SlideShare a Scribd company logo
Privacy, Ethics
and Security-
Challenges of IT
Presented by
Fahim Montasir
ID-20305090
9/8/2022 Annual Review 2
Agenda
 Introduction
 Privacy Issues
 Ethics and Ethical Responsibility
 Five Dimension Of Information Age
 Security and Basic Security concepts
 Hackers And Hacking Tactics
 Computer Crime And Crime Types
9/8/2022 Annual Review 3
There is no question that the use of information
technology in business presents major security
challenges, poses serious ethical questions, and
affects society in significant ways.
The use of information technologies in business
has had a major impact on society and thus
raises ethical issues in the areas of
“’crime, privacy, individuality, employment,
health, and working conditions.’’
It is important to understand that information
technology has had beneficial results, as well as
detrimental effects, on society and people in
each of these areas
Introduction
Information technology makes it technically and economically feasible to collect,
store, integrate, interchange. This characteristic has an important beneficial effect
on the efficiency and effectiveness of computer-based information systems.
privacy on the
internet
Computer
matching
pSome Privacy
Issues
Privacy laws Computer libel
& Censorship
9/8/2022 Annual Review 5
Privacy Issues
Privacy on the
internet
The Internet is
notorious for giving its
users a feeling of
anonymity when in
reality they are highly
visible
Computer
Matching
Computer profiling and
mistakes in the computer
matching of personal data
are other controversial
threats to privacy.
Individuals have been
mistakenly arrested and
jailed.
Privacy laws
Many countries strictly
regulate the collection
and use of personal
data by business
corporations and
government agencies.
Computer libel
and censorship
The opposite side of the privacy debate-
Freedom of information, speech & information
Biggest battlegrounds-
Weapon used in this battle
-spamming -Flame mail
-Libel Laws -Censorship
Bulletin boards, Email boxes, Online files
of internet
9/8/2022 Annual Review 6
 Employment Challenges
 Computer Monitoring
 Challenges in working
conditions
 Challenges of Individuality
Other Challenges
9/8/2022 Annual Review 7
Business Ethics
 Business ethics is concerned with the numerous ethical
questions that managers must confront as part of their
daily business decision making
Technology Ethics
 Another important ethical dimension deals
specifically with the ethics of the use of any form
of technology. Four principles” Equity, Rights,
Honesty, Exercise of Corporate Power” can serve
as basic ethical requirement.
Ethical responsibility of
business professionals
9/8/2022 Annual Review 8
• We have outlined a few ethical principles
• Acting with integrity
• increasing your professional competence
• setting high standards of personal performance
• accepting responsibility for your work
• advancing the health, privacy, and general welfare of the public
Ethical Guidelines
9/8/2022 Annual Review 9
Five Moral Dimension Of Information age
9/8/2022 Annual Review 10
0
Definition : Security refers to the policies, procedures, and technical measures used to prevent unauthorized
access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and
organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its
records, and operational adherence to management standards.
Confidentiality Integrity Availability
9/8/2022 Annual Review 11
1.Confidentiality: The first objective of security is
confidentiality: keeping information away from people
who should not have it.
2.Integrity: The second objective of security is integrity.
Both confidentiality and availability contribute to
integrity..
3.Availability: The third objective of security is availability.
Availability is a broad subject addressing things such
as fault tolerance to protect against denial of service.
9/8/2022 Annual Review 12
Definition: A hacker is an individual who intends to gain unauthorized access to a computer system. Within the
hacking community, the term cracker is typically used to denote a hacker with criminal intent.
Hacker activities have broadened beyond mere system intrusion to include theft of goods and information, as well as
system damage and cybervandalism. Faking an e-mail address or Web page to trick
users & Programs that covertly search individual
packets of data.
By hammering a Web site’s an attacker can
effectively clog the systems.
A program that contains instructions that exploit
a known vulnerability in some software.
Tiny programs, sometimes written in java, that
misuse your computer’s resources, modify files
on the hard disk.
An instruction in a computer program that
triggers a malicious act.
Spoofing
and
Sniffing
Denial-
of-
Service
Attacks
Trojan
Horse
Malicious
Applets
Logic
Bombs
9/8/2022 Annual Review 13
Computer crime, a growing threat to society, is caused
by the criminal or irresponsible actions of individuals who are taking
advantage of the widespread use and vulnerability of computers and
the Internet and other network.
Hacking
and
Crackin
g
Cyber-
Theft
Cyberterrori
sm
Softwar
e
Piracy
Unauthoriz
ed Use
Intellectu
al
property
theft
Comput
er virus
or worm
Thank You

