Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
By: Nitesh Verma Btech Hons MBA IT Section 150 Roll No. 14
www.powerpointpresentationon.blogspot.com
CSE 001c 1
Topics of Discussion
Introduction What are Computer Crimes and Ethics Types of Computer Crime Information Systems and Technology Vulnerabilities Ways to Manage the Risks Associated with Vulnerabilities Can we trust Computers?
CSE 001c 2
Introduction
With the popularization of the Internet, interest in computer crime, ethics, and privacy has gained momentum. News items describe about identity theft, credit cards numbers posted on chat rooms, and child pornography web sites. Computer information systems are vulnerable to physical attacks, electronic hacking, and natural disasters.
CSE 001c 3
CSE 001c
ETHICS
Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
CSE 001c
Theft
Fraud
Computer Crimes
Attacks on organizations
Copyright Infringement
CSE 001c
CSE 001c
Viruses
Worms
Trapdoor
IS and TV
Trojan Horse Time Bomb Logic Bomb
CSE 001c
Managing the risk Managing the risk Managing the risk infringement. Managing the risk vulnerabilities.
of technology
CSE 001c
10
Managing:
Risk of fraud
CSE 001c
11
Firewalls
To establish a barrier between the business computer systems and the outside world. The usual implementation of a firewall is to place a barrier between a computer system and the Internet. It is a combination of hardware and software or it may be software only. Firewall filters or restricts internal or external access to the systems.
CSE 001c 12
CSE 001c
14
CONCLUSION
Risks can be managed in information systems environments. Security is an illusion as any system can be attacked under the right circumstances. The greatest hazard is to be complacent. (i.e. to be self satisfied).
CSE 001c
15
Thank You
CSE 001c
16