SlideShare a Scribd company logo
Current Topics In Computer
Technology
Social & Professional Issues In IT
Rohana K Amarakoon
B.Sc (SUSL), MBCS (UK), MBA (AUS-Reading)
Content
1. Why We Need Ethics & Culture
2. Social & Professional Issues (Vulnerability Disclosure)
3. Social & Professional Issues (SPAM)
4. Social & Professional Issues (E-MAIL SCAMS)
5. Social & Professional Issues (HACKING)
2PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
Content
6. Social & Professional Issues (VIRUSES & WORMS)
7. Social & Professional Issues (Conflict of Interest)
8. Social & Professional Issues (Prevention)
9. Expected Outcomes
3PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
1. Why We Need Ethics & Culture
• Ethics
Company has a general sense of ethics that drives the policies it sets
• Moral
Accepted from an authority, usually cultural or religious
• Policy
Provides the framework in which a company’s employees are to act in response to
various situations
• Law
Is a separate matter from ethics
• Culture
Mixture of norms, standards, and expectations for members of a community
4PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
1. Why We Need Ethics & Culture
5PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
1. Why We Need Ethics & Culture
6PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
1. Why We Need Ethics & Culture
Evaluate Ethics of an Organization
• Formal Ethics
Opinion or perceptions officially written and share among employees.
• Informal Ethics
Describe a body of information that is either not written down or poorly
documented, but that nevertheless is consistently and powerfully held in an
organization.
• Ethical Leadership
Positive or Negative ethical Leadership.
7PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
VULNEERABILITY NON- DISCLOSURE
• Sign nondisclosure agreement
• Non will report vulnerability details to the outside (general public)
• Motivation – keep system away from intruders till the fixes are done
8PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
VULNEERABILITY NON- DISCLOSURE
• Can you really control information? – Adopting nondisclosure policies
• Advantages
1. Nondisclosure empowers management
2. Control over information within the organization
• Four main reasons to consider this as bad
1. Leaked or simultaneously discovered
2. Not discovered publicly admins do not have Opportunity
3. No pressure for S/W vendors
4. Difficulty of selecting trusted individuals
• The black hat community – Vulnerability issues and organizations
They practice policy of nondisclosure
9PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
VULNEERABILITY FULL-DISCLOSURE
• The process of broadly disseminating as much information as possible regarding
product or system vulnerabilities so that potential victim’s possess the same
information as the potential attackers
• Revealing of all vulnerability details including the technical details and scripts
prior to patches, which fix the vulnerabilities.
10PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
VULNEERABILITY FULL-DISCLOSURE
• Potential victims are aware when
1. Implementing IDS
2. Shutting down some vulnerable services
3. System admins activities
4. Product reviews from programmers of the vendor
• Ethically handling system vulnerabilities – Who do you notify
• Performing full disclosure – How much do other know already?
11PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
ETHICAL DUTY TO WARN
• Writers exposing system weaknesses – Should you disclose all information?
• Instilling public fear with full disclosures – Err on the side of caution
PATCH DEVELOPMENT
• Detecting and fixing product vulnerabilities
1. Taking the market advantage – Should you communicate?
2. Combining system fixes with security patches – Adding more risk?
12PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
RESPONSIBLE DISCLOSURE PLANS
• The purpose of “responsible disclosure” is to allow customers of a vendor
product ample time to protect their systems from exploitation and attack.
• The primary goal is to minimize that period of time to reduce the occurrence of
attack
1. The Fisher Plan, Government disclosure – Is it necessary? (Dennis Fisher)
2. The responsible disclosure forum – Should one be created?
13PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
2. Social & Professional Issues (Vulnerability
Disclosure)
RESPONSIBLILITY FOR VULNERABILITY REPORODUCTION
1. Vendor coordination
