Power points - Chapter 3 Ethics, Privacy, and Information...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethics, Privacy, and Information Security Chapter 3
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Security Most new information is digital Cyber Security Annual amount of new information is immense new information in 2006 was 3 million times information in all books ever written ~ 161 Exabytes (1 Exabyte ~ 1.07 billion gigabytes) by 2010 annual amount of new information estimated at 1000 Exabytes More Information of Value Personally Identifiable Information is valuable What is your ID worth on the Internet?
Background image of page 2
Information Security Safeguarding information assets of an organization Risks to Information Security activities/events that can compromise, alter, destroy or use of information without authorization. Unintentional/natural acts Flooding, Fires, Hardware/Software Failure Intentional/malicious acts Disgruntled employees, hackers, organized crime Malware, social engineering, and other attacks
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Threats to Information Security
Background image of page 4
Information Security Mitigating the risks employees are able to identify sensitive business information. employees understand the information security procedures and information security controls of the company. procedures and controls are frequently monitored to ensure compliance. Up-to-date patches, use of anti-malware programs, adequate access controls
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Protecting Privacy Need to balance… Your right to  privacy Society’s need  to know against
Background image of page 6
Protecting Privacy Information privacy – the right to determine when, and to what extent, information can be gathered about you and communicated to others The right of privacy is not absolute . Privacy must be balanced against the needs of society The public’s right to know is superior to the individual’s right of privacy.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Protecting Privacy Information technologies and concerns about security are impacting our privacy. Electronic Surveillance - are your online activities being monitored? Do employers have the right to monitor employees’ computer activities? Can SDSU monitor your email?
Background image of page 8
Who keeps track of you? Utility companies Employers Medical records University records Supermarkets Government agencies (IRS, Census, Social Security, etc.) Is the information correct and how is it being used? How personal is your information? Have you ordered pizza lately?
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Security Regulations Federal Regulations Graham-Leach-Bliley Act of 1999 Regulated how financial institutions could share your financial information Requires annual notice of information sharing policy Gave consumers right to “opt-out,” or disallow banks from sharing their personal financial information Prohibited “pretexting” Health Insurance Portability and Accountability Act of 1996 (HIPAA) a set of regulations requiring doctors, hospitals and other health care providers to provide safeguards that ensure the confidentiality
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/04/2008 for the course IDS 180 taught by Professor Clague during the Spring '08 term at San Diego State.

Page1 / 44

Power points - Chapter 3 Ethics, Privacy, and Information...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online