MIS 601: Information Systems Management: Security and Ethical Challenges
MIS 601: Information Systems Management: Security and Ethical Challenges
MIS 601: Information Systems Management: Security and Ethical Challenges
Contents: Ethical and Security impacts on Society Ethical responsibilities of Business Professionals Computer Crime Internet abuses at work place Hacking Software Piracy issues Computer Viruses and Worms Cyber Theft
Health
Crime
Individuality
Working Conditions
Computer Crime
Its a growing threat to society caused by criminal or irresponsible actions of individuals who take advantages of the widespread use and vulnerability of computers and the Internet & other networks.
Cyber Theft
Many computer Crimes involve the theft of money. Mostly cyber thefts involve an insider from the organisation. Eg Russian Hacker Vladimir Levin CITIBANK $ 11 millions
Software Piracy
This is the major form of Software Theft. Software Publishers Association is an industry association of Software Developers used in major Corporations in the States. NASSCOM in India. Software packages are protected by the Computer Software Piracy and Counterfeiting Amendment Law in the USA.
Computer Viruses
Resident Virus:
These viruses reside in the Boot sector of the Computer Hard disk. They can be copied from there to any other floppy disk etc inserted into the infected computer.
.Exe Virus:
These viruses come attached with files such as a Words Document (with Macro) or any other EXE files.
Security Management of IT List of Contents: Need for Security Management? Properties of Secure Communications. Security management Techniques: Encryption
Symmetric Encryption Asymmetric Encryption
Security Management of IT
The Goal of Security Management is the accuracy, integrity and safety of all Information system Processes & resources. The objectives of Security Management is to : Reduce Errors Reduce Frauds Minimize Losses in Information Systems
Network and Internet Security: Following are the desirable properties of Secure Communications:Confidentiality Authentication Message Integrity and Non Repudiation Availability and Access Control
Virus Defenses
Encryption :
Encryption has become an important way to protect data. Passwords, messages, files etc are transmitted in scrambled format and unscrambled by computer. Encryption involves using special mathematical algorithms or keys to transform digital data into a scrambled code before they are transmitted and to decode the data when they are received at the other end.
Encryption :
A Strong Encryption Algorithm. Sender and receiver must have obtained the keys in a secure manner.
Example of Algorithm DES (Digital Encryption Standard) 1977 (56 bit Key)
It is computationally infeasible to determine the decryption key given only the knowledge of the cryptographic algorithm and the encryption key. For most public key schemes, either of the two related keys can be used for encryption, the other can be used for decryption.
Firewalls
A network firewall can be a communication processor (like router) or a dedicated server along with firewall software. A firewall serves as a Gatekeeper system that protects a companys internets and other computer networks from intrusion by providing a filter and a safe transfer point for access to & from the Internet and other networks. It screens all network traffic for proper passwords or other security codes and allows unauthorized transmissions in & out of the network.
Firewalls
Internal company data servers Internal Firewall Prevents users From accessing Company PCs Sensitive data External Firewall Examines each packet and discards some types of requests.
Internet
Firewall types
External Firewalls keeps out unauthorized Internet users. Internal Firewalls prevents users from accessing sensitive Human Resources or Firewall Data. Passwords and Browser Security features control access to specific Intranet resources. Intranet server features provide authentication and encryption where applicable. Network Interface Software is carefully crafted to avoid creating security holes to back end resources.
Types of Firewalls
Filtering decisions are based on : IP source or destination address TCP or UDP source and destination port ICMP message types
Virus Defenses
Many companies are building defenses against spread of viruses by centralising the distribution & updating of antivirus software as responsibilities of IS departments. Other companies are outsourcing Virus Protection responsibilities to ISP or Security Management Companies.