Security and ethical challenges

388 views 80 slides Apr 11, 2020
Slide 1
Slide 1 of 80
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80

About This Presentation

Security and ethical challenges


Slide Content

Security and Ethical
Challenges

Learning Objectives
1.Identify several ethical issues in how the use of
information technologies in business affects
employment, individuality, working conditions,
privacy crime, health, and solutions to societal
problems.
2.Identify several types of security management
strategies and defences, and explain how they can
be used to ensure the security of business
applications of information technology.
3.Propose several ways that business managers and
professionals can help to lessen the harmful effects
and increase the beneficial effects of the use of
information technology.

Security and Ethics
•Major Security Challenges
•Serious Ethical Questions
•Threats to Business and Individuals
•Real World Case 1- F-Secure, Microsoft,
GM, and Verizon: The Business Challenge
of Computer Viruses
Click to go to
Case 1
K. Adisesha 3

Security and Ethics
Business/IT Security, Ethics, and Society
Employment
Health
Individuality
Privacy
Working
Conditions
Crime
Business/IT
Security
Ethics and
Society
K. Adisesha 4

Security and Ethics
•Business Ethics
•Stockholder Theory
•Social Contract Theory
•Stakeholder Theory
Ethical Responsibility
K. Adisesha 5

Security and Ethics
Ethical Responsibility
K. Adisesha 6

Security and Ethics
Technology Ethics
K. Adisesha 7

Security and Ethics
Ethical Guidelines
K. Adisesha 8

Security and Ethics
Enron Corporation: Failure
in Business Ethics
•Drove Stock Prices Higher Never
Mentioning Any Weaknesses
•Promised Much – Delivered Little
•Finally Admitted Overstated Earnings
by $586 Million in 1997
•1998 Third Quarter Loss $638 Million –
Filed Bankruptcy
•Greed and Mismanagement Destroyed a
Potentially Successful Business Plan
K. Adisesha 9

Security Management
•Security is 6 to 8% of IT Budget in
Developing Countries
•63% Have or Plan to Have Position of Chief
Privacy or Information Officer in the Next
Two Years
•40% Have a Chief Privacy Officer and
Another 6% Intend One in the Next Two
Years
•39% Acknowledge that their Systems Have
Been Compromised in the Past Year
•24% Have Cyber Risk Insurance and 5%
Intend to Acquire Such Coverage
K. Adisesha 10

Antivirus
96%
Virtual Private Networks
86%
Intrusion-Detection Systems
85%
Content Filtering/Monitoring
77%
Public-Key Infrastructure
45%
Smart Cards
43%
Biometrics
19%
Security Technology Used
Security Management
K. Adisesha 11

PayPal, Inc. Cybercrime on the
Internet
•Online Payment Processing Company
•Observed Questionable Accounts Being
Opened
•Froze Accounts Used to Buy Expensive Goods
For Purchasers in Russia
•Used Sniffer Software and Located Users
Capturing PayPal Ids and Passwords
•More than $100,000 in Fraudulent Charges
•Crooks Arrested by FBI
Security Management
K. Adisesha 12

Computer Crime
•Hacking
•Cyber Theft
•Unauthorized Use of Work
•Piracy of Intellectual
Property
•Computer Viruses and
Worms
Security Management
K. Adisesha 13

Examples of Common Hacking
Security Management
K. Adisesha 14

Recourse Technologies:
Insider Computer Crime
•Link Between Company Financial
Difficulty and Insider Computer
Crimes
•Use of “Honey Pots” Filled with
Phony Data to Attract Hackers
•Software Catches Criminal Activity
in Seconds
•Crime Exposed and Stopped
Security Management
K. Adisesha 15

Internet Abuses in the Workplace
Security Management
K. Adisesha 16

Network Monitoring Software
Security Management
K. Adisesha 17

AGM Container Controls:
Stealing Time and Resources
•The Net Contains Many Productivity
Distractions
•Remedies Include Monitoring
Internet Use and Blocking Sites
Unrelated to Work
•Importance of Telling Employees
About Monitoring
•Use of Software Monitoring Provided
Rebuttal Answers To Web Use
Discussions
Security Management
K. Adisesha 18

