Search Header Logo
Information Systems Security

Information Systems Security

Assessment

Presentation

Computers

University

Easy

Created by

Zety Marlia zainal Abidin

Used 1+ times

FREE Resource

45 Slides • 1 Question

1

Information Systems Security

By Zety Zainal

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

media

12

media

13

media

14

media

15

media

16

Ethics refers to rules of right and wrong that people use to make choices to guide their behaviors

Computer Ethics

media

17

media

18

media

19

Poll

Have you . . . . . .

Copying a software program that you purchased legitimately and distribute it to other end users like friends, family, or anyone else through online?

Using a method known as “cracking” to access protected & copyrighted software that you didn’t purchase.

Distributing software online that you yourself received from a third-party that’s not licensed to sell or give away that software.

Modifying parts of the software (like altering the program’s source code)

20

Examples of Conflicts of Interest At Work

  1. Hiring an unqualified relative to provide services your company needs

  2. Starting a company that provides services similar to your full-time employer

  3. Failing to disclose that you’re related to a job candidate the company is considering hiring

  4. Making arrangements to work for a vendor or client at a future date while continuing to do business with them

  5. Posting to social media about your company’s weaknesses

Some text here about the topic of discussion

21

media

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

media

34

media

35

media

36

media

37

media

38

media

39

media

40

media

41

media

42

media

43

media

44

media

45

media

46

media

Information Systems Security

By Zety Zainal

Show answer

Auto Play

Slide 1 / 46

SLIDE