter and safe transfer point
Screens all network traffic for proper passwords or other
security codes
35
Denial of Service Defenses
These assaults depend on three layers of networked
computer systems
Victim’s website
Victim’s ISP
Sites of “zombie” or slave computers
Defensive measures and security precautions must be
taken at all three levels
36
E-mail Monitoring
“Spot checks just aren’t good enough anymore. The
tide is turning toward systematic monitoring of
corporate e-mail traffic using content-monitoring
software that scans for troublesome words that might
compromise corporate security.”
Virus Defenses
Protection may accomplished through
Centralized distribution and updating of antivirus software
Outsourcing the virus protection responsibility to ISPs or to
telecommunications or security management companies
37
Security codes
Multilevel password system
Log onto the computer system
Gain access into the system
Access individual files
Backup Files
Duplicate files of data or programs
File retention measures
Sometimes several generations of files are kept for
control purposes
38
Security Monitors
Programs that monitor the use of computer systems and
networks and protect them from unauthorized use, fraud,
and destruction
Biometric Security
Measure physical traits that make each individual unique
Voice
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
Face recognition and Genetic pattern analysis
39
Computer Failure Controls
Preventive maintenance of hardware and management
of software updates
Backup computer system
Carefully scheduled hardware or software changes
Highly trained data center personnel
40
Fault Tolerant Systems
Computer systems that have redundant processors,
peripherals, and software
Fail-over
Fail-safe
Fail-soft
Disaster Recovery
Disaster recovery plan
Which employees will participate and their duties
What hardware, software, and facilities will be used
Priority of applications that will be processed
41
Information System Controls
Methods and devices that attempt to ensure the
accuracy, validity, and propriety of information system
activities
Designed to monitor and maintain the quality and
security of input, processing, and storage activities
Auditing Business Systems
Review and evaluate whether proper and adequate
security measures and management policies have been
developed and implemented
Testing the integrity of an application’s audit trail
42