Comp Crimes Ethics Security
-
Upload
shafeer-khan -
Category
Documents
-
view
216 -
download
0
Transcript of Comp Crimes Ethics Security
-
7/30/2019 Comp Crimes Ethics Security
1/26
Information Systems Ethics,
Computer Crime, and
Security
-
7/30/2019 Comp Crimes Ethics Security
2/26
Chapter 9 Objectives
Understand how computer ethics affects
IS
Understand information privacy, accuracy,
property, and accessibility
Understand types of computer crime
Understand the terms virus, worm, Trojanhorse, and logic or time bomb
Understand computer security
-
7/30/2019 Comp Crimes Ethics Security
3/26
-
7/30/2019 Comp Crimes Ethics Security
4/26
Information Systems Ethics
Computer Literacy Knowing how to use a computer
Digital Divide
That gap between those with computer access andthose who dont have it
Computer Ethics Standards of conduct as they pertain to the use of
information systems
-
7/30/2019 Comp Crimes Ethics Security
5/26
Information Systems Ethics
Privacy Protecting ones personal information
Identity theft Stealing of anothers social security number, credit
card number, or other personal information
-
7/30/2019 Comp Crimes Ethics Security
6/26
Information Systems Ethics
Information accuracy Deals with authentication and fidelity of information
Information property Deals with who owns information about individuals
and how information can be sold and exchanged
-
7/30/2019 Comp Crimes Ethics Security
7/26
-
7/30/2019 Comp Crimes Ethics Security
8/26
Information Systems Ethics
Information accessibility Deals with what information a person has the right to
obtain about others and how the information can be used
Issues in information accessibility Carnivore: software application designed to be connected
to Internet Service Providers computers and eavesdrops
on all communications.
Electronic Communications Privacy Act (ECPA): it offered
stronger support for voice mail than it did for e-mail. No
other laws at federal or state levels protect e-mail privacy
Monitoring e-mail
-
7/30/2019 Comp Crimes Ethics Security
9/26
Information Systems Ethics
The need for a code of ethical conduct Business ethics
Plagiarism
Cybersquatting: registering a domain name andthen trying to sell the name for big bucks to a
person, company. Domain names are a scarce
resource one of the few scarce resources in
cyberspace
-
7/30/2019 Comp Crimes Ethics Security
10/26
Computer Crime
Definition: the act of using a computer tocommit an illegal act Authorized and unauthorized computer access
Examples Stealing time on company computers
Breaking into government Web sites
Stealing credit card information
-
7/30/2019 Comp Crimes Ethics Security
11/26
Computer Crime
Federal and State Laws Stealing or compromising data
Gaining unauthorized computer access
Violating data belonging to banks Intercepting communications
Threatening to damage computer systems
Disseminating viruses
-
7/30/2019 Comp Crimes Ethics Security
12/26
Computer Crime
Hacking and Cracking Hacker one who gains unauthorized computer
access, but without doing damage
Cracker one who breaks into computer systems
for the purpose of doing damage
-
7/30/2019 Comp Crimes Ethics Security
13/26
Computer Crime Who commits computer crime?
-
7/30/2019 Comp Crimes Ethics Security
14/26
Computer Crime
Types of computer crime Data diddling: modifying data
Salami slicing: skimming small amounts of money
Phreaking: making free long distance calls
Cloning: cellular phone fraud using scanners
Carding: stealing credit card numbers online
Piggybacking: stealing credit card numbers by spying
Social engineering: tricking employees to gain access
Dumpster diving: finding private info in garbage cans Spoofing: stealing passwords through a false login page
-
7/30/2019 Comp Crimes Ethics Security
15/26
Computer Crime
Software piracy North America 25%
Western Europe 34%
Asia / Pacific 51%
Mid East / Africa 55%
Latin America 58%
Eastern Europe 63%
-
7/30/2019 Comp Crimes Ethics Security
16/26
Computer Crime
Computer viruses and destructive code Virus a destructive program that disrupts the normal
functioning of computer systems
Types:
Worm: usually does not destroy files; copies itself
Trojan horses: Activates without being detected;
does not copy itself
Logic or time bombs: A type of Trojan horse thatstays dormant for a period of time before activating
-
7/30/2019 Comp Crimes Ethics Security
17/26
Computer Security
Computer Security precautions taken to
keep computers and the information they
contain safe from unauthorized access
-
7/30/2019 Comp Crimes Ethics Security
18/26
Computer Security
Recommended Safeguards Implement a security plan to prevent break-ins
Have a plan if break-ins do occur
Make backups!
Only allow access to key employees Change passwords frequently
Keep stored information secure
Use antivirus software
Use biometrics for access to computing resources
Hire trustworthy employees
-
7/30/2019 Comp Crimes Ethics Security
19/26
Computer Security
Encryption the process of encodingmessages before they enter the network or
airwaves, then decoding them at the
receiving end of the transfer
-
7/30/2019 Comp Crimes Ethics Security
20/26
-
7/30/2019 Comp Crimes Ethics Security
21/26
Computer Security
Other encryption approaches Pretty good privacy (PGP)
Phil Zimmerman
Clipper Chip: a chip that could generate uncrackable codes.
There was a flaw.
-
7/30/2019 Comp Crimes Ethics Security
22/26
Computer Security Internet Security
Firewall hardware and software designed to keep
unauthorized users out of network systems
-
7/30/2019 Comp Crimes Ethics Security
23/26
Computer Security
-
7/30/2019 Comp Crimes Ethics Security
24/26
Computer Security
Virus prevention Install antivirus software
Make backups
Avoid unknown sources of shareware Delete e-mails from unknown sources
If your computer gets a virus
-
7/30/2019 Comp Crimes Ethics Security
25/26
Computer Security
How to maintain your privacy online Choose Web sites monitored by privacy advocates
Avoid cookies
Visit sites anonymously Use caution when requesting confirming e-mail
-
7/30/2019 Comp Crimes Ethics Security
26/26
Computer Security
Avoid getting conned in cyberspace Internet auctions
Internet access
International modem dialing
Web cramming
Multilevel marketing (pyramid schemes)
Travel/vacations
Business opportunities
Investments
Health-care products