Copying Music CDs: Intellectual
Property Controversy
•RIAA Crack Down on Music Piracy
•Web Sites Fighting Back
•140 Million Writable Drives In Use
•Billions of Blank CDs Sold While
Music CD Sales Are Going Down
•Pirates Reluctant to Go Away
Security Management
K. Adisesha 19

Facts About Recent Computer
Viruses and Worms
Security Management
K. Adisesha 20

University of Chicago: The Nimda
Worm
•Nimda Worm Launch Sept. 18, 2001
Mass Mailing of Malicious Code
Attacking MS-Windows
•Took Advantage of Back Doors
Previously Left Behind
•In Four Hours the University of
Chicago’s Web Servers were Scanned by
7,000 Unique IP Addresses Looking for
Weaknesses
•Many Servers Had to Be Disconnected
Security Management
K. Adisesha 21

Right to Privacy
Privacy on the Internet
Acxiom, Inc. Challenges to
Consumer Privacy
•Acxiom – 30 Years Amassing
Massive Database
•Sells Data to Subscribers
•Use by Telemarketers and
Credit Firms
Privacy Issues
K. Adisesha 22

Right to Privacy
•Computer Profiling
•Computer Matching
•Privacy Laws
•Computer Libel and
Censorship
•Spamming
•Flaming
Privacy Issues
K. Adisesha 23

Other Challenges
•Employment Challenges
•Working Conditions
•Individuality Issues
•Health Issues

Privacy Issues
K. Adisesha 24

Ergonomics
Privacy Issues
K. Adisesha 25

Ergonomics
•Job Stress
•Cumulative Trauma
Disorders (CTDs)
•Carpal Tunnel Syndrome
•Human Factors
Engineering
•Societal Solutions
Privacy Issues
K. Adisesha 26

Security Management of
Information Technology
•Business Value of Security
Management
•Protection for all Vital Business
Elements
Real World Case 2-
Geisinger Health Systems and Du
Pont: Security Management of Data
Resources and Process Control
Networks
Click to go to
Case 2
K. Adisesha 27

Security Management of
Information Technology
Tools of Security Management

Security Management of
Information Technology
•Need for Security Management Caused by
Increased Use of Links Between Business
Units
•Greater Openness Means Greater
Vulnerabilities
•Better Use of Identifying, Authenticating
Users and Controlling Access to Data
•Theft Should Be Made as Difficult as Possible
Providence Health and Cervalis:
Security Management Issues
K. Adisesha 29

Security Management of
Information Technology
•Encryption
–Public Key
–Private Key
Graphically…
Internetworked Security Defenses
K. Adisesha 30

Encryption
Security Management of
Information Technology
K. Adisesha 31

Firewalls
Security Management of
Information Technology
Firewall
Intranet
Server
Firewall
Router Router
Intranet
Server
Host
System
Internet
1
2
3
4
4 5
1
External Firewall
Blocks Outsiders
2
Internal Firewall
Blocks Restricted
Materials
3
Use of Passwords
and Browser Security
4
Performs
Authentication and
Encryption
5
Careful Network
Interface Design
K. Adisesha 32

Security Management of
Information Technology
•Worldwide Search for Active IP
Addresses
•Sophisticated Probes Scan Any Home
or Work Location
•Personal Firewalls Help Block
Intruders
•Firewalls Generally Good at
Protecting Computers from Most
Hacking Efforts
Barry Nance: Testing PC
Firewall Security
K. Adisesha 33

Security Management of
Information Technology
•MTV.com Website Targeted for Distributed
Denial of Service (DDOS) Attacks During Fall
Peak Periods
•Some People Try to Crash MTV Sites
•Parent Viacom Installed Software to Filter out
DDOS Attacks
•Website Downtime Reduced
MTV Networks: Denial of
Service Defenses
K. Adisesha 34

