X

Download Information Systems Ethics Computer Crime Security PowerPoint Presentation

SlidesFinder-Advertising-Design.jpg

Login   OR  Register
X


Iframe embed code :



Presentation url :

Home / Computers & Web / Computers & Web Presentations / Information Systems Ethics Computer Crime Security PowerPoint Presentation

Information Systems Ethics Computer Crime Security PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

PowerPoint is the world's most popular presentation software which can let you create professional Information Systems Ethics Computer Crime Security powerpoint presentation easily and in no time. This helps you give your presentation on Information Systems Ethics Computer Crime Security in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Information Systems Ethics Computer Crime Security powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by slidefu in Computers & Web ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more.

About This Presentation

Information Systems Ethics Computer Crime Security Presentation Transcript

Slide 1 - Information Systems Ethics, Computer Crime, and Security
Slide 2 - Objectives Understand how computer ethics affects IS Understand information privacy, accuracy, property, and accessibility Understand types of computer crime Understand the terms virus, worm, Trojan horse, and logic or time bomb Understand computer security
Slide 3 - Information Systems Ethics Toffler’s three waves of change Agriculture Industrial Revolution Information Age
Slide 4 - Information Systems Ethics COMPUTER LITERACY Knowing how to use a computer DIGITAL DIVIDE That gap between those with computer access and those who don’t have it COMPUTER ETHICS Standards of conduct as they pertain to the use of information systems
Slide 5 - Information Systems Ethics PRIVACY Protecting one’s personal information IDENTITY THEFT Stealing of another’s social security number, credit card number, or other personal information
Slide 6 - Information Systems Ethics INFORMATION ACCURACY Deals with authentication and fidelity of information INFORMATION PROPERTY Deals with who owns information about individuals and how information can be sold and exchanged
Slide 7 - ppt slide no 7 content not found
Slide 8 - Information Systems Ethics INFORMATION ACCESSIBILITY Deals with what information a person has the right to obtain about others and how the information can be used ISSUES IN INFORMATION ACCESSIBILITY Carnivore: software application designed to be connected to Internet Service Providers’ computers and eavesdrops on all communications. Electronic Communications Privacy Act (ECPA): it offered stronger support for voice mail than it did for e-mail. No other laws at federal or state levels protect e-mail privacy Monitoring e-mail
Slide 9 - Information Systems Ethics The need for a code of ethical conduct Business ethics Plagiarism Cybersquatting: registering a domain name and then trying to sell the name for big bucks to a person, company. Domain names are a scarce resource - one of the few scarce resources in cyberspace
Slide 10 - Computer Crime Definition: the act of using a computer to commit an illegal act Authorized and unauthorized computer access Examples Stealing time on company computers Breaking into government Web sites Stealing credit card information
Slide 11 - Computer Crime Federal and State Laws Stealing or compromising data Gaining unauthorized computer access Violating data belonging to banks Intercepting communications Threatening to damage computer systems Disseminating viruses
Slide 12 - Computer Crime Hacking and Cracking Hacker - one who gains unauthorized computer access, but without doing damage Cracker - one who breaks into computer systems for the purpose of doing damage
Slide 13 - Computer Crime Who commits computer crime?
Slide 14 - Computer Crime Types of Computer Crime Data diddling: modifying data Salami slicing: skimming small amounts of money Phreaking: making free long distance calls Cloning: cellular phone fraud using scanners Carding: stealing credit card numbers online Piggybacking: stealing credit card numbers by spying Social engineering: tricking employees to gain access Dumpster diving: finding private info in garbage cans Spoofing: stealing passwords through a false login page
Slide 15 - Computer Crime Software Piracy North America - 25% Western Europe - 34% Asia / Pacific - 51% Mid East / Africa - 55% Latin America - 58% Eastern Europe - 63%
Slide 16 - Computer Crime Computer viruses and destructive code Virus - a destructive program that disrupts the normal functioning of computer systems Types : Worm: usually does not destroy files; copies itself Trojan horses: Activates without being detected; does not copy itself Logic or time bombs: A type of Trojan horse that stays dormant for a period of time before activating
Slide 17 - Computer Security Computer Security - precautions taken to keep computers and the information they contain safe from unauthorized access
Slide 18 - Computer Security Recommended Safeguards Implement a security plan to prevent break-ins Have a plan if break-ins do occur Make backups! Only allow access to key employees Change passwords frequently Keep stored information secure Use antivirus software Use biometrics for access to computing resources Hire trustworthy employees
Slide 19 - Computer Security Encryption - the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer
Slide 20 - Computer Security How encryption works Symmetric secret key system Both sender and recipient use the same key Key management can be a problem Public key technology A private key and a public key Certificate authority To implement public-key encryption on a busy Web site, requires a more sophisticated solution. A third party, called certificate authority, is used. A trusted middleman verifies that a Web site is a trusted site (provides public keys to trusted partners) Secure socket layers (SSL), developed by Netscape, is a popular public-key encryption method
Slide 21 - Computer Security Other encryption approaches Pretty good privacy (PGP) Phil Zimmerman Clipper Chip: a chip that could generate uncrackable codes. There was a flaw.
Slide 22 - Computer Security Internet Security Firewall - hardware and software designed to keep unauthorized users out of network systems
Slide 23 - Computer Security
Slide 24 - Computer Security Virus prevention Install antivirus software Make backups Avoid unknown sources of shareware Delete e-mails from unknown sources If your computer gets a virus…
Slide 25 - Computer Security How to maintain your privacy online Choose Web sites monitored by privacy advocates Avoid “cookies” Visit sites anonymously Use caution when requesting confirming e-mail
Slide 26 - Computer Security Avoid getting conned in cyberspace Internet auctions Internet access International modem dialing Web cramming Multilevel marketing (pyramid schemes) Travel/vacations Business opportunities Investments Health-care products
Slide 27 - ppt slide no 27 content not found