StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security and Ethics - Essay Example

Cite this document
Summary
Others will destroy or even scramble the saved data in the computer. Some of the characteristics of these viruses are that they undertake the damage in hidden form and only notice after the damage…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Information Security and Ethics
Read Text Preview

Extract of sample "Information Security and Ethics"

Information Security and Ethics Security Threat A of the security threat, its impact, and an example. What can be done keep information secure from the threat. (Technology: software or hardware), organizational strategies.Computer VirusDescription: these are created programs or data that are introduces in the networks or even the personal computer, with the intention of destroying the computer.Impact: the viruses change the coding of the program hence making them unusable. Others will destroy or even scramble the saved data in the computer.

Some of the characteristics of these viruses are that they undertake the damage in hidden form and only notice after the damage is done. They also carry out their activities very rapidly.Example of a Computer Virus; auto run virus, worms.Technology (software, Hardware): this will require the organization to install antivirus in their computers to ensure the viruses are destroyed before they attack. The organization may also be required to back up the data in safe external hard disk.Organizational strategies (policies, leadership, training, etc.) specification is one policy that would be required where each employee has his or her computer, to prevent spread of viruses when one is infected.

Further, the organization should control the sites in the network and also external devices plugged into to the computer.Adware This can be appropriately be described as type of software that support advertisements. It displays or downloads a banner that is not wanted by the user, within his or her software. The software is most of the time embedded with the software of interest by the manufacturer, with the intent of sinking the cost of development. The impact of the adware to the network or the computer is over loading.

This leads to computer breakdown or even slow transfer of data. Also, this gives room for the entrance of viruses.Example adware is the advertisement of a link involving courses offered by a university, location and also their facilities.With regard to protecting the organization system from adware, the organization should ensure that, only licensed and registered software is purchased. They should also install antivirus to attack the abrupt advertisements. Furthermore, it should within the planning of the organization, to trades with licensed software producing companies.

It should also ensure that employees have clear instruction as to whom to consult in case of software installation in their computers.Spyware This is software that is referred to as malware, which invades the privacy of the user, by gathering the user information and gaining access to his software and then display the adverts on it.The impact of the threat is that it can either corrupt the data or steal the information stored by the user. Example is the computer virus which decodes or corrupts the system information of the computer, autorun For this threat, the organization will be required to install both firewall and antivirus.

Furthermore, the information being transmitted should be encrypted and backed up in safe external disks. The organization should only trade the software with registered companies. They should be the only legal operators of the software.Trojan It is defined as a malicious set of instructions that executes actions within the machine without user’s legal authorization. The impacts of Trojan include data copying, modification, blocking, deleting or even disruption of network and computer performances.

Example is Backdoor Trojan.  This threat requires antivirus installation. Data backup would also serve as a solution. The organization management should ensure that external portables are fully scanned before plugging.Sniffer It is also referred to as network monitor. It is defined as set of instructions, which analyses and monitors the traffic within the network. It also detects problems and bottlenecks. The impact on the organization is that; it can be employed illegitimately by hackers, to siphon the information being transmitted.

Example is a network router Installation of firewall, security passwords, and data encryption should be done. The local connection within the organization should have identification, such that; only those people permitted to access, can gain entry in to the system.Any other threatAnother threat experienced by the organizations is hackers. These are unwarranted users of network or computer. Their impact to the organization includes stealing of data, or even worse deleting the crucial system information.

