Chapter 9

Chapter 9 - Chapter 9 Security, Privacy and Ethical Issues...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 9 Chapter 9 Security, Privacy and Ethical Issues in Information Systems and the Internet
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Computer Crime and Security Computer Crime and Security Survey 2007 (CSI/FBI) Survey 2007 (CSI/FBI) Key findings are included in the following link: http://i.cmpnet.com/v2.gocsi.com/pdf/CSISurve Based on 494 respondents.
Background image of page 2
3 InformationWeek 2006 Security Survey InformationWeek 2006 Security Survey http://www.continuitycentral.com/news0267 Out of 2193 respondents: 57% of the surveyed companies hit by viruses 34% by worm 15% by denial of service 9% experienced network attacks 5% experienced ID attack Only about one third has a chief security officer
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 InformationWeek 2007 Security InformationWeek 2007 Security Survey Survey http://www.informationweek.com/news/show According to 37% of the respondents, No. 1 tactical security priority is creating and enhancing user awareness of security policies.
Background image of page 4
5 Six Secrets of Highly Secure Six Secrets of Highly Secure According to the survey by cio.com Spend more (>14% of IT budget) Separate information security from IT Conduct a penetration test Create a comprehensive risk assessment process to classify and prioritize threats and vulnerabilities. Define your overall security architecture. Establish a quarterly review process
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Computer Waste and Mistakes Computer Waste and Mistakes Computer waste The inappropriate use of computer technology and resources Computer-related mistakes Errors, failures, and other computer problems that make computer output incorrect or not useful
Background image of page 6
7 Computer Waste Computer Waste Discarding of technology Unused systems Personal use of corporate time and technology Spam (Junk email)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Computer-Related Mistakes Computer-Related Mistakes Mistakes can be caused by unclear expectations and a lack of feedback A programmer might develop a program that contains errors A data-entry clerk might enter the wrong data
Background image of page 8
9 Preventing Computer-Related Preventing Computer-Related Waste and Mistakes Waste and Mistakes Establishing policies and procedures Implementing policies and procedures Monitoring policies and procedures Reviewing policies and procedures
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Implementing Policies and Implementing Policies and Procedures Procedures Table 9.3: Useful Policies to Eliminate Waste and Table 9.3: Useful Policies to Eliminate Waste and
Background image of page 10
11 Computer Crime Computer Crime The computer as a tool to commit crime The computer as the object of the crime
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Computer as a Tool to The Computer as a Tool to Commit Crime Commit Crime Criminals need two capabilities to commit most computer crimes: Knowing how to gain access to the computer system Password sniffer (Brute (PC based), Passfinder (Mac based), and Crack V4.1 (Unix based)). Social engineering
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 44

Chapter 9 - Chapter 9 Security, Privacy and Ethical Issues...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online