More Related Content

ID-20305090 Fahim Montasir.pptx

  • 1. Privacy, Ethics and Security- Challenges of IT Presented by Fahim Montasir ID-20305090
  • 2. 9/8/2022 Annual Review 2 Agenda  Introduction  Privacy Issues  Ethics and Ethical Responsibility  Five Dimension Of Information Age  Security and Basic Security concepts  Hackers And Hacking Tactics  Computer Crime And Crime Types
  • 3. 9/8/2022 Annual Review 3 There is no question that the use of information technology in business presents major security challenges, poses serious ethical questions, and affects society in significant ways. The use of information technologies in business has had a major impact on society and thus raises ethical issues in the areas of “’crime, privacy, individuality, employment, health, and working conditions.’’ It is important to understand that information technology has had beneficial results, as well as detrimental effects, on society and people in each of these areas Introduction
  • 4. Information technology makes it technically and economically feasible to collect, store, integrate, interchange. This characteristic has an important beneficial effect on the efficiency and effectiveness of computer-based information systems. privacy on the internet Computer matching pSome Privacy Issues Privacy laws Computer libel & Censorship
  • 5. 9/8/2022 Annual Review 5 Privacy Issues Privacy on the internet The Internet is notorious for giving its users a feeling of anonymity when in reality they are highly visible Computer Matching Computer profiling and mistakes in the computer matching of personal data are other controversial threats to privacy. Individuals have been mistakenly arrested and jailed. Privacy laws Many countries strictly regulate the collection and use of personal data by business corporations and government agencies. Computer libel and censorship The opposite side of the privacy debate- Freedom of information, speech & information Biggest battlegrounds- Weapon used in this battle -spamming -Flame mail -Libel Laws -Censorship Bulletin boards, Email boxes, Online files of internet
  • 6. 9/8/2022 Annual Review 6  Employment Challenges  Computer Monitoring  Challenges in working conditions  Challenges of Individuality Other Challenges
  • 7. 9/8/2022 Annual Review 7 Business Ethics  Business ethics is concerned with the numerous ethical questions that managers must confront as part of their daily business decision making Technology Ethics  Another important ethical dimension deals specifically with the ethics of the use of any form of technology. Four principles” Equity, Rights, Honesty, Exercise of Corporate Power” can serve as basic ethical requirement. Ethical responsibility of business professionals
  • 8. 9/8/2022 Annual Review 8 • We have outlined a few ethical principles • Acting with integrity • increasing your professional competence • setting high standards of personal performance • accepting responsibility for your work • advancing the health, privacy, and general welfare of the public Ethical Guidelines
  • 9. 9/8/2022 Annual Review 9 Five Moral Dimension Of Information age
  • 10. 9/8/2022 Annual Review 10 0 Definition : Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its records, and operational adherence to management standards. Confidentiality Integrity Availability
  • 11. 9/8/2022 Annual Review 11 1.Confidentiality: The first objective of security is confidentiality: keeping information away from people who should not have it. 2.Integrity: The second objective of security is integrity. Both confidentiality and availability contribute to integrity.. 3.Availability: The third objective of security is availability. Availability is a broad subject addressing things such as fault tolerance to protect against denial of service.
  • 12. 9/8/2022 Annual Review 12 Definition: A hacker is an individual who intends to gain unauthorized access to a computer system. Within the hacking community, the term cracker is typically used to denote a hacker with criminal intent. Hacker activities have broadened beyond mere system intrusion to include theft of goods and information, as well as system damage and cybervandalism. Faking an e-mail address or Web page to trick users & Programs that covertly search individual packets of data. By hammering a Web site’s an attacker can effectively clog the systems. A program that contains instructions that exploit a known vulnerability in some software. Tiny programs, sometimes written in java, that misuse your computer’s resources, modify files on the hard disk. An instruction in a computer program that triggers a malicious act. Spoofing and Sniffing Denial- of- Service Attacks Trojan Horse Malicious Applets Logic Bombs
  • 13. 9/8/2022 Annual Review 13 Computer crime, a growing threat to society, is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other network. Hacking and Crackin g Cyber- Theft Cyberterrori sm Softwar e Piracy Unauthoriz ed Use Intellectu al property theft Comput er virus or worm