 With regards to hackers, the organization would be required to install a firewall, to block unwarranted users. They would also be required to encrypt the information while transmitting the information. The organization should ensure there is a system centre where all the operational computers and networks are monitored. Furthermore, they should educate the employees the essence of data protection and encryption.Work citedInternet Security, Encyclopedia of Business 2nd ed. Retrieved from http://www.

referenceforbusiness.com/small/Inc-Mail/Internet-Security.html#bMoore, A. P., & Shimeall, T. J. (2007), Protecting Against Insider Threat Retrieved fromhttp://www.sei.cmu.edu/library/abstracts/news-at-sei/securitymatters200702.cfmhttp://www.epolicyinstitute.com/Elleithy, Khaled. Innovations and advances in computer, information, systems sciences, and engineering. New York, NY: Springer, 2013. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/business/1632597-information-security-and-ethics
(Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 Words - 1)
Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/business/1632597-information-security-and-ethics.
“Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/business/1632597-information-security-and-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security and Ethics

Apply design guidelines to human-computer interaction methods

?Information Security and Ethics: Social and organizational issues.... Moreover, the peck simplifies the entries into the website; thus, may interfere with the security of the page thereby interfering with the organization's business operation (International Quigley, 2004).... Search box; the use will use to look for intended information 5.... Additionally, the website will be a vital tool in the users' life since it will related with the management of an organizations; thus, it will provide crucial organizational information to employees....
3 Pages (750 words) Essay

Security issues associated with Social Media

The significance of the social media sites are being used for local and professional networking, marketing, business and job searches ad crucial mechanisms to enhance revenue of sales, keep people informed of security and other associated issues and as a mechanism to reconnect with colleagues in diverse places.... security ISSUES ASSOCIATED WITH SOCIAL MEDIA Name University Course Instructor Date Introduction People utilizing increasingly workable and available publishing techniques create social media, which is an online element....
3 Pages (750 words) Essay

TCP/IP - SDLC

During the development process, the security of the project needs... System Development Lifecycle (SDLC) System development lifecycle consists of the stages that are involved in the development of information systems.... TCP/IP-SDLC Name: Professor: Institution: Course: Date: Transmission Control Protocol and Internet Protocol (TCP/IP) A protocol is a set of rules through which a computer must follow to communicate over a network....
3 Pages (750 words) Research Paper

Introduction of New Technology Into a Society

Is the new media, boosted by new technologies, making communication and information accessible to all people? The With all the praises heaped on the ability of the Internet to empower people, the facts tell us a different story.... 252) Furthermore, while the new media, particularly in the area of information technology, provides us enabling benefits, it is important to underscore that technological developments are themselves shaped by socially bound perceptions of the needs, interests, and purposes that technology serves....
5 Pages (1250 words) Essay

CASE 5 Information Security and Ethics

The organization should make the employees of all levels signed into the document where policies have been stated transparently after distributing and describing the issues about information security.... The implementation of the e-business framework has led many organizations into serious threat about information security.... For these reasons, some protocols are generally set inside an organization to make the information security system more...
4 Pages (1000 words) Essay

A Reflection on the Performance in a Professional Environment

The essay entails enormous consideration into UK laws attaching on the exposure of confidential information regarding the patients' health conditions and how it has affected my role as a health worker in the UK.... The reflexive essay entails enormous consideration into UK laws attaching on the exposure of confidential information regarding the patients' health conditions and how it has affected my role as a health worker in the UK.... ccording to UN Economic Commission for Europe, 2009, confidentiality is an entrenched obligation and mandatory to any provider of certain data or information to highly maintain the privacy of the information (Tranberg & Rashbass, 2004, p79)....
6 Pages (1500 words) Essay

Database Security and Privacy Principles

Information Security and Ethics: Concepts, methodologies, tools and applications.... Some information is deemed to be… Several laws relating to database security and privacy have been promulgated in different countries across the world.... If Database security and Privacy Principles Personal information (PI) could be gathered, held, and used for many different purposes and through different methods.... Several laws relating to database security and privacy have been promulgated in different countries across the world....
1 Pages (250 words) Essay

ELECTRONIC COMMERCE AND INFORMATION SECURITY AND ETHICS

Therefore, the automotive industry has also not been left out with the tremendous gains of electronic commerce.... As a consumer, one such benefit that electronic… Selling and purchasing of both new and used vehicles have been made easier.... Consumers can now choose from a list of vehicles online, view prices, and place orders (Kelly & Rowland, 2000)....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us