Tuesday, April 5, 2011

Chapter Four - Ethics and Security

1. Explain the ethical issues surrounding information technology.

Ethical issues surrounding information technology arise from the use and development of Information technologies, as well as the creation, collection, duplication, distribution and processing of information. Ethical dilemmas can occur when there's a clash between competing goals, responsibilities and loyalties. Individuals copy is an example of a questionable information technology and it is the use and distribute of software. Other example of questionable information technology use also include, employees search organisational databases for sensitive corporate and personal information, organisations collect, buy and use information without checking the validity or accuracy of the information, individuals create and spread viruses that cause trouble for those using and maintaining IT systems, individuals hack into computer systems to steal proprietary information and lastly employees destroy or steal proprietary organisation information such as schematics, sketches, customer lists and reports. Technological advancements, and newfound ways of collecting and presenting customer information, are providing new ethical dilemmas for organisations. Because much technology is so new and pervasive in unexpected ways, the ethics surrounding information are still being defined. Ethical issues are not sometimes legal issues as difficulty can arises in determining when an organisation or individual has acted unethically.

 



Ethical computer use policy : contains eneral principles to guide computer user behaviour












2. Describe a situation involving technology that is ethical but illegal.


A worker is swamped with work and is in a massive arush to finish the final propsal for a new product.This data is crucial for the business' future nad if it leaks out, the company will go broke.  It is almost their finish time and they want to get out of the office. They decide to save the work they were doing onto an external hard drive, with the intention of finishing it later that night.




3. Describe and explain one of the computer use policies that a company might employ


The company can employ the policy of not allwoing employees to bring external hard drives/usb's or other devices to store data onto.


4. What are the five main technology security risks?


Human error
Natural Disasters
Technical Failures
Deliberate Acts

Management Failure
5 main types of technology secuirty risk


5. Outline one way to reduce each risk.

Human Error - get someone else to double check
Natural Disater - not much you can do, act of nature
Technical Failures - double store data in a safe place
Deliberate Acts - have anit virus and anit spam software
Management Failure - have more than one person working on the same thing

6. What is a disaster recovery plan, what strategies might a firm employ?

A disaster recovery plan is the process of regaining access to computer systems and data after a disaster has taken place. Strategies they might employ include:
- havnig files backed up on a secure network
- have regular recovery testing




No comments:

Post a Comment