Preview

Ethics, Legal, and Compliance Issues in Cybersecurity

Good Essays
Open Document
Open Document
621 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics, Legal, and Compliance Issues in Cybersecurity
Advanced Topologies, Inc.

Advanced Topologies, Inc. needs to look at its Human Resources department and how they train their new employees. Right now the threat will mostly come from Matthias because he has been working without the knowledge needed to look for security threats. Without the right training for your employees, you run the risk of being your own threat. To remove the risk that Matthias may bring to ATI, he should have been properly trained before starting. All administrators should have the information security training before working on ATI’s network. Alfonso should be aware of what security concern will affect ATI, but as the superior, he did not seem overly concerned about the security of the network. Ensuring that personnel have the right skills to administer your network is a plus for a superior. Alfonso should not have not allowed Matthias to work on the network, without first informing him of all of his responsibilities. Once the inside threat has been removed we can now move on to looking at other users. Network monitoring is just important as knowing how your network runs. With the right training, you will know what threats to be aware of.

Threats can be encounter by a network administrator. One can come from the administrator because even after training is complete, they still can make errors if they do not understand what they have learned. Human error is still a factor but from a different point of view. If an administrator had the training and his expectation was just to be an administrator and not deal with security, he may not be too concerned about the security aspect of the job. New administrators must clearly understand what position they are being hire for. Matthias did know he was going to have to take basic information security training; it was a surprise to him. Another thing that will affect a new employee is if the supervisor is not engaged in the training of the new employees. This also can be one of the

You May Also Find These Documents Helpful

  • Good Essays

    FXT2 Task 2 Follow Up

    • 799 Words
    • 3 Pages

    Taken holistically, this indicates an employee who knew the organization and the company’s network quite well. This employee knew basic network attack tactics, and the checks and balances that…

    • 799 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    C200 Task 1

    • 4180 Words
    • 12 Pages

    The organization chosen is ABE Defense Systems. ABE Defense Systems is a global organization and a premiere defense contractor, specializing in defense, aerospace and cyber security. The organization that will be discussed is the network operations center of ABE Defense Systems. The leader selected is the director of the network operations center. The reason the director of network operations center was selected was to better understand the role and requirements of the position. This is a challenging position, responsible for the oversight and operations of all information technology’s “break and fix” services provided to its customers, the engineers and non-technical employees of ABE Defense Systems.…

    • 4180 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Better Essays

    Aircraft Solution

    • 1151 Words
    • 5 Pages

    It is very curious that there is no firewall implemented between the
commercial division and the Internet. The Defense Department must be routed through
Headquarters, but the Commercial department is connected straight to the Internet. This is a
significant vulnerability. The second weakness that will be examined is the security policy
stating router and firewall rule sets should be evaluated every two years. Such a time span
between rule-set evaluations is also a substantial liability to the continued and unimpeded
 success of the organization. Further elaboration of the identified security vulnerabilities is 
presented.…

    • 1151 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Locates a news article based on a recent event on ethical issues related to information technology; for example, Wikileaks, Snowden, and so forth…

    • 465 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Companies like Google are straying away from the once popular Virtual Reality, in favor of what they are calling “Augmented Reality”, or AR. According to Merriam-Webster, AR is “an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device (as a smartphone camera); also: the technology used to create augmented reality.” (Merriam-Webster, n.d.) In order to “augment” our realities, these technologies are recording, storing, altering, and displaying information in real time. The information they use can be anything, but with products like Google Glass, wearable technology can now modify what and how we see objects, people, or data, in real time.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Mayo, H. B. (2012). Basic finance: An introduction to financial institutions, investments, and management (10th ed.). Mason, OH: South-Western.…

    • 2174 Words
    • 9 Pages
    Better Essays
  • Good Essays

    I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Ethics and Compliance

    • 1462 Words
    • 6 Pages

    In this paper we will as a team: Assess the role of ethics and compliance in your organization’s financial environment. Describe procedures your organization has in place to ensure ethical behavior. Explain how financial markets work in the United States. Identify processes the organization uses to comply with SEC regulations. Evaluate your organization’s financial performance during the past 2 years, using financial ratios. Calculate the ratios for each year: Current, Debt, Return on equity Discuss the trend for each ratio and what it tells you about the organization’s financial health.…

    • 1462 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Ethics and Compliance

    • 1788 Words
    • 8 Pages

    Employees participate in a certification each year to maintain Lowe’s Code of Conduct. Each employee must report any unethical behavior witnessed or any…

    • 1788 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Simple communication among the various departments could have prevented some of the issues (Devito, 2012). Based on data and the critical security of its customers the security department was not trained as a whole in all that needed to be and it only protected the physical security of the company. The lack of staff and their performance resulted in the various problems faced by the company.…

    • 2421 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cyber Ethics

    • 1006 Words
    • 5 Pages

    The chapter 12 narrative by Joseph Menn, “Hackers Live by Own Code”, establishes the claim that hackers have several ways to justify their actions. In order to illustrate this claim Menn uses the example of Mary Ann Davidson. It all started when Davison, the chief security officer for Oracle Corp., received a fax from a hacker in the Middle East stating that he was able to pilfer information from corporations such as Boeing Co., Ford Motor Co. and the CIA (Lawrence Hinman, 463). It is no surprise that once Davidson was aware of this she took immediate action and contacted the hacker. However, what was surprising is that after she contacted the hacker, Davidson described him as a “nice guy” (Hinman, 463). The significance of this example is that Menn is emphasizing the point that despite public opinion hackers are just like any ordinary person.…

    • 1006 Words
    • 5 Pages
    Good Essays