2. Determining a deadline for repair based on the severity of the vulnerability
3. Fix vulnerabilities within the set timeline
4. coordinating a public disclosure
5. Issue financial compensation to the discoverer
14PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
3. Social & Professional Issues (SPAM)
SPAM
spamming is the use of electronic messaging systems to send unsolicited messages
(spam), especially advertising, as well as sending messages repeatedly on the same
site.
Spam can be used to spread computer viruses, trojan horses or other malicious
software. The objective may be identity theft.
How to avoid SPAM emails
• Tuning the spam filter – False positive
• Research grade spam killers & blacklists – Do they work?
15PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
3. Social & Professional Issues (SPAM)
16PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
4. Social & Professional Issues (E-MAIL
SCAMS)
E-MAIL SCAMS
Email scam is an unsolicited email that claims the prospect of a bargain or
something for nothing. Some scam messages ask for business, others invite victims
to a website with a detailed pitch. Many individuals have lost their life savings due
to this type of fraud. Email scam is a form of email fraud.
MONITORY GAIN
• Help me move my money from my country – Government must set tone
• Free Credit Report e-mail – Can you tell the difference
• eBay and PayPal scams – You should be more aware ?
17PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
4. Social & Professional Issues (E-MAIL
SCAMS)
What should you do if you’ve received a scam email?
• Do not click on any links in the scam email.
• Do not reply to the email or contact the senders in any way.
• If you have clicked on a link in the email, do not supply any information on the
website that may open.
• Do not open any attachments that arrive with the email.
18PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
4. Social & Professional Issues (E-MAIL
SCAMS)
19PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
5. Social & Professional Issues (HACKING)
HACKING
Hacking is the practice of modifying the features of a system, in order to
accomplish a goal outside of the creator's original purpose.
The person who is consistently engaging in hacking activities, and has accepted
hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the
field of computer security, but hacking exists in many other forms, such as phone
hacking, brain hacking, etc. and it's not limited to either of them.
20PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
5. Social & Professional Issues (HACKING)
HACKING
• Hacking for business warfare – Is it just part of the business?
• Giving it to the distributed denial of service “Hacktortionists” – Do you pay?
• Hacking for educations – Is it just about learning?
• OS attacks – Go after the bad guys?
• Cracking screen saver password – Should you or shouldn’t you?
• Spoofing – Does it serve a purpose?
21PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
5. Social & Professional Issues (HACKING)
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
22PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
6. Social & Professional Issues (VIRUSES &
WORMS)
VIRUSES
A computer virus is a malware program that, when executed, replicates by
inserting copies of itself (possibly modified) into other computer programs, data
files, or the boot sector of the hard drive; when this replication succeeds, the
affected areas are then said to be "infected“.
WORMS
A computer worm is a standalone malware computer program that replicates itself
in order to spread to other computers. Often, it uses a computer network to spread
itself, relying on security failures on the target computer to access it. Unlike a
computer virus, it does not need to attach itself to an existing program.
23PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
6. Social & Professional Issues (VIRUSES &
WORMS)
VIRUSES & WORMS
• Virus development for profit – Is it appropriate?
• Bounty hunters for virus writers – A Deterrent?
• Acceptable virus tolerance level – Is there one?
• System crashes – Should you reformat the HD?
• Attacking attackers – Go on the offense?
• Bypassing alerts – Never a good idea
24PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
7. Social & Professional Issues (Conflict of
Interest)
25PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
7. Social & Professional Issues (Conflict of
Interest)
