This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: © 2008 Francisco Delgadillo © 2008 Francisco Delgadillo 1 Security and Ethics in Information Systems Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property, Viruses, Worms, Adware, Spyware, Privacy Issues, Spamming, Computer Monitoring Ethical Responsibility • Business professionals – have a responsibility to promote ethical uses of information technology in the workplace. Principles of Technology Ethics • Proportionality – the good achieved by the technology must outweigh the harm or risk • Informed Consent – those affected by the technology should understand and accept the risks Principles of Technology Ethics • Justice – the benefits and burdens of the technology should be distributed fairly • Minimized Risk – even if judged acceptable by the other three guidelines, the technology must be implemented so as to avoid all unnecessary risk Computer Crime • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources • The unauthorized release of information Computer Crime • Using or conspiring to use computer or network resources illegally to obtain information or tangible property © 2008 Francisco Delgadillo 2 Hacking • The unauthorized access and use of networked computer systems Common Hacking Tactics • Denial of service (attack) – Hammering a website’s equipment with too many requests for information • Scans – Widespread probes of the Internet to determine types of computers, services, and connections Common Hacking Tactics • Sniffer – Programs that search individual packets of data as they pass through the Internet • Spoofing – Faking an e-mail address to trick users into passing along critical information like passwords or credit card numbers Common Hacking Tactics • Trojan Horse – A program that, unknown to the user, contains instructions that exploit a known vulnerability in some software • Back Doors – A hidden point of entry to be used in case the original entry point has been detected or blocked Common Hacking Tactics • Malicious Applets – Tiny Java programs that misuse your computer’s resources, modify files on the hard disk, send fake e-mail, or steal...
View Full Document
- Spring '08
- Common Hacking Tactics, Francisco Delgadillo