Chapter_11-Security%20and%20Ethical%20Challenges

Chapter_11-Security%20and%20Ethical%20Challenges - 2008...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 2008 Francisco Delgadillo 2008 Francisco Delgadillo 1 Security and Ethics in Information Systems Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property, Viruses, Worms, Adware, Spyware, Privacy Issues, Spamming, Computer Monitoring Ethical Responsibility Business professionals have a responsibility to promote ethical uses of information technology in the workplace. Principles of Technology Ethics Proportionality the good achieved by the technology must outweigh the harm or risk Informed Consent those affected by the technology should understand and accept the risks Principles of Technology Ethics Justice the benefits and burdens of the technology should be distributed fairly Minimized Risk even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk Computer Crime The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources The unauthorized release of information Computer Crime Using or conspiring to use computer or network resources illegally to obtain information or tangible property 2008 Francisco Delgadillo 2 Hacking The unauthorized access and use of networked computer systems Common Hacking Tactics Denial of service (attack) Hammering a websites equipment with too many requests for information Scans Widespread probes of the Internet to determine types of computers, services, and connections Common Hacking Tactics Sniffer Programs that search individual packets of data as they pass through the Internet Spoofing Faking an e-mail address to trick users into passing along critical information like passwords or credit card numbers Common Hacking Tactics Trojan Horse A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software Back Doors A hidden point of entry to be used in case the original entry point has been detected or blocked Common Hacking Tactics Malicious Applets Tiny Java programs that misuse your computers resources, modify files on the hard disk, send fake e-mail, or steal...
View Full Document

This note was uploaded on 02/27/2011 for the course ISQS 2340 taught by Professor Staff during the Spring '08 term at Texas Tech.

Page1 / 8

Chapter_11-Security%20and%20Ethical%20Challenges - 2008...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online