CONFLICTS OF INTEREST
26PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
7. Social & Professional Issues (Conflict of
Interest)
CONFLICTS OF INTEREST
27PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
7. Social & Professional Issues (Conflict of
Interest)
28PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
7. Social & Professional Issues (Conflict of
Interest)
CONFLICTS OF INTEREST
• Crossing the audit line too far – Should you offer solutions?
• Disclosing Referral fees – Must you tell?
• Receiving gifts as an auditor – Should you decline?
• Relationships with Management – Will it affect the results?
• Using audit information – When is it okay?
• Divulging audit information to the Competition – What about your reputation?
29PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
ENCRYPTION
Encryption is the most effective way to achieve data security.
To read an encrypted file, you must have access to a secret key or password that
enables you to decrypt it.
Unencrypted data is called plain text ; encrypted data is referred to as cipher text
30PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
ENCRYPTION
31PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
ENCRYPTION
• Backup keys – Are they necessary?
• VPN encryption – Utilize for personal gain?
• Sending unencrypted documents – Should it ever occur?
• Victim of industrial espionage – Who’s responsible?
• Is industrial espionage ethical – Common behavior?
• Law enforcement & viewing irrelevant data – Do you have a contingency plan
• Selling encryption tools globally – Did you do the research?
32PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
ENSURING INFORMATION SECURITY IN THE PERSONAL LEVEL
• Lying to clients regarding corporate security – Is this ever a good idea?
• Handling evidence on Personnel – A difficult situation
• Security reprimands Contractors vs. Personnel – Treat equally?
33PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
CODING PRACTICES
• Bad code – Whose problem is it?
• Weak code – Is it ever OK?
• Correct use of memory – Fixed vs. Dynamic
• Ethical use of system resources – Are you using or abusing privileges?
• Redoing code due to management changes – Should you do it?
• Staying current with coding-practices – What if it is not in your schedule?
• Commenting code – When is it OK not doing it?
• Omitting code comments for job security – Should you play the game?
• Pseudocode – Is it worth your time?
34PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
CODE MAINTENANCE
• Modifying a secure design of a program – Is it ever appropriate?
• Affecting overall quality of a program – What is acceptable?
CODE REVIEW
• Lazy reviewers – Do you do it?
• Following standards – How strict you should be?
• Automated code review – Do you trust the software or yourself?
35PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
36PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
ETHICAL RESPONSIBILITY
• Confidentiality
• Availability
• Integrity
• Communication
INTERNET SERVICE PROVIDER CUSTOMER SERVICE
• Updates of ISP software – Should you download what you need?
• Pop-up advertising – Should ISP’s be responsible for blocking them?
• ISP – Updating your OS?
• ISP blocking email – Do you have a choice?
37PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
8. Social & Professional Issues (Prevention)
BUSINESS ETHICS OF OTHERS
• Personal & Professional business – When it is not separated?
• Overhead conversations – What should you report?
• Deliberately misconduct – Should you blow the whistle?
• Disgruntled employees – What if you think there is a reason to worry?
JOB PERFORMANCE OF OTHERS
• Skipping standard operation procedure – When your coworker does it
• Reporting errors – What about when it’s your first day?
• Warning unheard – When you raise an issue that is ignored?
38PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
Expected Outcomes
• Understand about the why social and professional issues in IT
• Understand about the nature and challenges to overcome the social and
professional issues in IT
• Get to know about what are the ways that individuals, organizations and
regulatory bodies could prevent such issues happen again and again
• Study about how we could work under proper environment and avoid social and
professional issues.
39PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
Thank You!
40PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)

