StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security, Privacy and Ethics - Term Paper Example

Cite this document
Summary
The author states that with the implementation of an effective security mechanism we can gain a great deal of confidence while using these systems at home or marketplace. This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Security, Privacy and Ethics
Read Text Preview

Extract of sample "Security, Privacy and Ethics"

ID # Security, Privacy and Ethics Introduction At the present, the use of modern technologies such as information systems, computer networks and databases has become essential for the business organizations. Without a doubt, they offer a wide variety of advantages and opportunities for all kinds of businesses. On the other hand, they also cause many issues regarding security, privacy and ethical attacks. In this scenario there is a vital need for the adoption of enhanced security and privacy solutions.

In addition, the application of such security based solutions demands effective security management knowledge and expertise. With the implementation of effective security mechanism we can gain a great deal of confidence and peace of mind while using these systems at home or marketplace (Shelly, Cashman and Vermaat; Turban, Leidner and McLean). This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems. Security, Privacy and Ethical Issues There are many issues and threats which are hindering the successful operation and working on information and computer system arrangements.

In this scenario, one of the initial risks is security issues from less effectively recruited staff personnel. For instance, any staff member with some illegal aims and objectives can set a virus in the database or hack the overall corporate information. Additionally, this is one of the major ethical dilemmas in information and computer systems (UN; Farshchi, Gharib and Ziyaee). In addition, differences in operating systems, versions and patches can also create various problems and issues regarding defense and protection of information and computer systems.

In the absence of such protection strategy the overall information and data can be hacked or deleted. In worst case the business information can be accessed by corporate competitors. Additionally, absence of antivirus software for information and computer systems can also cause a huge problem for personal or business data and information. In case of such situation any virus can simply attack and destroy or stop the overall working of systems. In addition, one of the main issues is about the absence of internal firewalls.

In this scenario, any user of systems and web services are open to virus attacks, malware, or Trojan attacks. In such situation overall information and computer systems can be hacked or influenced in case of effective handling and management of operations (UN; Farshchi, Gharib and Ziyaee). How Security, Privacy and Ethical Issues Happen? This section discusses how some of the major and critical security, privacy and ethical issues happen. These issues can be about single network, corporate, business, shop, individual or any kind of person: (UN; Farshchi, Gharib and Ziyaee; Mookhey) Lack of suitable security policies No enhanced cryptographic modules No Backups No recording logs for users from external interaction Have no suitable intrusion detection system No facility of backup snapshots Have no Secure File Transfer Protocol (SFTP) Have no Secure Socket Layers (SSL) No suitable and updated anti-virus and anti-spyware software There is no documented policy There is no content filtering There is no documentation for any of the setup There is no firewall in existence Security, Privacy and Ethical Issues Mitigation This section presents the mitigation and management of critical security, privacy and ethical Issues.

This section outlines some of the major methods and techniques for implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of security, privacy and ethical issues. In this section I have suggested some of the important methods and techniques those will be used for the enhanced and effective management of security, privacy and ethical issues: (Magalhaes; Danchev) Firewalls Information technology and computer systems can be protected through firewall system that is an essential element of network which is used by the people to access the Internet.

Service packs For information and computer systems service packs are an essential technology. It basically encompasses new definitions of virus and attacks those can be handled through such technology setup. Antivirus This is also one of most important security management solutions used by approximately all individuals and organizations for the overall management of security and privacy. Strong password practices In order to protect a system against the outsider attacks we need to build strong passwords.

In this scenario we need to choose less frequently used names and numbers so that an outsider cannot gain access to our system. Other Solutions Digital Signatures and Certificates Secure Socket Layers PCI, SET, Firewalls and Kerberos Advanced Data Encryption Instant Suspicious Activity Notifications Payment Processing Technology Conclusion At the present, the use of information technology has become for all the businesses and industries. Despite a number of advantages of information technology there are certain issues also involved with the implementation of information technology.

In this scenario, information security, privacy and ethics are some of the most important issues that need to be addressed in order to make best use information technology. In addition, there are many solutions and techniques which can be adopted to deal with these issues. Works Cited Danchev, Dancho. Building and Implementing a Successful Information Security Policy. 2003. 03 December 2012 . Farshchi, Seyyed Mohammad Reza, Fariba Gharib and Reza Ziyaee. "Study of Security Issues on Traditional and New Generation of E-commerce Model.

