Chap5-Security and Ethical Challenges of E-Business
Chap5-Security and Ethical Challenges of E-Business
Chap5-Security and Ethical Challenges of E-Business
Health Privacy
Business/ IT
Security
Ethics and
Society
Individuality Crime
Work
Conditions
Ethical Responsibility
Business professionals have a responsibility
to promote ethical uses of information
technology in the workplace.
Business Ethics
Definition:
Questions that managers must confront as part of
General e-mail Abuses Include spamming, harassments, chain letters, solicitations, spoofing,
propagations of viruses/worms, and defamatory statement.
Unauthorized Usage and Sharing of password and access into networks without permission.
Access
Copyright Using illegal or pirated software that costs organizations millions of
Infringement/Plagiarism dollars because of copyright infringements. Copying of website and
copyrighted.
Newsgroup Postings Posting of messages on various non-work-related topics from sex to
lawn care advice.
Transmission of Using the internet to display or transmit trade secrets.
Confidential Data
Pornography Accessing sexually explicit sites from workplace as well as the display,
distribution, and surfing of these offensive site
Hacking Hacking of websites, ranging from denial-of-service attacks to accessing
organizational databases.
Non-Work-Related Propagation of software that ties up office bandwidth. Use of programs
Download/Upload that allows the transmission of movies, music, and graphical materials.
Leisure Use of the Internet Loafing around the Internet, which includes shopping, sending e-cards
and personal e-mail, gambling online, chatting, game playing,
auctioning, stock trading, and doing other personal activities.
Usage of External ISPs Using an external ISP to connect to the internet to avoid detection.
Moonlighting Using office resources such as networks and computers to organize and
conduct personal business (side jobs).
Piracy
Software Piracy – unauthorized copying of
computer programs
data by businesses
Censorship
Spamming – indiscriminate sending of unsolicited e-
mail messages to many internet users
The Tools
(Computer,
Hardware, and
Software)
The
User/
Opera
The tor
Tasks
The Workstation and
(Job
Environment
Software Design Content Biomechanical
and Anthropometric
Change Training
Context)
Job Satisfaction Lighting
Support Systems Work Surfaces
Rest Breaks Furniture
Shift Work Climate
Management Systems
Security Management
The goals of security Virtual
Firewalls
Network
management is the Private
Networks
Security
Protocols
accuracy, integrity, and
safety of all information Security
resources
Management
Access Intrusion
Control Detection
Proxy
Authentication
Agent/Systems
Internetworked Security Defenses
Encryption – data transmitted in scrambled from and
unscrambled by computer systems for authorized
users only
2. You write an e-mail message then use the recipient’s public key to encrypt it.
3. The encryption process puts a kind of digital lock on the message. Even if
someone intercepts it en route, the message’s contents are inaccessible.
4. When the message arrives, the recipient types a test phrase. Than the
software uses the private key to verify that the recipient’s public key was used
for encryption.
5. Using the private key, the software unlocks the unique encryption scheme,
decoding the message.
Internet and Intranet Firewalls 1. External firewalls keeps out
3 5 5
unauthorized internet users
Firewall Internet
3
4
Router
Internet
Server
Denial of Service Defenses
At the zombie machines – set and enforce security
policies
Security Codes
Encryption
Backup Files
Library Procedures
Database Administration
Security Management for Internet
Users
Security for Internet Users
Management
1. Use antivirus and Firewall software 6. Use the most up-to-date version of
and update it often to keep your Web browser, e-mail software,
destructive programs off your and other programs
computer. 7. Send credit card numbers only to
2. Don’t allow online merchants to store secure sites; look for a padlock or key
your credit card information for future icons at the bottom of the browser.
purchases. 8. Use a security program that gives you
3. Use a hard-to-guess password that control over “cookies” that send
contains a mix of numbers and information back to websites.
letters, and change it frequently. 9. Install firewall software to screen
4. Use different passwords for different traffic if you use DSL or a cable
websites and applications to keep modem to connect to the Net.
hackers guessing. 10. Don’t open e-mail attachments unless
5. Install all operating system patches you know the source of the incoming
and upgrades. message.
Auditing IT Security
IT security audits review and evaluate whether
proper and adequate security measures and
management policies have been developed and
implemented.