Professional Documents
Culture Documents
Tyler Olson/Shutterstock.com
Discuss:
Barone Firenze/Shutterstock.com
What are some of the problems that IS can create What do companies need to do to avert problems What do individuals need to do to protect identity
Copyright 2012 Nelson Education Ltd. 2-2
2-3
2-4
Computer-related mistakes:
System does not work properly Incorrect results Wasted hw and sw investment
PozitivStudija/Shutterstock.com
2-5
Spam filter:
Lawrence Cruciana/Shutterstock.com
2-6
2-7
Kletr/Shutterstock.com
2-8
2-9
Augusto Cabral/Shutterstock.com
Computer Crime
Undelivered merchandise or non-payment Identity theft Credit card fraud Auction fraud
Tyler Olson/Shutterstock.com
2-10
Dumpster diving:
Larry Powell/Shutterstock.com
2-11
Cyberterrorism
CCIRC
Canadian Cyber Incident Response Centre
IMPACT
International Multilateral Partnership Against Cyber Terrorism
Threats:
From other states
hornyak/Shutterstock.com
Targets
Infrastructure Communications Network Major installations
Copyright 2012 Nelson Education Ltd. 2-12
Identity Theft
Personal information compromised
Phishing (asking by e-mail) Vishing (asking by phone) Stolen from a company
Example: Sony Playstation
Purpose
Steal from bank account Use of credit card Access to personal services
2-13
Internet Gambling
$21 billion in 2010 20% per annum growth rate Source of income for governments
BUT what will happen if governments start taxing gambling in their jurisdiction?
2-14
2-15
2-16
2-17
Script bunny:
Automates the job of crackers
Insider:
Employee who comprises corporate systems
2-18
Trojan horse which triggers when a specific condition occurs Enables hacker to gain administrator-level access
Malicious program that disguises itself as an application or game Modified version of a virus created by amending original code File that attaches itself to other files and replicates itself repeatedly Parasitic program like a virus, but does not infect other programs
Copyright 2012 Nelson Education Ltd. 2-19
Other Dangers
Spyware:
Form of Trojan horse Can capture keystrokes
Password sniffer:
cg-art/Shutterstock.com
BSA
Business Software Alliance
Klara Viskova/Shutterstock.com
Patent infringement:
Use of anothers patent
2-21
2-22
2-23
Intrusion Detection
Intrusion
Unauthorized users Too many attempts
Security Dashboard
Threats, exposures, compliance, alerts
Outsourcing
Managed Security Service Providers (MSSPs)
Copyright 2012 Nelson Education Ltd. 2-24
2-25
2-26
2-27
Albert Lozano/Shutterstock.com
2-28
Social networks:
Facebook, MySpace Caution about what you post and privacy settings
Tish1/Shutterstock.com
2-29
Individuals:
Information Can Be Posted Anonymously Or With False Names
2-30
2-31
2-32
Business
Expansion from local markets to global markets Creation of new jobs through reengineering Closer contact with the customer via the Internet
2-33
Health Concerns
Occupational stress Seated immobility thromboembolism (SIT) Carpal tunnel syndrome (CTS) Legislation
San Francisco: Video display terminal (VDT) bill
For employees who are at VDTs more than 4 hrs per day 15 minute breaks every 2 hours
2-34
2-35
2-36
Summary of Principles
Establish policies and procedures to avoid computer waste and mistakes Be aware of the risks of computer crime Design jobs, equipment and work conditions so that negative health effects are avoided Be familiar with and practice the code of ethics to which your profession subscribes
2-37