SlideShare a Scribd company logo
Ron Briggs UT-Dallas
Ethics and Security in
Information Management
• You run the Dallas County office of DHS. Its Monday
morning of the week before you take-off on a two week
vacation.You are reading your mail. There is a letter from the
Information Systems division of the Office of the State
Auditor. They will be visiting you three weeks from today to:
“review policies and procedures with respect to information security and ethics”
• do you break into a cold sweat, or say ‘no sweat, we are in
good shape’
• what needs to be in place in order for you to enjoy a care
free vacation!?
Ron Briggs UT-Dallas
The Ethical Issues in IT
• responsibility, accountability, and liability
– snow storm, roof collapses, people lose money
• privacy and open records
– is gov. e-mail private or a public record?
• intellectual property: trade secrets, copyright, patents
– more than controlling software copying
• appropriate use and ethical behavior
– avoid even the appearance of inpropriety
• equity, access, and social impact
– the digital divide: is IT widening social and economic divisions?
• personal protection and health
– safety hazards in the workplace
Security is central to at least the first three.
Ethics is fundamental to the second three.
Ron Briggs UT-Dallas
Security Problem Areas
Its not a question of if, but of when!
– disasters strike (17%--includes equipment)
» external natural/manmade disasters
– disks, etc. fail
» internal equipment failures
– staff screw-up (50%)
– employees abuse (14%)
– hackers/viruses attack (5%)
– criminals conspire (14%--mostly internal)
– somebody sues
(Numbers refer to one estimate of losses, by source)
Ron Briggs UT-Dallas
The Response
• prevention, prevention, prevention
• detection
• prosecution/suing
The majority of problems are internal not external!
Your biggest problem is trusted staff messing up!
Prosecution & suing are after the fact. They won’t
prevent the problem (or save your job)!
It’s not luck, its planning!
Ron Briggs UT-Dallas
Basic Concepts:
responsibility, accountability, liability
Responsibility: the personal issue
accepting the inherent costs and obligations of the
decisions you make
Accountability: the institutional issue
the ability to determine who took the responsible (or
irresponsible!) action
Liability: the legal issue
the ability to recover for the damage done to
individuals or organizations through a system of due
process
Ron Briggs UT-Dallas
The Three Dimensions of Security
• Confidentiality
– assuring that legally protected data is not disclosed to the
public
• Integrity
– assuring that info. is correct and protected from
unauthorized alteration
• Availability
– assuring that data is available to support the agency’s
mission and operations
» information recoverable
» operations continuable
Ron Briggs UT-Dallas
Strategies for Security
• security policy/procedures
– physical security:
» people: locks, cameras,
exit/entry monitoring,
» water: basement, pipes
» electricity: surge, UPS
» structures: no prefabs!
– system access control : logon
– database security systems and
record/attribute level control
– data management policies
(which must be known and
followed)
» data ownership and
responsibility assignation
» data classification:
confidential, sensitive, public
• error control
– program development:
independent user testing
– data entry
» one time input/automated source
capture
» validation rules
» duplicate data entry for verification
– journalling: tracking all accesses
and changes by userID, date, time,
etc. (audit trail)
– hardware/network/database
monitoring: spotting trouble ahead
of time. (alarm)
– data audits
• disaster recovery
– back-ups: on-site & off-site
– mirroring/fault tolerant systems
– hot sites/cold sites
Ron Briggs UT-Dallas
Computer Systems v. Manual System
Is vulnerability increased?
• information is more highly concentrated, easier to gather
and more difficult to control
• potentially accessed by many more people.
• tools simplify and speed up copy/deletion of large
quantities
• no paper back-up; cannot be replicated manually.
• complex and invisible: difficult to test, audit or detect
change.
• more processing steps therefore more error possibilities.
Ron Briggs UT-Dallas
Trade-offs
• security versus information access
» internal v. external
» need-to-know
» data as power
• security versus convenience
» diminishing returns
• security versus service: risk assessment
» probabilty of occurrence
» institutional impact/cost of failure
Decisions for upper management, not IT folks!
1Ron Briggs UT-Dallas
Ethics and Appropriate Use
Dealing with personal business (e-mail, phones, etc.)
• No financial gain or commercial purpose
• direct costs re-imbursed (e.g. long distance charges)
• does not impeded agency operations (e.g tie up scare dial-in
ports or slow response time)
• consumes incidental amounts of employee time (the coffee
break test)
Dealing with vendors
• no personal gain, incl. family and friends (the tee shirt test)
• all have the opportunity to be included
• follow required procedures e.g. open bidding
For the public sector, it’s a matter of law. For the private
sector, it’s determined by policy.
1Ron Briggs UT-Dallas
Network Security: Needs
applications
– e-mail
– e-forms (internal business)
– edi (eletronic data interchange: external business)
management needs
– minimum manual
intervention
– audit trails
– status and alarms
– immediate and
comprehensive
revocation
user needs
– access control
– user
transparency
data needs
– confidentiality (secret)
– integrity
(secure: no change)
– authenticity
(sender known)
– non-repudiation
(delivery confirmed)
Security
concerns
intensify.
1Ron Briggs UT-Dallas
Network Security: Methods
Network
– closed network
– perimeter security (firewalls)
– object protection
User Access
– passwords (n times)
– smart cards (one time)
– user identification (fingerprint; eyeballs)
User exchange
– encryption (for confidentiality and integrity)
» clipper chip / back door
– public/private keys (for authenticity)
1Ron Briggs UT-Dallas
The Special Case of Telecom Security
Telephone Fraud--$2 billion plus per year
Examples:
• card sharps
• shoulder surfing
• dumpster diving
• sweet talk
codes/lines
• hacking
• internal trouble
Do you even know it?
Personal use
•illegal for gov.
•costly for private
sector
Watch out for:
•international
•1-900