Defending Against Denial of
Service Attacks
Security Management of
Information Technology
K. Adisesha 35

Security Management of
Information Technology
•e-Sniff Monitoring Device Searches
e-Mail by Key Word or Records of
Web Sites Visited
•82% of Businesses Monitor Web Use
•Close to 100% of Workers Register
Some Improper Use
Sonalysts, Inc.: Corporate e-Mail
Monitoring
K. Adisesha 36

Security Management of
Information Technology
•Much Software Was Unable to Stop
Nimda Worm
•Software Alone is Often Not Enough
to Clean System
•Until Better Software is Developed,
A Complete System Disconnect and
Purge May Be the Only Solution
TrueSecure and 724 Inc.:
Limitations of Antivirus Software
K. Adisesha 37

Example Security Suite Interface
Security Management of
Information Technology
K. Adisesha 38

Other Security Measures
Security Management of
Information Technology
•Security Codes
•Multilevel Password System
–Smart Cards
•Backup Files
–Child, Parent, Grandparent Files
•System Security Monitors
•Biometric Security
K. Adisesha 39

Example Security Monitor
Security Management of
Information Technology
K. Adisesha 40

Evaluation of Biometric
Security
Security Management of
Information Technology
K. Adisesha 41

Computer Failure Controls
Security Management of
Information Technology
•Fault Tolerant Systems
–Fail-Over
–Fail-Safe
–Fail-Soft
•Disaster Recovery
K. Adisesha 42

Methods of Fault Tolerance
Security Management of
Information Technology
K. Adisesha 43

Visa International: Fault
Tolerant Systems
Security Management of
Information Technology
•Only 100% Uptime is Acceptable
•Only 98 Minutes of Downtime in 12
Years
•1 Billion Transactions Worth $2
Trillion in Transactions a Year
•4 Global Processing Centers
•Multiple Layers of Redundancy and
Backup
•Software Testing and Art Form
K. Adisesha 44

Systems Controls and
Audits
•Information System Controls
•Garbage-In, Garbage-Out
(GIGO)
•Auditing IT Security
•Audit Trails
•Control Logs
K. Adisesha 45

Systems Controls and
Audits
Security Codes
Encryption
Data Entry Screens
Error Signals
Control Totals
Security Codes
Encryption
Control Totals
Control Listings
End User Feedback
Security Codes
Encryption
Backup Files
Library Procedures
Database Administration
Input
Controls
Output
Controls
Storage
Controls
Processing
Controls

Software Controls
Hardware Controls
Firewalls
Checkpoints
K. Adisesha 46

Summary
•Ethical and Societal
Dimensions
•Ethical Responsibility in
Business
•Security Management
K. Adisesha 47

KEY TERMS
Antivirus software
Audit trail
Auditing business systems
Backup files
Biometric security
Business ethics
Computer crime
Computer matching
Computer monitoring
Computer virus
Denial of service
Disaster recovery
Encryption
Ergonomics
Ethical and Societal Impacts of
business/IT
a.Employment
b.Health
c.Individuality
d.Societal Solutions
e.Working Conditions
Ethical foundations
Fault tolerant
Firewall
Flaming
Hacking
Information system controls
Intellectual property piracy
Passwords
Privacy issues
Responsible professional
Security management
Software piracy
Spamming
System security monitor
Unauthorized use
K. Adisesha 48

Real World Case 1
The Business
Challenge of Computer Viruses
Click to go to
Case 1
Real World Case 2
Security Management of Data
Resources and Process Control
Networks
Click to go to
Case 2
Optional Case Studies
Real World Case 3
Security Management of Windows
Software
Real World Case 4
Managing Network Security Systems
Click to go to
Case 3
Click to go to
Case 4
K. Adisesha 49

Enterprise and Global
Management of Information
Technology
K. Adisesha 50

1- What security measures should
companies, business professionals,
and consumers take to protect their
systems from being damaged by
computer worms and viruses?
The Business
Challenge of Computer Viruses
K. Adisesha 51

