Ethics, Privacy, and Information Security

Slides:



Advertisements
Presentasi serupa
Making Use Case 23/09/2014. USE CASE Find out the Functional Requirements of a software system Use case represents an objective user wants to achieve.
Advertisements

Manajemen Risiko Strategi Risiko Reaktif & Proaktif
Oleh : Saripudin,MT.  After studying this chapter, you will be able to:  Recognize the difficulties in managing information resources.  Understand.
Isbat Uzzin N Politeknik Elektronikan Negeri Surabaya Institut Tekonolgi Sepuluh Nopember Mata Kuliah Administrasi Jaringan.
Analisis dan Perancangan Sistem
Virtual Private Network
TOPOLOGI KEAMANAN.
Peta Teknologi Network Security
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod and.
Dasar-dasar Audit Sistem Informasi
3 long-distance dial-up connection 4 Figure 7-9 A WAN using frame relay.
Oleh Agus Prihanto, ST, M.Kom
1 Pertemuan 12 Pengkodean & Implementasi Matakuliah: T0234 / Sistem Informasi Geografis Tahun: 2005 Versi: 01/revisi 1.
1 Pertemuan 6 Hubungan WCA dan Sistem Informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
Computer Fraud Pertemuan XV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
MEMBUAT, MENGELOLA RESIKO DAN KRIMINALITAS SISTEM INFORMASI Pertemuan-10 Mata Kuliah: CSS-113, Konsep Sistem Informasi Tahun Akademik: 2012/2013 Sasaran.
INFRASTRUKTUR E-BISNIS. Introduction  Infrastruktur mempengaruhi kualitas pelayanan  Speed  responsiveness  Infrastruktur e-bisnis  Arsitektur jaringan.
Keamanan sistem informasi
Management Information Systems, 10/e
KEAMANAN SISTEM INFORMASI
Pengantar Keamanan Sistem Komputer
EIS (Executive Information Systems)
Keamanan Sistem (CS4633) ..:: Manajemen Resiko :
Chapter 6 Foundations of Business Intelligence: Databases and Information Management.
Rahmat Robi Waliyansyah, M.Kom.
ONLINE SHOPPING.
Ingin Menjadi Hacker ?
Pert. 16. Menyimak lingkungan IS/IT saat ini
Support System IT Putri Taqwa Prasetyaningrum,S.T.,M.T.
Pengantar Sistem Informasi HUG103
AKUNTANSI PAJAK EDISI 6 WALUYO
Membangun Web Site“Cantik”
IT AUDITS IT audits: pemeriksaan terhadap proses atau data yang melekat dengan teknologi informasi. Berkaitan dengan internal, external, dan fraud audits.
Introduction to Information Security
Telecommunications, the Internet, and Wireless Technology
Pengantar Keamanan Sistem Komputer
Toleransi Kesalahan.
“ETIKA PROFESI BIDANG TEKNOLOGI INFORMASI DAN KOMUNIKASI”
Pertemuan 12 Sekuriti dan Etika
Software Engineering Rekayasa Perangkat Lunak
Electronic Commerce, Intranets, and Extranets
Pertemuan <<18>> << Penemuan Fakta(01) >>
Agung BP Slide 11.
HUBUNGAN WCA DAN SISTEM INFORMASI
Information Technology MWU110 (2 sks)
Trust (Kepercayaan) Kuliah 05
Keamanan Informasi dan Administrasi jaringan
Manajemen Resiko TI dan Sistem Informasi
EIS (Executive Information Systems)
Trust (Kepercayaan) Kuliah 05
SECURITY TOOLS UNTUK PENGAMANAN
Upaya Mengatasi Kecemasan dalam Menghadapi Masa Depan
e-security: keamanan teknologi informasi
Pengantar Teknologi Informasi Introduction to Computers and Networks
UNBAJA (Universitas Banten Jaya)
Agung BP Slide 10.
SISTEM INFORMASI MANAJEMEN
Pengantar Keamanan Informasi
Security+ Guide to Network Security Fundamentals
Sweden Telemedicine Market is Driven By Increase in the Number of Medical Applications, Rise in the Geriatric Population and Increasing Shortage of Nurses.
Ethics Issues Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior. Deciding what is right.
THE INFORMATION ABOUT HEALTH INSURANCE IN AUSTRALIA.
Jaringan Komputer.
Computer Network Defence
Hardware Merupakan komponen-komponen fisik peralatan yang membentuk suatu sistem komputer, serta peralatan- peralatan lain yang mendukung komputer dalam.
SISTEM PENUNJANG KEPUTUSAN UNTUK SISTEM INFORMASI MANAJEMEN.
ICT untuk kolaborasi internasional
NETWORK SECURITY OVERVIEW
ICT untuk kolaborasi internasional
KELOMPOK 6 Arranged by Group 3 Adam Pangestu ( ) Muhammad Arif( ) Mohammad Lutfi( ) Mala Sari( ) Noor Fajri( )
Transcript presentasi:

Ethics, Privacy, and Information Security Chapter 3 Introduction to Information System Marcello Singadji (singadji@gmail.com)

Learning Objectives Describe the major ethical issues related to information technology and identify situations in which they occur. Identify the many threats to information security. Understand the various defense mechanisms used to protect information systems. Explain IT auditing and planning for disaster recovery.

