chapter 12 security and ethical challenges of information systems

20
Chapter 12 Security and Ethical Challenges of Information Systems

Upload: wilfred-cole

Post on 13-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 12 Security and Ethical Challenges of Information Systems

Chapter 12

Security and Ethical Challengesof Information Systems

Page 2: Chapter 12 Security and Ethical Challenges of Information Systems

Security and Controls

Security and controls are a managers responsibility

Used to ensure accuracy, integrity, etc

E commerce businesses increase the need for tight security and controls

Page 3: Chapter 12 Security and Ethical Challenges of Information Systems

Security Requirementsfor e-commerce

1. Privacy2. Authenticity3. Integrity4. Reliability5. Blocking

Page 4: Chapter 12 Security and Ethical Challenges of Information Systems

Major Types of Controls

There are three categories of controls for e-commerce and information systems Information System controls Procedural controls Facility controls

Page 5: Chapter 12 Security and Ethical Challenges of Information Systems

IS controls

Used to ensure the accuracy, validity, and propriety of information system activities

Input controls - necessary to ensure that data types are correct, formats are correct etc

Usually some sort of transaction audit trail, batch total, hash totals (addition of characters in a field correct to spec)

Page 6: Chapter 12 Security and Ethical Challenges of Information Systems

Processing Controls

Identification of incorrect processing is essential to good information system use Hardware controls ensure that the electronic

portion of the processing function is correct Software controls ensure that the logic is

correct, input files are correct, destination files are writing correctly

Output controls ensure that reports are correct, complete, are going to the correct destination

Page 7: Chapter 12 Security and Ethical Challenges of Information Systems

Storage Controls

Storage controls ensure data integrity, data security, user authentication, user authorization

Naming conventionsBackup filesGeneration data groups

Page 8: Chapter 12 Security and Ethical Challenges of Information Systems

Facility Controls

Protection of hardware, software, network resources

Network security System security applications - software

that monitors usage, users Encryption - Organized method of

scrambling data packets being transmitted over a network

Page 9: Chapter 12 Security and Ethical Challenges of Information Systems

Network Security cont

Firewalls - An electronic security guard at the front end of the network Best to use separate hardware

components Requires a software component Can deter and slow down unauthorized

use and access Can be configured to meet users needs

Page 10: Chapter 12 Security and Ethical Challenges of Information Systems

Physical security

Computer centers need to be behind locked doors

Biometric security devices are becoming more available and viable

Failure controls - needed to minimize interruptions due to power outages, hardware malfunctions, etc

Page 11: Chapter 12 Security and Ethical Challenges of Information Systems

Procedural controls

Outlines standards of operationDocumentation Requirements for authorization of

usersDisaster recovery planning - what to

do in emergenciesEnd user control

Page 12: Chapter 12 Security and Ethical Challenges of Information Systems

Auditing Information Systems

There is a need for internal and external audits of an organization

There are two ways to effect this task using information systems Audits through the system - verification of

all aspects of IS including programs Audits around the system - verification of

data and output Audit trails/control logs

Page 13: Chapter 12 Security and Ethical Challenges of Information Systems

Ethical and Societal Challenges of IT

There are multiple challenges in the business world that involve ethics

IT increases the ethical considerations

Many ethical philosophies and models that shape our ethical makeup

Page 14: Chapter 12 Security and Ethical Challenges of Information Systems

IT and employment

Introducing information technology into an organization can create and eliminate jobs

Reduction in individuality - automated processes minimize individual influence

This creates some loss of identity in workers

Computerized monitoring

Page 15: Chapter 12 Security and Ethical Challenges of Information Systems

Privacy Issues

Computerized work monitoring has been scrutinized as invading privacy

E-mail privacy issuesAssembling unauthorized data files

on individualsTracking via electronic trails

Page 16: Chapter 12 Security and Ethical Challenges of Information Systems

Internet Privacy

The Internet is not as anonymous as most would want to believe

CookiesAnonymous remailers allow for newsgroup

postings through a third partySpamming - Unsolicited emailsFlaming - Verbal attacks, threats via bbs,

newsgroups

Page 17: Chapter 12 Security and Ethical Challenges of Information Systems

Internet crime

Theft of service Software theftAlteration of online databasesMalicious hackingVirus problems

Page 18: Chapter 12 Security and Ethical Challenges of Information Systems

Employee health issues

Although computer users are not subject to on the job injuries like a machine worker would be, there are some definite health issues

Cumulative trauma disorders such as carpal tunnel syndrome are common among heavy users

Page 19: Chapter 12 Security and Ethical Challenges of Information Systems

Health issues cont

Exposure to radiationErgonomic considerations

Page 20: Chapter 12 Security and Ethical Challenges of Information Systems

You and ethical responsibility

Responsible for ethical use and decisions

Think about societal ramifications in decision making

Character is what you do when no one is looking