The Business
Challenge of Computer Viruses
•Businesses Should
–“Get Serious” About Cyber Security
–Stop Relying on Microsoft 's Backbone
•Businesses Need Better Procedures
for Security Updating
•Businesses Should Update Security
Defenses
Discussion Points Would Include:
K. Adisesha 52

2- What is the business and ethical
responsibility of Microsoft in
helping to prevent the spread of
computer viruses? Have they met
this responsibility? Why or why
not?
The Business
Challenge of Computer Viruses
K. Adisesha 53

The Business
Challenge of Computer Viruses
Microsoft (95% Market Share)
Must Ensure Software is Hostile to Hackers
Must Write Better Software
Microsoft and Others Must make Security
Higher Priority
The Responsibility of Security is the User
Not Bender
Discussion Points Would Include:
K. Adisesha 54

3- What are several possible reasons
why some companies (like GM)
were seriously affected by computer
viruses, while others (like Verizon)
were not?
The Business
Challenge of Computer Viruses
Return to
Cases Page
K. Adisesha 55

The Business
Challenge of Computer Viruses
•Undue Dependence on Microsoft for
Quality Software
•GM Ignored Security until It was Too Late
•Companies Paid More Attention to
Bottom Line than Security
Reasons Would Include:
Return to
Cases Page
K. Adisesha 56

The Business
Challenge of Computer Viruses
•Undue Dependence on Microsoft for
Quality Software
•GM Ignored Security until It was Too Late
•Companies Paid More Attention to Bottom
Line than Security
•Inadequate Planning for Improving
Security
Reasons Would Include:
Return to
Cases Page
K. Adisesha 57

Security Management of Data Resources
and Process Control Networks
1- What are several possible reasons
why some companies (like GM)
were seriously affected by computer
viruses, while others (like Verizon)
were not?
Return to
Cases Page
K. Adisesha 58

Security Management of Data Resources
and Process Control Networks
•Key Components of a Security
System:
–Understanding Workflow
–Assessing Risk
–Educating Users
•MvChart needed Installed on
Hardware Separate from EMK
system
Discussion Points Would Include:
K. Adisesha 59

Security Management of Data Resources
and Process Control Networks
•Biometric and Proximity Devices
Streamline Secure Network Access
•Requiring Caregivers Access to Patient
Information via the Internet Using:
–Electronic Token Identification
–A Virtual Private Network
•Other Encryption Methods
Discussion Points Would Include:
K. Adisesha 60

Security Management of Data Resources
and Process Control Networks
2- What security measures is Du
Pont taking to protect their process
control networks? Are these
measures adequate? Explain your
evaluation.
K. Adisesha 61

Security Management of Data Resources
and Process Control Networks
•Du Pont Co.-The Critical
Manufacturing Processes, will
Isolate Process Systems from
Business systems by:
–Not Connecting our Networks,
–Or it will Add Firewalls to Control
Access
Discussion Points Would Include:
K. Adisesha 62

Security Management of Data Resources
and Process Control Networks
•A Team-IT Staffers, Process-Control Engineers,
and Manufacturing Employees was Established
to:
–Discern Control Devices Critical to Manufacturing,
Safety and Continuity of Production
–Identify Assets of – Hardware, Data, and Software
Applications
–Testing Fixes and Workarounds for Specific
Machines
–Recognizing Precise Vulnerabilities Differ by
Environment
–Determining how to Separate Networks
Discussion Points Would Include:
K. Adisesha 63

Security Management of Data Resources
and Process Control Networks
3- What are several other steps
Geisinger and Du Pont could take
to increase the security of their
data and network resources?
Explain the value of your
proposals.
Return to
Cases Page
K. Adisesha 64

Security Management of Data Resources
and Process Control Networks
Include the Concepts Presented
in the Chapter Material and
Additional Considerations That
You Have Located on the
Internet
Discussion Points Would Include:
Return to
Cases Page
K. Adisesha 65