More Related Content

PPT
Risk management i
PPT
The need for security
PPT
Risk management ii
PPT
Security and personnel
PPT
Privacy & security in heath care it
PPT
Security technologies
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PPTX
IT Security and Management - Prelim Lessons by Mark John Lado
Risk management i
The need for security
Risk management ii
Security and personnel
Privacy & security in heath care it
Security technologies
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado

What's hot (20)

PPT
The information security audit
PPT
is_1_Introduction to Information Security
PDF
To situation awareness theory
PPSX
6 Physical Security
PDF
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
PPT
Information security management
PPTX
Cissp- Security and Risk Management
PPT
Introduction to information security
PDF
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
PDF
I0516064
PPTX
MIS: Information Security Management
PPT
Information Security Background
DOCX
Information security management iso27001
PPT
Rothke Patchlink
PPTX
Practical Application of Physical Security Criteria
PPT
Bis Chapter15
PDF
Information Security Management 101
PDF
Data Safety And Security
PPTX
Computing safety
PDF
A Case Study of the Capital One Data Breach
The information security audit
is_1_Introduction to Information Security
To situation awareness theory
6 Physical Security
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
Information security management
Cissp- Security and Risk Management
Introduction to information security
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
I0516064
MIS: Information Security Management
Information Security Background
Information security management iso27001
Rothke Patchlink
Practical Application of Physical Security Criteria
Bis Chapter15
Information Security Management 101
Data Safety And Security
Computing safety
A Case Study of the Capital One Data Breach
Ad

Viewers also liked (20)

PPTX
Database - Design & Implementation - 1
PDF
Database design, implementation, and management -chapter02
PPT
Information system
PPT
Opportunities, threats, industry competition, and competitor analysis
PPT
Strategic planning
PPT
Legal, ethical & professional issues
PPT
Islamic information management
PPT
Types of islamic institutions and records
PPT
Security policy
PPT
Islamic information seeking behavior
PPT
Physical security
PPT
Islamic information management sources in islam
PPT
Information resource management
PPT
Database design
PPT
Lecture 08 distributed dbms
PPT
Lecture 07 relational database management system
PPT
Lecture 09 dblc centralized vs decentralized design
PPT
Lecture 06 relational algebra and calculus
PPT
Lecture 10 distributed database management system
PDF
Pembahasan Soal UKK TKJ 2017 - Paket 3
Database - Design & Implementation - 1
Database design, implementation, and management -chapter02
Information system
Opportunities, threats, industry competition, and competitor analysis
Strategic planning
Legal, ethical & professional issues
Islamic information management
Types of islamic institutions and records
Security policy
Islamic information seeking behavior
Physical security
Islamic information management sources in islam
Information resource management
Database design
Lecture 08 distributed dbms
Lecture 07 relational database management system
Lecture 09 dblc centralized vs decentralized design
Lecture 06 relational algebra and calculus
Lecture 10 distributed database management system
Pembahasan Soal UKK TKJ 2017 - Paket 3
Ad