More Related Content

PPTX
Social and professional issuesin it
Rushana Bandara
 
PPTX
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
MarvenParay
 
PPT
Professional Ethics of IT
Maria Stella Solon
 
PPTX
Professional Issues in Computing
Syed Zaid Irshad
 
PPT
Staff development
John Christian Villanueva
 
PPTX
survey on online v/s offline shopping
Tanvir Bhatti
 
PDF
Ethical and Social Issues in ICT
RoshanMaharjan13
 
Social and professional issuesin it
Rushana Bandara
 
1-LESSON-SOCIAL AND PROFESSIONAL ISSUES.pptx
MarvenParay
 
Professional Ethics of IT
Maria Stella Solon
 
Professional Issues in Computing
Syed Zaid Irshad
 
Staff development
John Christian Villanueva
 
survey on online v/s offline shopping
Tanvir Bhatti
 
Ethical and Social Issues in ICT
RoshanMaharjan13
 

What's hot (20)

PDF
Lecture-1: Introduction to system integration and architecture - course overv...
Mubashir Ali
 
PDF
Chapter 1 - Introduction to System Integration and Architecture.pdf
Khairul Anwar Sedek
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
PPTX
Methodology it capstone projet
june briones
 
PPT
Ethics for it professionals and it users
Bhanja Kishor Samudra
 
PPTX
INTEGRATIVE PROGRAMMING ch1.pptx
StephenStanleyAndres1
 
PPT
The IPO Model of Evaluation (Input-Process-Output)
Janilo Sarmiento
 
PDF
COMPUTERIZED INFORMATION SYSTEM IN BARANGAY POBLACION, DANAO CITY, CEBU - CAP...
Mark John Lado, MIT
 
PDF
ACM code of ethics
Muhammad Haroon
 
PPTX
Module 6 current trends and emerging technologies
Eclaro College
 
PPT
Ethical Issues In ICT
kelly kusmulyono
 
PPT
Computer system servicing
Lindyl Geral
 
PDF
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Manila Central University
 
PPTX
Ethics in Information Technology
Atul Kumar Pandey
 
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
PDF
Basic Computer Troubleshooting
Meredith Martin
 
PPT
IEEE Code Of Conduct/Ethics
Muhammad Amjad Rana
 
PPT
The 10 Commandments of Computer Ethics
smartinson
 
PPTX
PHILOSOPHY OF ETHICS
javeria azam
 
Lecture-1: Introduction to system integration and architecture - course overv...
Mubashir Ali
 
Chapter 1 - Introduction to System Integration and Architecture.pdf
Khairul Anwar Sedek
 
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
Methodology it capstone projet
june briones
 
Ethics for it professionals and it users
Bhanja Kishor Samudra
 
INTEGRATIVE PROGRAMMING ch1.pptx
StephenStanleyAndres1
 
The IPO Model of Evaluation (Input-Process-Output)
Janilo Sarmiento
 
COMPUTERIZED INFORMATION SYSTEM IN BARANGAY POBLACION, DANAO CITY, CEBU - CAP...
Mark John Lado, MIT
 
ACM code of ethics
Muhammad Haroon
 
Module 6 current trends and emerging technologies
Eclaro College
 
Ethical Issues In ICT
kelly kusmulyono
 
Computer system servicing
Lindyl Geral
 
Final Demo Semi Detailed Lesson Plan in TLE 2 (LAN Cabling)
Manila Central University
 
Ethics in Information Technology
Atul Kumar Pandey
 
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
Basic Computer Troubleshooting
Meredith Martin
 
IEEE Code Of Conduct/Ethics
Muhammad Amjad Rana
 
The 10 Commandments of Computer Ethics
smartinson
 
PHILOSOPHY OF ETHICS
javeria azam
 
Ad

Similar to Social & professional issues in IT (20)

PDF
Airport IT&T 2013 John McCarthy
Russell Publishing
 
PDF
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 
PPT
Introduction in Computer Science Ethics
fificoco
 
PDF
Ethical hacking
Mohammad Affan
 
DOCX
Final report ethical hacking
samprada123
 
PDF
Social Engineering - By Chris Hills
Chris Hills CPP, CRMP
 
PPTX
Network security
mena kaheel
 
PPTX
ch 6 cyber security Organizational Implications.pptx
jpsarwade
 
PDF
IRJET- Ethical Hacking
IRJET Journal
 
PDF
Lecture 7---Security (1).pdf
ZeeshanMajeed15
 
PPT
Ethics.ppt
ClaudeDex
 
PPTX
Quality of Information and Malware by Ashok Panwar
Ashok Panwar
 
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
PPTX
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 
PPTX
Cybersecurity…real world solutions
ErnestStaats
 
