This document summarizes the presentation "Privacy, Ethics and Security- Challenges of IT" which discusses major challenges posed by information technology, including privacy issues, ethics, and security concerns. It outlines privacy risks on the internet and from computer matching/profiling. Ethical issues are raised regarding employment monitoring, censorship, and individuality. Five dimensions of the information age are discussed. The objectives of security - confidentiality, integrity, and availability - are defined. Common hacker tactics like spoofing, sniffing, and denial of service attacks are also summarized. The document concludes with an overview of different types of computer crimes.
2. 9/8/2022 Annual Review 2
Agenda
Introduction
Privacy Issues
Ethics and Ethical Responsibility
Five Dimension Of Information Age
Security and Basic Security concepts
Hackers And Hacking Tactics
Computer Crime And Crime Types
3. 9/8/2022 Annual Review 3
There is no question that the use of information
technology in business presents major security
challenges, poses serious ethical questions, and
affects society in significant ways.
The use of information technologies in business
has had a major impact on society and thus
raises ethical issues in the areas of
“’crime, privacy, individuality, employment,
health, and working conditions.’’
It is important to understand that information
technology has had beneficial results, as well as
detrimental effects, on society and people in
each of these areas
Introduction
4. Information technology makes it technically and economically feasible to collect,
store, integrate, interchange. This characteristic has an important beneficial effect
on the efficiency and effectiveness of computer-based information systems.
privacy on the
internet
Computer
matching
pSome Privacy
Issues
Privacy laws Computer libel
& Censorship
5. 9/8/2022 Annual Review 5
Privacy Issues
Privacy on the
internet
The Internet is
notorious for giving its
users a feeling of
anonymity when in
reality they are highly
visible
Computer
Matching
Computer profiling and
mistakes in the computer
matching of personal data
are other controversial
threats to privacy.
Individuals have been
mistakenly arrested and
jailed.
Privacy laws
Many countries strictly
regulate the collection
and use of personal
data by business
corporations and
government agencies.
Computer libel
and censorship
The opposite side of the privacy debate-
Freedom of information, speech & information
Biggest battlegrounds-
Weapon used in this battle
-spamming -Flame mail
-Libel Laws -Censorship
Bulletin boards, Email boxes, Online files
of internet
6. 9/8/2022 Annual Review 6
Employment Challenges
Computer Monitoring
Challenges in working
conditions
Challenges of Individuality
Other Challenges
7. 9/8/2022 Annual Review 7
Business Ethics
Business ethics is concerned with the numerous ethical
questions that managers must confront as part of their
daily business decision making
Technology Ethics
Another important ethical dimension deals
specifically with the ethics of the use of any form
of technology. Four principles” Equity, Rights,
Honesty, Exercise of Corporate Power” can serve
as basic ethical requirement.
Ethical responsibility of
business professionals
8. 9/8/2022 Annual Review 8
• We have outlined a few ethical principles
• Acting with integrity
• increasing your professional competence
• setting high standards of personal performance
• accepting responsibility for your work
• advancing the health, privacy, and general welfare of the public
Ethical Guidelines
10. 9/8/2022 Annual Review 10
0
Definition : Security refers to the policies, procedures, and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and
organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its
records, and operational adherence to management standards.
Confidentiality Integrity Availability
11. 9/8/2022 Annual Review 11
1.Confidentiality: The first objective of security is
confidentiality: keeping information away from people
who should not have it.
2.Integrity: The second objective of security is integrity.
Both confidentiality and availability contribute to
integrity..
3.Availability: The third objective of security is availability.
Availability is a broad subject addressing things such
as fault tolerance to protect against denial of service.
12. 9/8/2022 Annual Review 12
Definition: A hacker is an individual who intends to gain unauthorized access to a computer system. Within the
hacking community, the term cracker is typically used to denote a hacker with criminal intent.
Hacker activities have broadened beyond mere system intrusion to include theft of goods and information, as well as
system damage and cybervandalism. Faking an e-mail address or Web page to trick
users & Programs that covertly search individual
packets of data.
By hammering a Web site’s an attacker can
effectively clog the systems.
A program that contains instructions that exploit
a known vulnerability in some software.
Tiny programs, sometimes written in java, that
misuse your computer’s resources, modify files
on the hard disk.
An instruction in a computer program that
triggers a malicious act.
Spoofing
and
Sniffing
Denial-
of-
Service
Attacks
Trojan
Horse
Malicious
Applets
Logic
Bombs
13. 9/8/2022 Annual Review 13
Computer crime, a growing threat to society, is caused
by the criminal or irresponsible actions of individuals who are taking
advantage of the widespread use and vulnerability of computers and
the Internet and other network.
Hacking
and
Crackin
g
Cyber-
Theft
Cyberterrori
sm
Softwar
e
Piracy
Unauthoriz
ed Use
Intellectu
al
property
theft
Comput
er virus
or worm