Social and Profeesional Issues 2
Social and Profeesional Issues 2
Social and Profeesional Issues 2
z
SOCIAL AND
PROFEESIONA
L ISSUES
z
Improving Corporate Ethics
Identify Alternatives
- During this stage of decision making, it is ideal to enlist the
help of others, including stakeholders, to identify several
alternative solutions to the problem. Brainstorming with others
will increase your chances of identifying a broad range of
alternatives and determining the best solution
Evaluate and Choose an Alternative
- Once a set of alternatives has been identified, the group
must evaluate them based on numerous criteria, such as
effectiveness at addressing the issue, the extent of risk
associated with each alternative, cost, and time to implement.
Philosophers have developed many approaches to ethical
decision making. Four common philosophies are:
Implement the Decision
- Once an alternative is selected, it should be implemented in
an efficient, effective, and timely manner. This is often much
easier said than done, because people tend to resist change.
In fact, the bigger the change, the greater the resistance to it.
Communication is the key to helping people accept a change.
CERTIFICATION
it can set forth the general rights and responsibilities of all IT users, establish
boundaries of acceptable and unacceptable behavior, and enable management to
punish violators.
Compliance
Compliance means to be in accordance with established policies, guidelines,
specifications, or legislation. In the legal system, compliance usually refers to behavior
in accordance with legislation—such as the Sarbanes–Oxley Act of 2002, which
established requirements for internal controls to govern the creation and
documentation of accurate and complete financial statements , or the U.S. Health
Insurance Portability and Accountability Act of 1996 (HIPAA), which requires employers
to ensure the security and privacy of employee healthcare data.
• Increasing complexity
• higher computer user expectations
• expanding and changing systems
• increased reliance on software with known vulnerabilities
Increasing Complexity Increases Vulnerability
Today, time means money, and the faster computer users can
solve a problem, the sooner they can be productive.
Expanding and Changing Systems Introduce New Risks
Types of Exploits
Viruses - virus is a piece of programming code, usually disguised as something else, that causes a
computer to behave in an unexpected and usually undesirable manner.
Worms - Unlike a computer virus, which requires users to spread infected files to other users, a
worm is a harmful program that resides in the active memory of the computer and duplicates itself.
Trojan Horses - is a program in which malicious code is hidden inside a seemingly harmless
program. The program’s harmful payload might be designed to enable the hacker to destroy hard
drives, corrupt files, control the computer remotely, launch attacks against other computers, steal
passwords or Social Security numbers, or spy on users by recording keystrokes and transmitting
them to a server operated by a third party.
Spam - is the abuse of email systems to send unsolicited email to large numbers of people.
Distributed Denial-of-Service (DDoS) Attacks - is one in which a malicious hacker takes over
computers via the Internet and causes them to flood a target site with demands for data and other
small tasks.
Rootkits - is a set of programs that enables its user to gain administrator-level access to a computer
without the end user’s consent or knowledge.
Phishing - is the act of fraudulently using email to try to get the recipient to reveal personal data.
Spear-phishing - is a variation of phishing in which the phisher sends fraudulent emails to
a certain organization’s employees.
Smishing - is another variation of phishing that involves the use of Short Message Service
(SMS) texting.
Vishing - s similar to smishing except that the victims receive a voice mail telling them to
call a phone number or access a Web site.