PPTX
Cyber Security
MohammadYahyaMansuri
 
PPTX
4- Online Search and the different Search Engine.pptx
VANESSADELACRUZ64
 
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
kuzykedje
 
PPTX
Security in IT (data and cyber security)
Rohana K Amarakoon
 
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 
Introduction in Computer Science Ethics
fificoco
 
Ethical hacking
Mohammad Affan
 
Final report ethical hacking
samprada123
 
Social Engineering - By Chris Hills
Chris Hills CPP, CRMP
 
Network security
mena kaheel
 
ch 6 cyber security Organizational Implications.pptx
jpsarwade
 
IRJET- Ethical Hacking
IRJET Journal
 
Lecture 7---Security (1).pdf
ZeeshanMajeed15
 
Ethics.ppt
ClaudeDex
 
Quality of Information and Malware by Ashok Panwar
Ashok Panwar
 
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 
Cybersecurity…real world solutions
ErnestStaats
 
Cyber Security
MohammadYahyaMansuri
 
4- Online Search and the different Search Engine.pptx
VANESSADELACRUZ64
 
Principles of Information Security 6th Edition Whitman Solutions Manual
kuzykedje
 
Security in IT (data and cyber security)
Rohana K Amarakoon
 
Ad

More from Rohana K Amarakoon (20)

PPTX
Importance of education to everyone & how to improve education
Rohana K Amarakoon
 
PPTX
How to enhance social awareness on NCD's and STD's
Rohana K Amarakoon
 
DOCX
General data protection regulation - European union
Rohana K Amarakoon
 
PPTX
What is agile?
Rohana K Amarakoon
 
PPTX
Effective communication
Rohana K Amarakoon
 
DOCX
Software Change request form
Rohana K Amarakoon
 
PPTX
Process for requirement identification & development in software development
Rohana K Amarakoon
 
DOCX
Project Management - AIB (MBA)
Rohana K Amarakoon
 
PDF
Entrepreneurship AIB (MBA) 2016
Rohana K Amarakoon
 
PDF
New Product Management AIB (MBA) 2016
Rohana K Amarakoon
 
DOC
Operations Management - AIB (MBA) 2015
Rohana K Amarakoon
 
DOC
Leadership - AIB (MBA) 2015
Rohana K Amarakoon
 
DOC
Strategic Management - AIB (MBA) 2015
Rohana K Amarakoon
 
DOC
Corporate Governance - AIB (MBA) 2015
Rohana K Amarakoon
 
DOC
Strategic Human Resource Management - AIB (MBA) 2015
Rohana K Amarakoon
 
PPTX
Project Management Best Practices
Rohana K Amarakoon
 
PPTX
Policies & Laws in IT industry
Rohana K Amarakoon
 
PPTX
Software Quality Assurance
Rohana K Amarakoon
 
PPTX
Professional bodies in IT
Rohana K Amarakoon
 
PPTX
security in it (data and cyber security)
Rohana K Amarakoon
 
Importance of education to everyone & how to improve education
Rohana K Amarakoon
 
How to enhance social awareness on NCD's and STD's
Rohana K Amarakoon
 
General data protection regulation - European union
Rohana K Amarakoon
 
What is agile?
Rohana K Amarakoon
 
Effective communication
Rohana K Amarakoon
 
Software Change request form
Rohana K Amarakoon
 
Process for requirement identification & development in software development
Rohana K Amarakoon
 