Similar to Secure (20)

PDF
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
PDF
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
PPTX
Chapter 3
PPTX
Protecting Client Data 11.09.11
PPTX
Presentation on Information Privacy
PPTX
Cyber Security - ASGFOA
PPT
Data Protection: We\'re In This Together
PPTX
Hacking the Human - How Secure Is Your Organization?
PPTX
Insider threats - Lessons from Snowden (ISF UK Chapter)
PDF
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
PPT
Information security background
PDF
information security introduction for campus students.pdf
PPT
Information Security
PPTX
PP Lec9n10 Sp2020.pptx
PPTX
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
PPTX
Multi-faceted Cyber Security v1
PPT
DPA seminar presentation
PDF
L007 Managing System Security (2016)
PPT
Internal Risk Management
PPTX
The Year Ahead in Cyber Security: 2014 edition
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
Chapter 3
Protecting Client Data 11.09.11
Presentation on Information Privacy
Cyber Security - ASGFOA
Data Protection: We\'re In This Together
Hacking the Human - How Secure Is Your Organization?
Insider threats - Lessons from Snowden (ISF UK Chapter)
Trade Secret Protection: Practical Advice on Protecting and Defending Your Or...
Information security background
information security introduction for campus students.pdf
Information Security
PP Lec9n10 Sp2020.pptx
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Multi-faceted Cyber Security v1
DPA seminar presentation
L007 Managing System Security (2016)
Internal Risk Management
The Year Ahead in Cyber Security: 2014 edition

More from Dhani Ahmad (12)

PPT
Strategic information system planning
PPT
Introduction to information security
PPT
Information security as an ongoing effort
PPT
Implementing security
PPT
Disaster recovery & business continuity
PPT
Chapter2 the need to security
PPT
Topic 12 report & presentations
PPT
Topic 11 data management
PPT
Topic 10 sample designs & procedures
PPT
Topic 9 secondary data sources
PPT
Topic 8 questionnaire design
PPT
Topic 7 measurement in research
Strategic information system planning
Introduction to information security
Information security as an ongoing effort
Implementing security
Disaster recovery & business continuity
Chapter2 the need to security
Topic 12 report & presentations
Topic 11 data management
Topic 10 sample designs & procedures
Topic 9 secondary data sources
Topic 8 questionnaire design
Topic 7 measurement in research

Recently uploaded (20)

PDF
Sims 4 Historia para lo sims 4 para jugar
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
DOCX
Unit-3 cyber security network security of internet system
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Introduction to cybersecurity and digital nettiquette
PPT
Ethics in Information System - Management Information System
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
Sims 4 Historia para lo sims 4 para jugar
Design_with_Watersergyerge45hrbgre4top (1).ppt
Mathew Digital SEO Checklist Guidlines 2025
artificialintelligenceai1-copy-210604123353.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Exploring VPS Hosting Trends for SMBs in 2025
SASE Traffic Flow - ZTNA Connector-1.pdf
Power Point - Lesson 3_2.pptx grad school presentation
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Unit-3 cyber security network security of internet system
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
newyork.pptxirantrafgshenepalchinachinane
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
SAP Ariba Sourcing PPT for learning material
Introduction to cybersecurity and digital nettiquette
Ethics in Information System - Management Information System
Module 1 - Cyber Law and Ethics 101.pptx

