SlideShare ist ein Scribd-Unternehmen logo
1 von 23
SECURITY ANDSECURITY AND
ETHICAL CHALLENGESETHICAL CHALLENGES
OF INFORMATIONOF INFORMATION
TECHNOLOGYTECHNOLOGY
Presented by:-Presented by:-
Anjali sharmaAnjali sharma
Khushboo ghanshaniKhushboo ghanshani
IT SECURITY & ETHICS
The use of IT in business has had major
impacts on society & thus raises ethical
issues ion the area of crime , privacy,
individuality, employment, health & working
conditions.
Hence IT has both negative & positive
impacts.
So the responsibility of a business
professional is to manage the high quality
products & maintaining it.
EthicalEthical Responsibility
Security
Ethics and
Society
Employment Privacy
Health Crime
Working
Conditions
Individuality
Need for Security
1. Reduce the risk of systems and
organizations ceasing operations.
2. Maintaining information confidentiality.
3. Ensure the integrity and reliability of
data resources.
4. Ensure the uninterrupted availability of
data resources and online operations.
5. Ensure compliance with policies & laws
regarding security & privacy.
SecuritySecurity
ManagementManagement
Goal of SecurityGoal of Security
ManagementManagement
– Minimize errors, fraud, and losses in the
e-business systems that interconnect
businesses with their customers,
suppliers, and other stakeholders
Security Measures
Encryption
Denial of Service
Defenses
Fire Walls
Monitor
E-mail
Virus
Defenses
Security Measures (cont..)
Security
Codes
Security
Monitors
Backup
Files
Biometric
Security Controls
Encryption
– Passwords, messages, files, and other
data is transmitted in scrambled form
and unscrambled for authorized users
– Involves using special mathematical
algorithms to transform digital data in
scrambled code
– Most widely used method uses a pair of
public and private keys unique to each
individual
Types of Encryption
Secret Key Algorithm , (symmetric
encryption):
Symmetric or private key, encryption is
based on a secret key that is shared by
both communicating parties. The sending
party uses the secret key as part of the
mathematical operation to encipher plain
text to cipher text. The receiving party
uses the same secret key to decipher the
cipher text to plain text.
Types of encrption
(contd..)
Public Key Algorithm (Asymmetric
Encryption):
It uses two different keys for each user;
one is private key known only to this one
user, the other is corresponding public
key, which is accessible to anyone. The
private & public keys are mathematically
related by the encryption algorithm. One
key is used for encryption and the other
for decryption, depending on the nature of
the communication service.
Firewalls
Serves as a
“gatekeeper”
system that
protects a company’s
intranets and other
computer networks
from intrusion
 Provides a filter and
safe transfer point
 Screens all network
traffic for proper
passwords or other
security codes
Advantages of Firewalls
Provides security to both inbound &
outbound traffic.
Response time is very high in case of
high end firewalls.
Software firewalls are usually
cheaper and preferred for individual
computers where as hardware
firewalls are for organizations and
are costly.
Disadvantages of
Firewalls
• Firewalls cannot protect the system
from insider attacks.
• Installation & maintenance costs
often become an overhead.
• Users surfing capabilities are
reduced.
• If the firewall is configured with
stringent rules, it constantly annoys
user with False positives.
Denial of Service
Defenses
 These assaults depend on
three layers of networked
computer systems
 Victim’s website
 Victim’s ISP
 Sites of “zombie” or slave
computers
 Defensive measures and
security precautions must be
taken at all three levels
Security Measures (cont..)
• E-mail Monitoring
“Spot checks just aren’t good enough anymore.
The tide is turning toward systematic
monitoring of corporate e-mail traffic using
content-monitoring software that scans for
troublesome words that might compromise
corporate security.”
• Virus Defenses
Protection may accomplished through
Centralized distribution and updating of antivirus
software
Outsourcing the virus protection responsibility to
ISPs or to telecommunications or security
management companies
Security Measures (cont..)
Security codes
Multilevel password system:-
Log onto the computer system, Gain
access into the system, Access
individual files
Backup Files
Duplicate files of data or programs
File retention measures
Sometimes several generations of files
are kept for control purposes
CYBER TERRORISM
• Cyber terrorism is the
convergence of terrorism
and cyberspace. It is
generally understood to
mean unlawful attacks
and threats of attack
against computers,
networks, and the
information stored
therein when done to
intimidate or coerce a
government or its people
in furtherance of
political or social
objectives.
Cyber Terrorism
Basic facts about cyber
terrorism
• Cyber attacks immediately follow
physical attacks
• Cyber attacks are increasing in
volume, sophistication, and
coordination
• Cyber attackers are attracted to
high-value targets
• Many, if not most, targets would
probably be commercial computer and
communications systems
What can we do..???
Go on the defensive now
– Educate senior management on risks of cyber
warfare
– Make infosec a top priority
– Beef up your security technology
– Insist on flawless execution: compliance to
security standards in all areas
Work with other companies, government
agencies
– NIPC
– IT ISAC
– SAINT
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02

Weitere ähnliche Inhalte

Was ist angesagt?