Project Management - AIB (MBA)
Rohana K Amarakoon
 
Entrepreneurship AIB (MBA) 2016
Rohana K Amarakoon
 
New Product Management AIB (MBA) 2016
Rohana K Amarakoon
 
Operations Management - AIB (MBA) 2015
Rohana K Amarakoon
 
Leadership - AIB (MBA) 2015
Rohana K Amarakoon
 
Strategic Management - AIB (MBA) 2015
Rohana K Amarakoon
 
Corporate Governance - AIB (MBA) 2015
Rohana K Amarakoon
 
Strategic Human Resource Management - AIB (MBA) 2015
Rohana K Amarakoon
 
Project Management Best Practices
Rohana K Amarakoon
 
Policies & Laws in IT industry
Rohana K Amarakoon
 
Software Quality Assurance
Rohana K Amarakoon
 
Professional bodies in IT
Rohana K Amarakoon
 
security in it (data and cyber security)
Rohana K Amarakoon
 

Recently uploaded (20)

PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PDF
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
PPTX
Presentation about variables and constant.pptx
safalsingh810
 
PDF
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
Appium Automation Testing Tutorial PDF: Learn Mobile Testing in 7 Days
jamescantor38
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
What to consider before purchasing Microsoft 365 Business Premium_PDF.pdf
Q-Advise
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
Activate_Methodology_Summary presentatio
annapureddyn
 
Presentation about variables and constant.pptx
safalsingh810
 
49784907924775488180_LRN2959_Data_Pump_23ai.pdf
Abilash868456
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
Appium Automation Testing Tutorial PDF: Learn Mobile Testing in 7 Days
jamescantor38
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 

