Вы находитесь на странице: 1из 17

UNIT - 5 Ethics, Computer Crime, and Security

Information Systems Ethics

Information accessibility

Deals with what information a person has the right to obtain about others and how the information can be used

Protection of information accessibility


Carnivore : Carnivore was a system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Electronic Communications Privacy Act (ECPA)

Information Systems Ethics


E-mail Monitoring :- Email Monitoring Software: PC Tattletale's Email monitor and recording software makes it easy to monitor any and all email that sends or receives automatically.

Computer Crime

Who commits computer crime?

Computer Crime

Hacking and Cracking


Hacker one who gains unauthorized computer access, but without doing damage Cracker one who breaks into computer systems for the purpose of doing damage

Computer Crime

Types of computer crime


Data diddling: modifying data Salami slicing: skimming small amounts of money Carding: stealing credit card numbers online Piggybacking: stealing credit card numbers by spying Social engineering: tricking employees to gain access Dumpster diving: finding private info in garbage cans Spoofing: stealing passwords through a false login

Computer Security

Recommended Safeguards Implement a security plan to prevent break-ins Have a plan if break-ins do occur Make backups! Only allow access to key employees Change passwords frequently Keep stored information secure Use antivirus software Use biometrics for access to computing resources Hire trustworthy employees

Securitys Five Pillars

Authentication: Verifying the authenticity of users ensuring people are who they say they are.

ID/Password, biometric, questions

Identification: Identifying users to grant them appropriate access

Allowing system to know who someone is to give appropriate access rights


E.g., against spyware installed without consent in a computer to collect information

Privacy: Protecting information from being seen

Securitys Five Pillars

Integrity: Keeping information in its original form

Ensuring data is not altered in any way

Non-repudiation: Preventing parties from denying actions they have taken

Ensuring that the parties in a transaction are who they say they are and cannot deny that transaction took place

Technical Countermeasures

Firewalls: hardware/software to control access between networks / blocking unwanted access


> Windows Vista

Encryption/decryption: Using an algorithm (cipher) to make a plain text unreadable to anyone that does not have a key SSL

Technical Countermeasures

Virtual Private Networks (VPNs) Allow strong protection for data communications Cheaper than private networks, but do not provide 100% end-to-end security

FIREWALL SECURITY MEASURE

Internet Security

Firewall hardware and software designed to keep unauthorized users out of network systems

Encryption- Security Measure

Encryption the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer

Computer Security

How encryption works

Symmetric secret key system


Both sender and recipient use the same key Key management can be a problem A private key and a public key

Public key technology

Certificate authority

A trusted middleman verifies that a Web site is a trusted site (provides public keys to trusted partners) Secure socket layers (SSL)

Computer Security

How to maintain your privacy online


Choose Web sites monitored by privacy advocates Avoid cookies Visit sites anonymously Use caution when requesting confirming e-mail

THANK YOU ALL

Вам также может понравиться