Secure

  • 1. Ron Briggs UT-Dallas Ethics and Security in Information Management • You run the Dallas County office of DHS. Its Monday morning of the week before you take-off on a two week vacation.You are reading your mail. There is a letter from the Information Systems division of the Office of the State Auditor. They will be visiting you three weeks from today to: “review policies and procedures with respect to information security and ethics” • do you break into a cold sweat, or say ‘no sweat, we are in good shape’ • what needs to be in place in order for you to enjoy a care free vacation!?
  • 2. Ron Briggs UT-Dallas The Ethical Issues in IT • responsibility, accountability, and liability – snow storm, roof collapses, people lose money • privacy and open records – is gov. e-mail private or a public record? • intellectual property: trade secrets, copyright, patents – more than controlling software copying • appropriate use and ethical behavior – avoid even the appearance of inpropriety • equity, access, and social impact – the digital divide: is IT widening social and economic divisions? • personal protection and health – safety hazards in the workplace Security is central to at least the first three. Ethics is fundamental to the second three.
  • 3. Ron Briggs UT-Dallas Security Problem Areas Its not a question of if, but of when! – disasters strike (17%--includes equipment) » external natural/manmade disasters – disks, etc. fail » internal equipment failures – staff screw-up (50%) – employees abuse (14%) – hackers/viruses attack (5%) – criminals conspire (14%--mostly internal) – somebody sues (Numbers refer to one estimate of losses, by source)
  • 4. Ron Briggs UT-Dallas The Response • prevention, prevention, prevention • detection • prosecution/suing The majority of problems are internal not external! Your biggest problem is trusted staff messing up! Prosecution & suing are after the fact. They won’t prevent the problem (or save your job)! It’s not luck, its planning!
  • 5. Ron Briggs UT-Dallas Basic Concepts: responsibility, accountability, liability Responsibility: the personal issue accepting the inherent costs and obligations of the decisions you make Accountability: the institutional issue the ability to determine who took the responsible (or irresponsible!) action Liability: the legal issue the ability to recover for the damage done to individuals or organizations through a system of due process
  • 6. Ron Briggs UT-Dallas The Three Dimensions of Security • Confidentiality – assuring that legally protected data is not disclosed to the public • Integrity – assuring that info. is correct and protected from unauthorized alteration • Availability – assuring that data is available to support the agency’s mission and operations » information recoverable » operations continuable
  • 7. Ron Briggs UT-Dallas Strategies for Security • security policy/procedures – physical security: » people: locks, cameras, exit/entry monitoring, » water: basement, pipes » electricity: surge, UPS » structures: no prefabs! – system access control : logon – database security systems and record/attribute level control – data management policies (which must be known and followed) » data ownership and responsibility assignation » data classification: confidential, sensitive, public • error control – program development: independent user testing – data entry » one time input/automated source capture » validation rules » duplicate data entry for verification – journalling: tracking all accesses and changes by userID, date, time, etc. (audit trail) – hardware/network/database monitoring: spotting trouble ahead of time. (alarm) – data audits • disaster recovery – back-ups: on-site & off-site – mirroring/fault tolerant systems – hot sites/cold sites
  • 8. Ron Briggs UT-Dallas Computer Systems v. Manual System Is vulnerability increased? • information is more highly concentrated, easier to gather and more difficult to control • potentially accessed by many more people. • tools simplify and speed up copy/deletion of large quantities • no paper back-up; cannot be replicated manually. • complex and invisible: difficult to test, audit or detect change. • more processing steps therefore more error possibilities.
  • 9. Ron Briggs UT-Dallas Trade-offs • security versus information access » internal v. external » need-to-know » data as power • security versus convenience » diminishing returns • security versus service: risk assessment » probabilty of occurrence » institutional impact/cost of failure Decisions for upper management, not IT folks!
  • 10. 1Ron Briggs UT-Dallas Ethics and Appropriate Use Dealing with personal business (e-mail, phones, etc.) • No financial gain or commercial purpose • direct costs re-imbursed (e.g. long distance charges) • does not impeded agency operations (e.g tie up scare dial-in ports or slow response time) • consumes incidental amounts of employee time (the coffee break test) Dealing with vendors • no personal gain, incl. family and friends (the tee shirt test) • all have the opportunity to be included • follow required procedures e.g. open bidding For the public sector, it’s a matter of law. For the private sector, it’s determined by policy.
  • 11. 1Ron Briggs UT-Dallas Network Security: Needs applications – e-mail – e-forms (internal business) – edi (eletronic data interchange: external business) management needs – minimum manual intervention – audit trails – status and alarms – immediate and comprehensive revocation user needs – access control – user transparency data needs – confidentiality (secret) – integrity (secure: no change) – authenticity (sender known) – non-repudiation (delivery confirmed) Security concerns intensify.
  • 12. 1Ron Briggs UT-Dallas Network Security: Methods Network – closed network – perimeter security (firewalls) – object protection User Access – passwords (n times) – smart cards (one time) – user identification (fingerprint; eyeballs) User exchange – encryption (for confidentiality and integrity) » clipper chip / back door – public/private keys (for authenticity)
  • 13. 1Ron Briggs UT-Dallas The Special Case of Telecom Security Telephone Fraud--$2 billion plus per year Examples: • card sharps • shoulder surfing • dumpster diving • sweet talk codes/lines • hacking • internal trouble Do you even know it? Personal use •illegal for gov. •costly for private sector Watch out for: •international •1-900