1- What security problems are
typically remedied by Microsoft’s
security patches for Windows? Why
do such problems arise in the first
place?
Return to
Cases Page
Security Management of Windows
Software
K. Adisesha 66

Security Management of Windows
Software
•Vulnerability to Computer Viruses
(Worms)
•Microsoft’s Push to Deliver New
Versions
–That have not been tested and/or
•Designed Properly to Reduce
Vulnerability
Discussion Points Would Include:
K. Adisesha 67

2- What challenges does the process
of applying Windows patches pose
for many businesses? What are
some limitations of the patching
process?
Security Management of Windows
Software
K. Adisesha 68

Security Management of Windows
Software
•Patching Required Companies to
Drop Everything with Finite
Resources
•Larger Companies Need Time to
Properly Test
•Companies Faced with Limited
Scope for Downtime
Discussion Points Would Include:
K. Adisesha 69

3- Does the business value of
applying Windows patches outweigh
its costs, limitations, and the
demands it places on the IT
function? Why or why not?
Security Management of Windows
Software
Return to
Cases Page
K. Adisesha 70

Security Management of Windows
Software
•Exploit-Proof Code Patching is Best Strategy
•Microsoft’s Windows Update Patch Management
Program
–Has a Critical Shortcoming
–Could Fool Users-They have Been Properly Patched
–Users are Really Vulnerable-Patch not Fixed
•Users have Reported Patches don't Always Deploy
Properly
Discussion Points Would Include:
Return to
Cases Page
K. Adisesha 71

Security Management of Windows
Software
•Exploit-Proof Code Patching is Best Strategy
•Microsoft’s Windows Update Patch Management
Program
–Has a Critical Shortcoming
–Could Fool Users-They have Been Properly Patched
–Users are Really Vulnerable-Patch not Fixed
•Users have Reported Patches don't Always Deploy
Properly
•Microsoft Patches have Serious Security
Vulnerability
Discussion Points Would Include:
Return to
Cases Page
K. Adisesha 72

1- What is the function of each of the
network security tools identified in
this case? Visit the websites of
security firms Check Point and
NetForensics to help you answer.
Return to
Cases Page
Managing Network Security
Systems
K. Adisesha 73

Managing Network Security
Systems
•Network Intrusion-Detection Systems
•Firewalls
•Anti-Virus Tools
•Automating the Process
–Gathering
–Consolidating
–Correlating
–Prioritizing Data from Security Event
•Collecting Data from Individual Security Systems
•“Normalizing” Data to Quickly Identify Potential
Attacks
Discussion Points Would Include:
K. Adisesha 74

2- What is the value of security
information management software
to a company? Use the companies in
this case as examples.
Managing Network Security Systems
K. Adisesha 75

Managing Network Security Systems
•Provides a Single Place To Get Information
•Automated Gathering, Consolidating, and
Correlating Data
–Into a Usable Format to Analyze
–Used to Establish Priorities
•Permits Businesses to React Faster to Activity
•Reduces the Number of False Alerts
•Allows Companies to Drill Down into Attach
Details
Discussion Points Would Include:
K. Adisesha 76

3- What can smaller firms who
cannot afford the cost of such
software do to properly manage
and use the information about
security from their network
security systems? Give several
examples.
Managing Network Security Systems
Return to
Cases Page
K. Adisesha 77

Managing Network Security Systems
•Plan for Having Periodic Audits of IT
Security
•Review/Update Regularly Control
Features of IT
•Regularly Change Passwords-To Access
System
•Develop a Backup Plan and Implement
Discussion Points Would Include:
Return to
Cases Page
K. Adisesha 78

Managing Network Security
Systems
•Plan for Having Periodic Audits of IT
Security
•Review/Update Regularly Control Features
of IT
•Regularly Change Passwords-To Access
System
•Develop a Backup Plan and Implement
•Develop Plan for Disaster Recovery
Discussion Points Would Include:
Return to
Cases Page
K. Adisesha 79

Security and Ethical Challenges
Thank you
K. Adisesha 80