StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

CASE 5 Information Security and Ethics - Essay Example

Cite this document
Summary
an organization comprises of numerous valuable data acquired by year after year long activities, as well as its internal and external policies and norms framed at the initial stages of its commencement. Written rules and regulations are important to secure those…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
CASE 5 Information Security and Ethics
Read Text Preview

Extract of sample "CASE 5 Information Security and Ethics"

Download file to see previous pages

Because it is unfortunate that a leakage of information committed by an internal employee who accesses almost every details of the valuable information daily. This issue no doubt harms the ethical bonding between the employees and the organizations. But in the case of external trespassing into the organization’s confidential information zone, the blame would directly go to its security system which basically shows the loopholes of its security protocols. But, this is another issue.

The organization should make the employees of all levels signed into the document where policies have been stated transparently after distributing and describing the issues about information security. Definitely, an organization containing three employees would differ from the organization with manpower of thousand people in the sense of organizational information policy. The implementation of the e-business framework has led many organizations into serious threat about information security. From the very commencement of the internet, rather say the from the beginning the internet has came with complications and vulnerabilities that is- its basic communications as well as the nodes, norms about its protocols, authentication of its network and host frameworks etc.

Dissatisfied employees, hackers, opponents and other stakeholders destroyed the internet’s vulnerabilities which caused damages of privacy, financial damages, loosing of customers, interruption in the activities and unpredictability. Many employees were allowed to access internet for authentic business purpose but actually the result went to misuse of information either from lack of compassion for uncertainty, or lack of consciousness of authentic usage of internet in the organization or exactly by the wicked intension.

For these reasons, some protocols are generally set inside an organization to make the information security system more

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CASE 5 Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/business/1631686-case-5-information-security-and-ethics
(CASE 5 Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/business/1631686-case-5-information-security-and-ethics.
“CASE 5 Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/business/1631686-case-5-information-security-and-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF CASE 5 Information Security and Ethics

The concept of a contract

ethics in legal decision making plays a vital role, as it helps in taking legal decisions, which are accepted within the societal context.... Considering the case scenario, it can be observed that two external contractors of DB have leaked some vital information relating to a contract of their company with a Taiwanese's firm.... Concerning with the abovementioned act, it implies about the authority of an organization to create its own privacy rule while making sure that minimum standards are applicable to protect the private information of the company (Andrews, 2011)....
4 Pages (1000 words) Case Study

Responding to Groupthink and Faulty Reasoning at NASA

hellip; As the research paper stresses, Responding to Groupthink and Faulty Reasoning at NASA, the rules and standards of ethical, moral, and legal professions include transparency and confiding all information that is crucial and relevant to ensure that all stakeholders are kept in safe and secure conditions.... I would also solicit as much information as evidently possible to determine alternative courses of action where the Columbia crew could make it back to Earth as innovatively possible....
4 Pages (1000 words) Case Study

Ethics Project

Another thing that underpins my recommendation ethics in Information Technology Part A My recommendation to the company CEO of the Computer Network Security Company regarding the client who intends to buy partial services is that she should decline the client's request.... The ethics of Information Technology and Business.... My recommendation to the company CEO of the Computer Network security Company regarding the client who intends to buy partial services is that she should decline the client's request....
2 Pages (500 words) Case Study

Consultancy Management Techniques for Jaguar Land Rover

nbsp; Most organizations currently use Management information Systems to make decisions such as when to reorder their inventory.... information used to make decisions in JLR can be found in the internal systems of the company.... The data collected will then be mined and translated into meaningful information that will be used to make decisions (Laudon and Laudon, 2004).... The role of the Management information System is to provide managers with valuable information that can be used to make decisions....
6 Pages (1500 words) Case Study

How The Fall of Enron Affected the United States Economy

The paper "How The Fall of Enron Affected the United States Economy" states that Today we have things such as the Sarbanes-Oxley Act 2002 to prevent companies and their managers from engaging in dubious accountancy practices.... This Act was passed to establish more stringent standards.... hellip; Enron had donated a total of $7 million in 1990 in contributions to political figures for their campaigns....
7 Pages (1750 words) Case Study

The Red 5 Staff Login System, Computer-Based Monitoring and Data Security

The paper “The Red 5 Staff Login System, Computer-Based Monitoring and Data security” involves creating a staff log-in system that can be used by the staff of RED 5 to do various tasks, such as to have a user-friendly system to log in and view their employment details.... Some questions to ask may include: Does the system provide security for the data supplied by employees?... For their system employees could include photographs, their contact information, their work journals, experience among others....
9 Pages (2250 words) Case Study

Aldo Zuccolillos Corporate Social Responsibility

Aldo Zuccilillo's personal ethics was that the media was required to regularly criticize the government and openly discuss viewpoints of opposition without censorship.... Its circulation expanded, and it became the most significant source in Paraguay for independent information.... … The paper “Aldo Zuccolillo's Corporate Social Responsibility and Fight for the Freedom of Expression and the Press» is a  forceful variant on case study on media....
9 Pages (2250 words) Case Study

Information Classification in BioMed Company

The information security Manager will endeavor that all members of the group learn how to protect vital information in the right place.... … The paper "information Classification in BioMed Company " is a great example of a case study on information technology.... nbsp;The report is the protection of information from BioMed Company with the help of software such as Global System for Mobile Communications (GSM).... The paper "information Classification in BioMed Company " is a great example of a case study on information technology....
11 Pages (2750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us