An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber securitySamanvay Jain
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 

Was ist angesagt? (20)

Security in it
Security in it Security in it
Security in it
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Cia security model
Cia security modelCia security model
Cia security model
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Information security
Information securityInformation security
Information security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information security
Information securityInformation security
Information security
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Information security
Information securityInformation security
Information security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 

Andere mochten auch

Chris Brown - F.A.M.E Digipack Analysis
Chris Brown - F.A.M.E Digipack AnalysisChris Brown - F.A.M.E Digipack Analysis
Chris Brown - F.A.M.E Digipack AnalysisJack Bocock
 
Production Diary
Production DiaryProduction Diary
Production DiaryJack Bocock
 
Magazine research
Magazine researchMagazine research
Magazine researchJack Bocock
 
Magazine analysis
Magazine analysisMagazine analysis
Magazine analysisJack Bocock
 
How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...Jack Bocock
 
Magazine Poster Analysis
Magazine Poster AnalysisMagazine Poster Analysis
Magazine Poster AnalysisJack Bocock
 
Martin Garrix & Jay Hardway - Wizard Analysis
Martin Garrix & Jay Hardway - Wizard AnalysisMartin Garrix & Jay Hardway - Wizard Analysis
Martin Garrix & Jay Hardway - Wizard AnalysisJack Bocock
 
121214 アド部発表資料 2012年TOP NEWS
121214 アド部発表資料 2012年TOP NEWS121214 アド部発表資料 2012年TOP NEWS
121214 アド部発表資料 2012年TOP NEWSTatsuo Sakamoto
 
Skepta & JME - Thats Not Me Analysis
Skepta & JME - Thats Not Me AnalysisSkepta & JME - Thats Not Me Analysis
Skepta & JME - Thats Not Me AnalysisJack Bocock
 
20110224024435617
2011022402443561720110224024435617
20110224024435617anjalee990
 
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.shafikah zakaria
 

Andere mochten auch (15)

Chris Brown - F.A.M.E Digipack Analysis
Chris Brown - F.A.M.E Digipack AnalysisChris Brown - F.A.M.E Digipack Analysis
Chris Brown - F.A.M.E Digipack Analysis
 
Production Diary
Production DiaryProduction Diary
Production Diary
 
Magazine research
Magazine researchMagazine research
Magazine research
 
Magazine analysis
Magazine analysisMagazine analysis
Magazine analysis
 
Falicitation
FalicitationFalicitation
Falicitation
 
How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...How did you use media technologies in the construction and research, planning...
How did you use media technologies in the construction and research, planning...
 
Question 2
Question 2Question 2
Question 2
 
Band images
Band imagesBand images
Band images
 
Magazine Poster Analysis
Magazine Poster AnalysisMagazine Poster Analysis
Magazine Poster Analysis
 
Martin Garrix & Jay Hardway - Wizard Analysis
Martin Garrix & Jay Hardway - Wizard AnalysisMartin Garrix & Jay Hardway - Wizard Analysis
Martin Garrix & Jay Hardway - Wizard Analysis
 
121214 アド部発表資料 2012年TOP NEWS
121214 アド部発表資料 2012年TOP NEWS121214 アド部発表資料 2012年TOP NEWS
121214 アド部発表資料 2012年TOP NEWS
 
Skepta & JME - Thats Not Me Analysis
Skepta & JME - Thats Not Me AnalysisSkepta & JME - Thats Not Me Analysis
Skepta & JME - Thats Not Me Analysis
 
Pengenalan sains sukan
Pengenalan sains sukanPengenalan sains sukan
Pengenalan sains sukan
 
20110224024435617
2011022402443561720110224024435617
20110224024435617
 
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
DASAR BRITISH DAN KESANNYA TERHADAP EKONOMI NEGARA.
 

