Você está na página 1de 22

Management Information Systems

SECURITY AND
ETHICAL
CHALLENGES
Submitted By:
Abhishek
Kumar(52) (MBA)

Security and Ethical Challenges


Privacy

Employment

Health

Individuality

Security
Ethics and
Society

Crime

Working
Conditions

Business Ethics

Basic categories of
ethical issues
Employee privacy
Security of company
records
Workplace safety

Technology Ethics

Four Principles
Proportionality
Informed consent
Justice
Minimized Risk

Ethical Responsibility

Computer Crime
Cyber
Theft

Hacking

Computer
Viruses

Unauthorized
Use at work

Piracy

Hacking
The obsessive use of computers, or
the unauthorized access and use of
networked computer systems

Cyber Theft
Involves unauthorized network entry
and the fraudulent alteration of
computer databases

PIRACY
Software

Piracy

Unauthorized copying of software


Software is intellectual property protected by
copyright law and user licensing agreements

Piracy

of intellectual property

Other forms of intellectual property covered


by copyright laws

Music
Videos
Images
Articles
Books
Other written works

Unauthorized use at work


Also called time and resource theft
May range from doing private
consulting or personal finances, to
playing video games, to unauthorized
use of the Internet on company
networks

Privacy Issues
Privacy

on the internet
Privacy Laws
Computer libel and censorship

Health issues
Eye

disease
Bad postures
Hurting Hands
Computer stress injuries
Some solutions
Ergonomics (human factors
engineering)
Goal is to design healthy work
environments

Other Challenges
Employment

challenges because a lot of


tasks have been automated
Computer monitoring causes intrusion in
personal space for workers
Challenges in working conditions are caused
by tasks which are monotonous in nature.
But it also automates most of the work and
gives way to more challenging jobs
Challenges to individuality as they eliminate
the human relationships between people

Security management of
IT
Encryption
Firewalls
Denial

of service
attacks
E-mail
monitoring
Virus defense

Security

codes
Backup files
Security monitors
Biometric security
Computer failure
controls
Fault tolerant
systems
Disaster recovery
System controls and
audits

Firewall
Serves as a gatekeeper system
that protects a companys intranets
and other computer networks from
intrusion
Provides a filter and safe transfer point
Screens all network traffic for proper
passwords or other security codes

Management Information Systems

12

Encryption
Passwords, messages, files, and other data
is transmitted in scrambled form and
unscrambled for authorized users
Involves using special mathematical
algorithms to transform digital data in
scrambled code
Most widely used method uses a pair of
public and private keys unique to each
individual

Management Information Systems

13

Security Monitors
Programs

that monitor the use of


computer systems and networks and
protect them from unauthorized use,
fraud, and destruction

E-mail Monitoring
Spot checks just arent good
enough anymore. The tide is turning
toward systematic monitoring of
corporate e-mail traffic using
content-monitoring software that
scans for troublesome words that
might compromise corporate
security.

Virus Defenses
Protection may accomplished
through
Centralized distribution and updating of
antivirus software
Outsourcing the virus protection
responsibility to ISPs or to
telecommunications or security
management companies

Denial of Service Defenses


These assaults depend on three
layers of networked computer
systems
Victims website
Victims ISP
Sites of zombie or slave computers

Defensive measures and security


precautions must be taken at all
three levels

Backup Files

Duplicate files of data or


programs
File retention measures
Sometimes several
generations of files are
kept for control purposes

Security Monitors

Programs that monitor


the use of computer
systems and networks
and protect them from
unauthorized use, fraud,
and destruction

Other Security Measures

Biometric Security

Disaster Recovery

Measure physical
traits that make each
individual unique
Voice
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
Face recognition and
Genetic pattern analysis

Disaster recovery plan


Which employees will
participate and their
duties
What hardware, software,
and facilities will be used
Priority of applications
that will be processed

Other Security Measures (continued)

Security codes

Multilevel password
system
Log onto the computer
system
Gain access into the
system
Access individual files

Fault Tolerant Systems

Computer systems that


have redundant
processors, peripherals,
and software
Fail-over
Fail-safe
Fail-soft

Other Security Measures


(continued)

System Controls and Audits

Information System
Controls
Auditing Business
Systems

Computer Failure
Controls
Preventive maintenance
of hardware and
management of
software updates
Backup computer
system
Carefully scheduled
hardware or software
changes
Highly trained data
center personnel

Other Security Measures


(continued)

THANK YOU

Você também pode gostar