" 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011). Singapore: IACSIT Press, 2011. 113-117. Magalhaes, Ricky M. Hardening Windows NT/2000/XP Information Systems. 23 July 2004. 19 November 2012 . Mookhey, K. K. Common Security Vulnerabilities in e-commerce Systems. 02 November 2010. 27 November 2012 . Shelly, Cashman and Vermaat. Discovering Computers 2005. Boston: Thomson Course Technology, 2005. Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy.

New York: Wiley, 2005. UN. Youth and Information and Communication Technologies (ICT). 2003. 25 November 2012 .

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Writer's choice Term Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Writer's choice Term Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1610039-writers-choice
(Writer'S Choice Term Paper Example | Topics and Well Written Essays - 750 Words)
Writer'S Choice Term Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1610039-writers-choice.
“Writer'S Choice Term Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1610039-writers-choice.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security, Privacy and Ethics

Privacy of the Users on the Web

privacy on the Web (Name) (University) (Date) privacy on the Web Introduction With the growing popularity of internet and information technology, today a notable percent of people depend on web services to perform their various daily tasks effectively and to save considerable amount of their time and money.... Although web providers guarantee the confidentiality of user data, security of customer information is often compromised due to several reasons and this situation negatively affects users' privacy on the web....
4 Pages (1000 words) Essay

Security, Privacy and Ethical Issues in Information Systems

In addition, many businesses gather and store personal information of the potentially new and existing customers in their systems which give rise to privacy and information security issues.... This standard deals with the applying adequate controls to ensure confidentiality, availability, and integrity of information; and protection of legal, privacy and security rights of the customers.... This essay discusses that presence of the internet and distributed applications provide a wealth of information and knowledge to users; but at the same time, they contribute towards the development of new and innovative forms of data and personal privacy, ethical and security threats....
7 Pages (1750 words) Essay

Computer Science-Information System

Therefore, it is necessary to promote ethically responsible use of information systems on the base of developed codes of ethics, e.... AITP code of ethics.... This code of ethics is a set of obligations to management, fellows, society, employer, and country.... There is an obvious contradiction between an employee's right to privacy at work and efforts of a company to protect its information and business.... Therefore, often companies try to protect own information systems at the expense of employees privacy....
3 Pages (750 words) Essay

Ethical Analysis: Facebook Privacy

Include the applicable provisions of that ethical test (you can use any ethical test you feel applies, including and not limited to the cowboy code, Kantian ethics, utilitarianism, the ACM code of ethics, the class ongoing ethics standard, etc.... he action here is that Facebook has changed its privacy policies without informing users as to what the changes would mean for their personal information and the way that data is shared on the internet....
1 Pages (250 words) Essay

Ethical Issues within Information Technology

The ethics of Information Technology and Business.... ethics in Information Technology.... Ethical issues within information technology can be defined as a frame work which considers moral issues concerning use of information and its privacy.... The five ethical issues within information technology are… Information technology helps to find and share relevant information online but it exploits the privacy.... Uses of internet webcams, use of social networks are few ways to exploit the freedom of privacy....
2 Pages (500 words) Essay

The Ethics Privacy Policy

"Effective ethics is a team effort involving the participation and support of every Company employee" (Institute, 2014).... All employees have an obligation to know the ethics Privacy guidelines set by the company.... The company will thus hold liable the person who breaks the privacy rules of any of its parties.... The overall goal of setting up the privacy policy is for the company to create an environment of trust and security....
3 Pages (750 words) Essay

Social Networking in the Workplace

This assignment "Social Networking in the Workplace" outlines the communication cost benefits, networking with other interrelated business units or customers, and how effective the personnel uses it in line with the organization's security, privacy, and ethics operations.... To ensure privacy and security, a computer setting has been one of the measures taken by most companies to ensure that the data is not accessed and there is limited anxiety for the users about privacy....
7 Pages (1750 words) Assignment

Effects of Ethics on Pursuit of Security

The author of the current paper "Effects of ethics on Pursuit of Security" argues in a well-organized manner that ethics has a significant indirect impact on security.... ethics and safety are bounded by values that are enshrined in the law systems.... hellip; Utilitarian ethics is formed on the premise that any act that offers a great extent of good over evil is regarded as a moral or ethical choice (Heywood, 2015).... ethics are aligned with the preservation of the rights of an individual....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us