Ethics in Information Technology, Second Edition: Computer and Internet Crime
Ethics in Information Technology, Second Edition: Computer and Internet Crime
Chapter 3
Computer and Internet Crime
Objectives
• What key trade-offs and ethical issues are
associated with the safeguarding of data and
information systems?
• Zero-day attack
– Takes place before a vulnerability is discovered or
fixed
U.S. companies rely on commercial software with
known vulnerabilities, where many corporate IT
organizations prefer to use already installed software
• Antivirus software
– Continually updated with the latest virus detection
information
• Called definitions
• Departing employees
– Promptly delete computer accounts, login IDs, and
passwords
• Carefully define employee roles
• Create roles and user accounts
• Detection systems
– Catch intruders in the act
• Intrusion detection system
– Monitors system, network resources and activities
– Notifies the proper authority when it identifies
• Possible intrusions from outside the organization
• Misuse from within the organization