Professional Documents
Culture Documents
Chap013-Security and Ethical Challenges
Chap013-Security and Ethical Challenges
2
• Download copyrighted material • Illegal
• Upload copyrighted material • Illegal
• Use another person’s photos on your
website • Illegal
• Post guitar tabs/song lyrics • Illegal
• Install software on more than one
computer • Illegal
• Record TV transmissions to your
computer • Legal
• Using someone else’s wireless
connection • Illegal
3
I. Introduction
Use of IT in business poses security
challenges, ethical questions, and
societal challenges
As a business professional you have the
responsibility to promote Ethical (what
does that mean???) use of IS in the
workplace
4
Computer Crime
Hacking and Cracking
Hacking – obsessive use of computers,
unauthorized use of networked systems
Cracking (black hat or dark-side hacker) – malicious
or criminal hacker
7
Common Hacking Tactics
• Sniffer
– Programs that search individual packets of
data as they pass through the Internet
– Capturing passwords or entire contents
• Phishing or Spoofing
– Faking an e-mail address or Web page to trick
users into passing along critical information
like passwords or credit card numbers
• Dumpster Diving
– Sifting through a company’s garbage to find
information to help break into their
computers 8
Common Hacking Tactics
• Trojan Horse
– A program that, unknown to the user, contains
instructions that exploit a known vulnerability
in some software
• Malicious Applets
– Tiny Java programs that misuse your
computer’s resources, modify files on the hard
disk, send fake e-mail, or steal passwords
• Social Engineering
– Gaining access to computer systems
– By talking unsuspecting company employees
out of valuable information such as passwords 9
Leaving Your Job? Don’t Take Anything
with You
10
IV. Privacy Issues
12
Section 2
Security Management of
Information Technology
13
III. Security Issues to Consider
15
V. Other Security Measures
16
V. Other Security Measures
17
Biometrics
• Computer devices that measure physical
traits that make each individual unique
• Examples:
– Voice verification
– Fingerprints
– Retina scan
– Hand scan
– Face scan
18
VI. System Controls and Audits
19
Ethical Discussion
• Is it good for technology to replace workers?
20
Corporate Social
Responsibility Theories
• Stockholder Theory
– Managers are agents of the stockholders
– Their only ethical responsibility is to increase the
profits of the business
– Without violating the law or engaging in
fraudulent practices
• Social Contract Theory
– Companies have ethical responsibilities to all
members of society
– Which allow corporations to exist based on a
social contract 21
Corporate Social
Responsibility Theories
• Stakeholder Theory
– Managers have an ethical responsibility to
manage a firm for the benefit of all its
stakeholders
– Stakeholders are all individuals and groups
that have a stake in, or claim on, a company
22
Three Levels of Ethical
Standards
• The law.
• The policies and procedures of the
organization.
• The moral stance individuals take when
faced with decisions not governed by
formal rules.
23
Establishing Ethical
Standards
• The Utilitarian principle (Benefits
people more than hurting someone).
• Kant's categorical imperative (If
everyone does it – universal law).
• The professional ethic.
• The Golden Rule.
• The television test.
• The family test.
24