isne101 dr. ken cosh. review dependability reliability how do we improve it? security threats...
TRANSCRIPT
![Page 1: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/1.jpg)
ISNE101Dr. Ken Cosh
![Page 2: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/2.jpg)
Review
Dependability
Reliability
How do we improve it?
Security
Threats & Countering the Threats
![Page 3: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/3.jpg)
This Week
Ethics
![Page 4: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/4.jpg)
Ethical & Social Impact
Ethical issues in the areas of crime, privacy, individuality, employment, health and working conditions.
Impacts can be positive, negative or both; Computerising a manufacturing process has lead to
people losing jobs, while improving the working conditions of those left and producing higher quality product and less cost.
![Page 5: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/5.jpg)
Managing Ethically
Should you monitor employees email? Should employees use work computers for
private purposes? Should they take copies of software home? Should you keep electronic copies of
employee’s personal records? Should you sell your customers information?
![Page 6: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/6.jpg)
Management’s Ethical Challenges
Employment The introduction of IS/IT has created many new jobs, while at the same
time eliminating some – how do we ethically introduce job cutting systems?
Computer Monitoring How can we weigh up our employees right to privacy against the desire to
monitor computer usage (as a way of managing employees work)?
![Page 7: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/7.jpg)
Management’s Ethical Challenges
Working Conditions While IS/IT has removed many repetitive, monotonous
tasks, often the human role has changed from one of a craftsman to one of a machine regulating a machine
Individuality Many IS/IT remove the individual treatment of people
by imposing strict, uncustomisable procedures. Rather than dealing with customers individually, we are constrained by the capabilities of the system.
![Page 8: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/8.jpg)
Business Ethics
Stockholder Theory Managers are agents of the stockholders, with the ethical
responsibility to them to increase profits without breaking the law
Social Contract Theory Companies have an ethical responsibility to all members
of society.
Stakeholder Theory Managers should manage for the benefit of all
stakeholders; shareholders, customers, suppliers, local community, employees etc.
![Page 9: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/9.jpg)
Unauthorised Use at Work
Time and Resource Theft (Cyberslacking) Often monitored by sniffing software.
Includes; General Email abuse (spamming, chain letters,
spoofing, virus spreading, harrassment, defamatory statements)
Unauthorised Usage and Access (Sharing passwords and network access)
Copyright Infringement / Plagiarism (illegal or pirate software, copying websites or logos)
![Page 10: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/10.jpg)
Unauthorised Use at Work
Transmission of Confidential Data (Sharing company secrets)
Pornography (Accessing inappropriate websites on work resources)
Hacking Non-work-related bandwidth use (sharing movies, music
etc.) Leisure use (online shopping, chatting, gambling) Usage of External ISPs (avoiding detection by using
external ISP) Moonlighting (using company resources for personal
business).
![Page 11: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/11.jpg)
Privacy
A basic human right is the right to privacy, but this right is brought into question by Technology. Accessing individuals private email conversations and
computer records is a violation of privacy
Monitoring peoples whereabouts through CCTV, computer monitoring, Mobile GPS.
Computer matching of customer information gained from different sources.
Collecting telephone number / email addresses etc. to build customer profiles
![Page 12: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/12.jpg)
Anonymity
The internet allows almost anonymity
In reality much of it is very visible and open to privacy violations.
But precautions can be taken to protect privacy, such as encryption, authentication etc.
![Page 13: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/13.jpg)
Freedom of Speech / Information
Freedom of speech (information and the press), is another important human right. Do people have a right to know about matters that
others may wish to keep private?
With modern communication systems, sharing opinions (using ones right to free speech) becomes easier; Flaming Spamming
![Page 14: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/14.jpg)
Facebook…
So who has read Facebook’s Privacy Policy?
![Page 15: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/15.jpg)
![Page 16: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/16.jpg)
![Page 17: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/17.jpg)
![Page 18: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/18.jpg)
![Page 19: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/19.jpg)
![Page 20: ISNE101 Dr. Ken Cosh. Review Dependability Reliability How do we improve it? Security Threats & Countering the Threats](https://reader034.vdocument.in/reader034/viewer/2022042718/56649e545503460f94b4b7ee/html5/thumbnails/20.jpg)