Topic Ethical Issues Threats to Information Security Protecting Information Resources

Ethical Issues

Kasus Tahun 2001, duplikasi klikbca.com Tahun 2004, data KPU yang acak-acak Tahun 2013, ATM dibobol oleh kakak- beradik

Ethical Issues Ethics Code of Ethics Etika mengacu pada prinsip-prinsip benar dan salah yang digunakan untuk membuat suatu pilihan dalam berperilaku Kode etik adalah sekumpulan prinsip yang digunakan untuk memandu pengambilan keputusan oleh anggota organisasi

Fundamental Tenets of Ethics Responsibility Accountability Liability Prinsip dasar Etika Responsibility berarti bahwa Anda menerima konsekuensi dari keputusan dan tindakan Accountability mengacu pada penentuan siapa yang bertanggung jawab atas tindakan yang diambil Liability Konsep hukum yang memberikan hak bagi seseorang untuk memperbaiki apa yang telah terjadi (pemulihan nama baik)

Unethical vs Illegal What is unethical is not necessarily illegal Haruskah organisasi memonitor karyawannya menggunakan web dan e-mail? Jika organisasi menjual informasi pelanggan kepada perusahaan lain? Jika komputer organisasi menggunakan perangkat lunak bajakan dan terdapat film dan musik hasil download?

The Four Categories of Ethical Issues Privacy issues collecting, storing, and disseminating information about individuals. Accuracy issues the authenticity, fidelity, and accuracy of information that is collected and processed Property issues the ownership and value of information Accessibility issues revolve around who should have access to information and whether they should have to pay for this access

Threats to Information Security

Factor Increasing the Treats to Information Security Today’s interconnected, interdependent, wirelessly networked business environment Government legislation Smaller, faster, cheaper computers and storage devices Decreasing skills necessary to be a computer hacker International organized crime taking over cyber- crime Downstream liability Increased employee use of unmanaged devices Lack of management support Faktor meningkatnya kejahatan terhadap aset informasi pada suatu organisasi: Adanya jaringan yang menghubungkan setiap organisasi Peraturan pemerintah Teknologi komputer yang semakin canggih Penurunan keterampilan yang diperlukan untuk menjadi seorang hacker komputer Adanya kejahatan yang terorganisir Meningkatnya penggunaan perangkat IT yang tidak terkontrol Kurangnya dukungan manajemen

Key Information Security Terms Threat Exposure Vulnerability Risk Information systems controls Organisasi memiliki banyak sumber daya informasi (misalnya, komputer dan informasi, sistem informasi dan aplikasi, database, dan sebagainya). Sumber daya ini rentaan terhadap ancaman. Ancaman Pemaparan informasi Rentan terhadap ancaman Risiko adalah kemungkinan bahwa ancaman akan terjadi. adalah prosedur, atau perangkat lunak yang bertujuan untuk mencegah ancaman pada sistem

Security Threats

Categories of Threats to Information Systems - Whitman and Mattord (2003) Unintentional acts Human Errors Natural disasters Technical failures Technical failures include problems with hardware and software Management failures Management failures involve a lack of funding for information security efforts and a lack of interest in those efforts. Deliberate acts Software attacks Identity theft Kesalahan yang tidak disengaja Kesalahan manusia Bencana alam Kesalahan teknis h/w & s/w error Kesalahan manajemen Kurangnya dana dan tidak ada upaya untuk meningkatkan keamanan informasi Disengaja Virus hacking

Protecting Information Resources

Risk!! There is always risk!

Risk Management Risk analysis Risk mitigation Controls evaluation Risk acceptance Risk limitation Risk transference Controls evaluation

Controls Physical Controls Access Controls Communications Controls

Physical Controls

Access Controls Authentication

Access Controls Authorization Privilege Least privilege Istimewa dan paling istimewa

Communications Controls Firewalls Anti-malware systems Whitelisting and Blacklisting Intrusion Detection Systems Encryption.

Firewall

Encryption

Digital Certificates

Communications & Network Controls Virtual Private Networking Secure Socket Layer (SSL) Vulnerability Management Systems Employee Monitoring Systems A virtual private network (VPN) is a private network that uses a public network (usually the Internet) to connect users. As such, VPNs integrate the global connectivity of the Internet with the security of a private network and thereby extend the reach of the organization’s networks. Secure socket layer, now called transport layer security (TLS), is an encryption standard used for secure transactions such as credit card purchases and online banking. TLS is indicated by a URL that begins with https rather than http, and it often has a small padlock icon in the browser’s status bar. TLS encrypts and decrypts data between a Web server and a browser end to end. Users need access to their organization’s network from any location and at any time. To accommodate these needs, vulnerability management systems, also called security on demand, extend the security perimeter that exists for the organization’s managed devices. That is, vulnerability management systems handle security vulnerabilities on unmanaged remote devices. Recall that we discussed the dangers inherent in using unmanaged devices earlier. Vendors of vulnerability management software include Symantec (www.symantec.com), Trend Micro (www.trendmicro.com), McAfee (www.mcafee.com), and Qualys (www.qualys.com).

Business Continuity Planning, Backup, and Recovery Hot site fully configured computer facility, with all services, communications links, and physical plant operations Warm site does include computing equipment such as servers, but it often does not include user work stations

Information Systems Auditing Auditors & Audits Types Internal External

How Is Auditing Executed How Is Auditing Executed? Auditing around the computer Auditing through the computer Auditing with the computer Auditing sekitar komputer Auditing melalui komputer Auditing dengan komputer Auditing around the computer means verifying processing by checking for known outputs using specific inputs. This approach is best used in systems with limited outputs. In auditing through the computer, inputs, outputs, and processing are checked. Auditors review program logic and test data. Auditing with the computer means using a combination of client data, auditor software, and client and auditor hardware. This approach allows the auditor to perform tasks such as simulating payroll program logic using live data.

Referensi Introduction to Information Systems, Third Edition, R. Kelly Rainer Jr, Casey G. Cegielski, Wiley