Escolar Documentos
Profissional Documentos
Cultura Documentos
SECURITY AND
ETHICAL
CHALLENGES
Submitted By:
Abhishek
Kumar(52) (MBA)
Employment
Health
Individuality
Security
Ethics and
Society
Crime
Working
Conditions
Business Ethics
Basic categories of
ethical issues
Employee privacy
Security of company
records
Workplace safety
Technology Ethics
Four Principles
Proportionality
Informed consent
Justice
Minimized Risk
Ethical Responsibility
Computer Crime
Cyber
Theft
Hacking
Computer
Viruses
Unauthorized
Use at work
Piracy
Hacking
The obsessive use of computers, or
the unauthorized access and use of
networked computer systems
Cyber Theft
Involves unauthorized network entry
and the fraudulent alteration of
computer databases
PIRACY
Software
Piracy
Piracy
of intellectual property
Music
Videos
Images
Articles
Books
Other written works
Privacy Issues
Privacy
on the internet
Privacy Laws
Computer libel and censorship
Health issues
Eye
disease
Bad postures
Hurting Hands
Computer stress injuries
Some solutions
Ergonomics (human factors
engineering)
Goal is to design healthy work
environments
Other Challenges
Employment
Security management of
IT
Encryption
Firewalls
Denial
of service
attacks
E-mail
monitoring
Virus defense
Security
codes
Backup files
Security monitors
Biometric security
Computer failure
controls
Fault tolerant
systems
Disaster recovery
System controls and
audits
Firewall
Serves as a gatekeeper system
that protects a companys intranets
and other computer networks from
intrusion
Provides a filter and safe transfer point
Screens all network traffic for proper
passwords or other security codes
12
Encryption
Passwords, messages, files, and other data
is transmitted in scrambled form and
unscrambled for authorized users
Involves using special mathematical
algorithms to transform digital data in
scrambled code
Most widely used method uses a pair of
public and private keys unique to each
individual
13
Security Monitors
Programs
E-mail Monitoring
Spot checks just arent good
enough anymore. The tide is turning
toward systematic monitoring of
corporate e-mail traffic using
content-monitoring software that
scans for troublesome words that
might compromise corporate
security.
Virus Defenses
Protection may accomplished
through
Centralized distribution and updating of
antivirus software
Outsourcing the virus protection
responsibility to ISPs or to
telecommunications or security
management companies
Backup Files
Security Monitors
Biometric Security
Disaster Recovery
Measure physical
traits that make each
individual unique
Voice
Fingerprints
Hand geometry
Signature dynamics
Keystroke analysis
Retina scanning
Face recognition and
Genetic pattern analysis
Security codes
Multilevel password
system
Log onto the computer
system
Gain access into the
system
Access individual files
Information System
Controls
Auditing Business
Systems
Computer Failure
Controls
Preventive maintenance
of hardware and
management of
software updates
Backup computer
system
Carefully scheduled
hardware or software
changes
Highly trained data
center personnel
THANK YOU