Ähnlich wie Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02

ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 

Ähnlich wie Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02 (20)

ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
I0516064
I0516064I0516064
I0516064
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Unit v
Unit vUnit v
Unit v
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 

Kürzlich hochgeladen

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Kürzlich hochgeladen (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02

  • 1. SECURITY ANDSECURITY AND ETHICAL CHALLENGESETHICAL CHALLENGES OF INFORMATIONOF INFORMATION TECHNOLOGYTECHNOLOGY
  • 2. Presented by:-Presented by:- Anjali sharmaAnjali sharma Khushboo ghanshaniKhushboo ghanshani
  • 3. IT SECURITY & ETHICS The use of IT in business has had major impacts on society & thus raises ethical issues ion the area of crime , privacy, individuality, employment, health & working conditions. Hence IT has both negative & positive impacts. So the responsibility of a business professional is to manage the high quality products & maintaining it.
  • 4. EthicalEthical Responsibility Security Ethics and Society Employment Privacy Health Crime Working Conditions Individuality
  • 5. Need for Security 1. Reduce the risk of systems and organizations ceasing operations. 2. Maintaining information confidentiality. 3. Ensure the integrity and reliability of data resources. 4. Ensure the uninterrupted availability of data resources and online operations. 5. Ensure compliance with policies & laws regarding security & privacy.
  • 7. Goal of SecurityGoal of Security ManagementManagement – Minimize errors, fraud, and losses in the e-business systems that interconnect businesses with their customers, suppliers, and other stakeholders
  • 8. Security Measures Encryption Denial of Service Defenses Fire Walls Monitor E-mail Virus Defenses
  • 10. Encryption – Passwords, messages, files, and other data is transmitted in scrambled form and unscrambled for authorized users – Involves using special mathematical algorithms to transform digital data in scrambled code – Most widely used method uses a pair of public and private keys unique to each individual
  • 11. Types of Encryption Secret Key Algorithm , (symmetric encryption): Symmetric or private key, encryption is based on a secret key that is shared by both communicating parties. The sending party uses the secret key as part of the mathematical operation to encipher plain text to cipher text. The receiving party uses the same secret key to decipher the cipher text to plain text.
  • 12. Types of encrption (contd..) Public Key Algorithm (Asymmetric Encryption): It uses two different keys for each user; one is private key known only to this one user, the other is corresponding public key, which is accessible to anyone. The private & public keys are mathematically related by the encryption algorithm. One key is used for encryption and the other for decryption, depending on the nature of the communication service.
  • 13. Firewalls Serves as a “gatekeeper” system that protects a company’s intranets and other computer networks from intrusion  Provides a filter and safe transfer point  Screens all network traffic for proper passwords or other security codes
  • 14. Advantages of Firewalls Provides security to both inbound & outbound traffic. Response time is very high in case of high end firewalls. Software firewalls are usually cheaper and preferred for individual computers where as hardware firewalls are for organizations and are costly.
  • 15. Disadvantages of Firewalls • Firewalls cannot protect the system from insider attacks. • Installation & maintenance costs often become an overhead. • Users surfing capabilities are reduced. • If the firewall is configured with stringent rules, it constantly annoys user with False positives.
  • 16. Denial of Service Defenses  These assaults depend on three layers of networked computer systems  Victim’s website  Victim’s ISP  Sites of “zombie” or slave computers  Defensive measures and security precautions must be taken at all three levels
  • 17. Security Measures (cont..) • E-mail Monitoring “Spot checks just aren’t good enough anymore. The tide is turning toward systematic monitoring of corporate e-mail traffic using content-monitoring software that scans for troublesome words that might compromise corporate security.” • Virus Defenses Protection may accomplished through Centralized distribution and updating of antivirus software Outsourcing the virus protection responsibility to ISPs or to telecommunications or security management companies
  • 18. Security Measures (cont..) Security codes Multilevel password system:- Log onto the computer system, Gain access into the system, Access individual files Backup Files Duplicate files of data or programs File retention measures Sometimes several generations of files are kept for control purposes
  • 19. CYBER TERRORISM • Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 21. Basic facts about cyber terrorism • Cyber attacks immediately follow physical attacks • Cyber attacks are increasing in volume, sophistication, and coordination • Cyber attackers are attracted to high-value targets • Many, if not most, targets would probably be commercial computer and communications systems
  • 22. What can we do..??? Go on the defensive now – Educate senior management on risks of cyber warfare – Make infosec a top priority – Beef up your security technology – Insist on flawless execution: compliance to security standards in all areas Work with other companies, government agencies – NIPC – IT ISAC – SAINT