Chapter 13 Security and Ethical Challenges McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Learning Objectives • Identify several ethical issues regarding how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems. • Identify several types of security management strategies and defenses and explain how they can be used to ensure the security of business applications of information technology. 13-2 Learning Objectives • Propose several ways that business managers and professionals can help lessen the harmful effects and increase the beneficial effects of the use of information technology. 13-3 RWC 1: Ethics, IT and Compliance • IT Challenges – – – – Technical functionality Business requirements Ethical standards Correct behaviors • 2 views of Corporate Ethics – Set of legal and minimum standards – Set of values integral to doing business • Most companies have ethics and compliance programs • Few can truly execute an ethical agenda 13-4 IT Security, Ethics, and Society 13-5 Categories of Ethical Business Issues 13-6 Corporate Social Responsibility Theories • Stockholder Theory – Managers are agents of the stockholders – Only responsible to increase profits without violating the law or fraud • Social Contract Theory – Responsible to all of society • Stakeholder Theory – Responsible to anyone affected by company 13-7 Principles of Technology Ethics • Proportionality – Good must outweigh the harm or risk • Informed Consent – Those affected should understand and accept risks • Justice – Benefits and burdens distributed fairly • Minimized Risk – Avoid all unnecessary risk 13-8 AITP Standards of Professional Conduct 13-9 Security from Cyber Crime 13-10 Hacking • Obsessive use of computers • Unauthorized access and use of networked computer systems • Electronic Breaking and Entering – Accessing without stealing nor damaging • Cracker (black hat or darkside hacker) – Maintains knowledge of vulnerabilities for private advantage • Common Hacking Tactics – Figure 13.7 13-11 Cyber Theft • Most involve theft of money • “Inside jobs” • Unauthorized activity • Attacks through the Internet • Most companies don’t report 13-12 Cyberterrorism • Use IT to attack electronic infrastructure, exchange information or make threats • Terror related – More political motivation than criminal • Examples – Attempt to disrupt life support at Antarctic research station – Release of untreated sewage in Australia – Shut down of government network and banks in Estonia – Non-deliberate shut down of systems at nuclear reactor 13-13 Unauthorized Use at Work • Time and resource theft – Doing private consulting – – – – – – Doing personal finances Playing video games Unauthorized use of the Internet or networks Recreational surfing Racist or offensive e-mail Pornographic sites • Sniffers – Monitor network traffic or capacity – Find evidence of improper use 13-14 Internet Abuses in the Workplace • • • • • • • • • • • General email abuses Unauthorized usage and access Copyright infringement/plagiarism Newsgroup postings Transmission of confidential data Pornography Hacking Non-work-related download/upload Leisure use of the Internet Use of external ISPs Moonlighting 13-15 Software Piracy • Unauthorized copying of computer programs • Licensing – Purchase – payment for fair use – Site license – allows a certain number of copies – Shareware – allows copies – Public Domain – not copyrighted • Software industry losses – ⅓ to ½ of revenues – Millions of copies in educational market – 90% pirated software in China • Sales negligible 13-16 Theft of Intellectual Property • Intellectual Property – Copyrighted material – Music, videos, images, articles, books, software • Copyright Infringement is Illegal – Easy to trade pirated intellectual property • Publishers Offer Inexpensive Online Music – Illegal downloading is declining 13-17 Viruses and Worms • Viruses must be inserted into another program • Worms can run unaided • Spread annoying or destructive routines • Commonly transmitted through – – – – Internet and online services Email and file attachments Disks from contaminated computers Shareware • Top 5 Virus Families of all time – Figure 13.9 • Cost of Top 5 Virus Families – Figure 13.9 13-18 Adware and Spyware • Adware – Useful software allows ads without consent • Spyware – – – – – – – – Type of Adware Can steal private information Add advertising links to Web pages Redirect affiliate payments Change a users home page and search settings Make modem call premium-rate numbers Leave security holes that let Trojans in Degrade system performance • Removal often not completely successful 13-19 Privacy Issues • IT capability can create negative affect on privacy – Personal information is collected – Confidential information stolen or misused • Opt-In – Explicitly consent to allow data to be compiled – Default in Europe • Opt-Out – Must request data is not collected – Default in the U.S. 13-20 Privacy Issues • Violation of Privacy – Accessing conversations and records – Collecting and sharing visits to websites • Computer Monitoring – Mobile and paging services can track people • Computer Matching – Market additional business services • Unauthorized Access of Personal Files – Build profiles of contact and credit information 13-21 Protecting Your Privacy on the Internet • Encrypt email • Send anonymous postings • Ask your ISP not to sell your information • Don’t reveal personal data and interests 13-22 Privacy Laws • Electronic Communications Privacy Act and Computer Fraud and Abuse Act – Prohibit intercepting data communications messages, stealing or destroying data, or trespassing in federal-related computer systems • U.S. Computer Matching and Privacy Act – Regulates the matching of data held in federal agency files to verify eligibility for federal programs 13-23 Privacy Laws • Sarbanes-Oxley – Positive – strengthens accounting controls – Negative – overly complex and regulatory • Health Insurance Portability and Accountability Act (HIPAA) – Safeguards for health-related information • Gramm-Leach-Bliley • USA Patriot Act • California Security Breach Law • Securities and Exchange Commission Rule 17a-4 13-24 Computer Libel and Censorship • The opposite side of the privacy debate… – Freedom of information, speech, and press • Biggest battlegrounds – Bulletin boards – Email boxes – Online files of Internet and public networks • Weapons used in this battle – – – – Spamming Flame mail Libel laws Censorship 13-25 Cyberlaw • Regulate activities electronic communications – Wide variety of legal and political issues – Intellectual property, privacy, freedom of expression, and jurisdiction • Body of law emerged 1996 • Controversy – Some feel the Internet should not be regulated • Encryption and cryptography make regulation difficult – Websites work around censorship – Applicability of legal principles • Better laws to come 13-26 Other Challenges • Employment – Job opportunities changing • Computer Monitoring – Effective but controversial • Working Conditions – Eliminated monotonous or obnoxious tasks – Eliminated some skilled jobs • Individuality – Dehumanizes and depersonalizes 13-27 Health Issues • Cumulative Trauma Disorders (CTDs) – Disorders caused by fast-paced repetitive keystroke jobs • Carpal Tunnel Syndrome – Painful, crippling ailment of the hand and wrist – Typically requires surgery to cure • Ergonomics – Designing healthy work environments 13-28 Ergonomics Factors 13-29 13-29 Societal Solutions • Use IT to solve human and social problems – Medical diagnosis – Computer-assisted instruction (CAI) – Computer based training (CBT) – Governmental program planning – Environmental quality control – Law enforcement – Job placement • Detrimental effects – Actions without ethical responsibility 13-30 Security Management of IT • Security is number 1 problem with the Internet – Internet was developed for inter-operability, not impenetrability – Users responsible for security, quality, and performance – Resources must be protected • Goal of security management – Accuracy, integrity, and safety of all information system processes and resources 13-31 RWC 2: End-Point Security • Security a complex, moving target • Delicate balance between access and security • Two approaches – Secure devices – Secure data wherever it lives • Encryption • HIPAA regulations • Classify data, set policies • Smartphones ongoing challenges – Balance personal and business use • BlackBerries have management infrastructure • Phones not secured yet 13-32 Public/Private Key Encryption 13-33 Internet and Intranet Firewalls 13-34 Denial of Service Attacks • Depend on three layers of networked computer systems – The victim’s website – The victim’s Internet service provider – Zombie or slave computers commandeered by cybercriminals • Defense – At Zombie Machines • Set and enforce security policies • Scan for vulnerabilities – At the ISP • Monitor and block traffic spikes – At the Victim’s Website • Create backup servers and network connections 13-35 Internetworked Security Defenses • • • • • • • • Email Monitoring Virus Defenses Security Codes Backup Files Security Monitors Biometrics Computer Failure Controls Disaster recovery plan 13-36 Information System Controls • Methods and devices to ensure accuracy, validity, and propriety • IT Security Audits – Performed by internal or external auditors – Review and evaluation of security measures and management policies – Goal: Ensure proper and adequate measures and policies are in place 13-37 Protecting Yourself from Cybercrime 13-38 RWC 3: Challenges of Working in IT • IT presents ethical challenges and dilemmas. • To hold workers accountable – Must set ethical policies and guidelines – Make sure that employees know and understand them 13-39 RWC 4: Worry About What Goes Out • Leakage of sensitive customer data or proprietary information is a new priority • Focus on keeping sensitive information • Deploy outbound content management tools – – – – – – – e-mail messages, Alternative communication mechanisms Including instant messaging Blogs FTP transfers Web mail Message boards 13-40
© Copyright 2026 Paperzz