Social & professional issues in IT

  • 1. Current Topics In Computer Technology Social & Professional Issues In IT Rohana K Amarakoon B.Sc (SUSL), MBCS (UK), MBA (AUS-Reading)
  • 2. Content 1. Why We Need Ethics & Culture 2. Social & Professional Issues (Vulnerability Disclosure) 3. Social & Professional Issues (SPAM) 4. Social & Professional Issues (E-MAIL SCAMS) 5. Social & Professional Issues (HACKING) 2PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 3. Content 6. Social & Professional Issues (VIRUSES & WORMS) 7. Social & Professional Issues (Conflict of Interest) 8. Social & Professional Issues (Prevention) 9. Expected Outcomes 3PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 4. 1. Why We Need Ethics & Culture • Ethics Company has a general sense of ethics that drives the policies it sets • Moral Accepted from an authority, usually cultural or religious • Policy Provides the framework in which a company’s employees are to act in response to various situations • Law Is a separate matter from ethics • Culture Mixture of norms, standards, and expectations for members of a community 4PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 5. 1. Why We Need Ethics & Culture 5PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 6. 1. Why We Need Ethics & Culture 6PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 7. 1. Why We Need Ethics & Culture Evaluate Ethics of an Organization • Formal Ethics Opinion or perceptions officially written and share among employees. • Informal Ethics Describe a body of information that is either not written down or poorly documented, but that nevertheless is consistently and powerfully held in an organization. • Ethical Leadership Positive or Negative ethical Leadership. 7PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 8. 2. Social & Professional Issues (Vulnerability Disclosure) VULNEERABILITY NON- DISCLOSURE • Sign nondisclosure agreement • Non will report vulnerability details to the outside (general public) • Motivation – keep system away from intruders till the fixes are done 8PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 9. 2. Social & Professional Issues (Vulnerability Disclosure) VULNEERABILITY NON- DISCLOSURE • Can you really control information? – Adopting nondisclosure policies • Advantages 1. Nondisclosure empowers management 2. Control over information within the organization • Four main reasons to consider this as bad 1. Leaked or simultaneously discovered 2. Not discovered publicly admins do not have Opportunity 3. No pressure for S/W vendors 4. Difficulty of selecting trusted individuals • The black hat community – Vulnerability issues and organizations They practice policy of nondisclosure 9PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 10. 2. Social & Professional Issues (Vulnerability Disclosure) VULNEERABILITY FULL-DISCLOSURE • The process of broadly disseminating as much information as possible regarding product or system vulnerabilities so that potential victim’s possess the same information as the potential attackers • Revealing of all vulnerability details including the technical details and scripts prior to patches, which fix the vulnerabilities. 10PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 11. 2. Social & Professional Issues (Vulnerability Disclosure) VULNEERABILITY FULL-DISCLOSURE • Potential victims are aware when 1. Implementing IDS 2. Shutting down some vulnerable services 3. System admins activities 4. Product reviews from programmers of the vendor • Ethically handling system vulnerabilities – Who do you notify • Performing full disclosure – How much do other know already? 11PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 12. 2. Social & Professional Issues (Vulnerability Disclosure) ETHICAL DUTY TO WARN • Writers exposing system weaknesses – Should you disclose all information? • Instilling public fear with full disclosures – Err on the side of caution PATCH DEVELOPMENT • Detecting and fixing product vulnerabilities 1. Taking the market advantage – Should you communicate? 2. Combining system fixes with security patches – Adding more risk? 12PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 13. 2. Social & Professional Issues (Vulnerability Disclosure) RESPONSIBLE DISCLOSURE PLANS • The purpose of “responsible disclosure” is to allow customers of a vendor product ample time to protect their systems from exploitation and attack. • The primary goal is to minimize that period of time to reduce the occurrence of attack 1. The Fisher Plan, Government disclosure – Is it necessary? (Dennis Fisher) 2. The responsible disclosure forum – Should one be created? 13PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 14. 2. Social & Professional Issues (Vulnerability Disclosure) RESPONSIBLILITY FOR VULNERABILITY REPORODUCTION 1. Vendor coordination 2. Determining a deadline for repair based on the severity of the vulnerability 3. Fix vulnerabilities within the set timeline 4. coordinating a public disclosure 5. Issue financial compensation to the discoverer 14PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 15. 3. Social & Professional Issues (SPAM) SPAM spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may be identity theft. How to avoid SPAM emails • Tuning the spam filter – False positive • Research grade spam killers & blacklists – Do they work? 15PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 16. 3. Social & Professional Issues (SPAM) 16PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 17. 4. Social & Professional Issues (E-MAIL SCAMS) E-MAIL SCAMS Email scam is an unsolicited email that claims the prospect of a bargain or something for nothing. Some scam messages ask for business, others invite victims to a website with a detailed pitch. Many individuals have lost their life savings due to this type of fraud. Email scam is a form of email fraud. MONITORY GAIN • Help me move my money from my country – Government must set tone • Free Credit Report e-mail – Can you tell the difference • eBay and PayPal scams – You should be more aware ? 17PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 18. 4. Social & Professional Issues (E-MAIL SCAMS) What should you do if you’ve received a scam email? • Do not click on any links in the scam email. • Do not reply to the email or contact the senders in any way. • If you have clicked on a link in the email, do not supply any information on the website that may open. • Do not open any attachments that arrive with the email. 18PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 19. 4. Social & Professional Issues (E-MAIL SCAMS) 19PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 20. 5. Social & Professional Issues (HACKING) HACKING Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker. Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them. 20PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 21. 5. Social & Professional Issues (HACKING) HACKING • Hacking for business warfare – Is it just part of the business? • Giving it to the distributed denial of service “Hacktortionists” – Do you pay? • Hacking for educations – Is it just about learning? • OS attacks – Go after the bad guys? • Cracking screen saver password – Should you or shouldn’t you? • Spoofing – Does it serve a purpose? 21PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 22. 5. Social & Professional Issues (HACKING) http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ 22PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 23. 6. Social & Professional Issues (VIRUSES & WORMS) VIRUSES A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected“. WORMS A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. 23PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 24. 6. Social & Professional Issues (VIRUSES & WORMS) VIRUSES & WORMS • Virus development for profit – Is it appropriate? • Bounty hunters for virus writers – A Deterrent? • Acceptable virus tolerance level – Is there one? • System crashes – Should you reformat the HD? • Attacking attackers – Go on the offense? • Bypassing alerts – Never a good idea 24PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 25. 7. Social & Professional Issues (Conflict of Interest) 25PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 26. 7. Social & Professional Issues (Conflict of Interest) CONFLICTS OF INTEREST 26PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 27. 7. Social & Professional Issues (Conflict of Interest) CONFLICTS OF INTEREST 27PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 28. 7. Social & Professional Issues (Conflict of Interest) 28PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 29. 7. Social & Professional Issues (Conflict of Interest) CONFLICTS OF INTEREST • Crossing the audit line too far – Should you offer solutions? • Disclosing Referral fees – Must you tell? • Receiving gifts as an auditor – Should you decline? • Relationships with Management – Will it affect the results? • Using audit information – When is it okay? • Divulging audit information to the Competition – What about your reputation? 29PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 30. 8. Social & Professional Issues (Prevention) ENCRYPTION Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text 30PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 31. 8. Social & Professional Issues (Prevention) ENCRYPTION 31PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 32. 8. Social & Professional Issues (Prevention) ENCRYPTION • Backup keys – Are they necessary? • VPN encryption – Utilize for personal gain? • Sending unencrypted documents – Should it ever occur? • Victim of industrial espionage – Who’s responsible? • Is industrial espionage ethical – Common behavior? • Law enforcement & viewing irrelevant data – Do you have a contingency plan • Selling encryption tools globally – Did you do the research? 32PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 33. 8. Social & Professional Issues (Prevention) ENSURING INFORMATION SECURITY IN THE PERSONAL LEVEL • Lying to clients regarding corporate security – Is this ever a good idea? • Handling evidence on Personnel – A difficult situation • Security reprimands Contractors vs. Personnel – Treat equally? 33PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 34. 8. Social & Professional Issues (Prevention) CODING PRACTICES • Bad code – Whose problem is it? • Weak code – Is it ever OK? • Correct use of memory – Fixed vs. Dynamic • Ethical use of system resources – Are you using or abusing privileges? • Redoing code due to management changes – Should you do it? • Staying current with coding-practices – What if it is not in your schedule? • Commenting code – When is it OK not doing it? • Omitting code comments for job security – Should you play the game? • Pseudocode – Is it worth your time? 34PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 35. 8. Social & Professional Issues (Prevention) CODE MAINTENANCE • Modifying a secure design of a program – Is it ever appropriate? • Affecting overall quality of a program – What is acceptable? CODE REVIEW • Lazy reviewers – Do you do it? • Following standards – How strict you should be? • Automated code review – Do you trust the software or yourself? 35PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 36. 8. Social & Professional Issues (Prevention) 36PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 37. 8. Social & Professional Issues (Prevention) ETHICAL RESPONSIBILITY • Confidentiality • Availability • Integrity • Communication INTERNET SERVICE PROVIDER CUSTOMER SERVICE • Updates of ISP software – Should you download what you need? • Pop-up advertising – Should ISP’s be responsible for blocking them? • ISP – Updating your OS? • ISP blocking email – Do you have a choice? 37PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 38. 8. Social & Professional Issues (Prevention) BUSINESS ETHICS OF OTHERS • Personal & Professional business – When it is not separated? • Overhead conversations – What should you report? • Deliberately misconduct – Should you blow the whistle? • Disgruntled employees – What if you think there is a reason to worry? JOB PERFORMANCE OF OTHERS • Skipping standard operation procedure – When your coworker does it • Reporting errors – What about when it’s your first day? • Warning unheard – When you raise an issue that is ignored? 38PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 39. Expected Outcomes • Understand about the why social and professional issues in IT • Understand about the nature and challenges to overcome the social and professional issues in IT • Get to know about what are the ways that individuals, organizations and regulatory bodies could prevent such issues happen again and again • Study about how we could work under proper environment and avoid social and professional issues. 39PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)
  • 40. Thank You! 40PST 32220 - Current Topics In Computer Technology (Lecturer : Mr. Rohana K Amarakoon)