Preview

Handling Security And Ethical Issues IT

Better Essays
Open Document
Open Document
1627 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Handling Security And Ethical Issues IT
Handling Security and Ethical Issues
Handling Security and Ethical Issues at TBWI
Course: IT560-01
Handling Security and Ethical Issues at TBWI
A growing concern, especially with the recent information leak at Target, is the issue of security. Outlined are security concerns for TBWI and how best to handle them. In addition to handling security issues, there may be complicated ethical issues that may occur. To best handle these situations, those ethical issues are addressed, with recommendations for how best to handle them.
Security Concerns
In 2013, B2B International and Kaspersky Lab conducted a Global Corporate IT Security Risks survey and the results were quite startling. In a conservative estimate, “The average damage suffered by large companies from a single serious incident was $649,000. For small and medium-sized companies, the average damage was $50,000” ("Global corporate it," 2013). These damages can be the result of fines, lawsuits, as well as lost revenue from customers, who no longer have faith in the security of the company. It takes many years for a business, such as TBWI, to build a reputation, but it can all be lost in a matter of seconds. Because of this, the following security concerns need to be recognized, with a plan in place for prevention.
External threats
External threats are those that occur from people not involved with TBWI. These could be competitors or random hackers or thieves. These types of threats can occur at the software and hardware level.
External Software Threats and Solutions.
At the software level, the types of crimes include viruses, spam emails, phishing emails, data sniffers, denial of service (DOA) and other cyber-attacks.
To protect against these threats, the first thing needed is a strong firewall needs to be in place on all of the servers to help build a defense against viruses being sent to the server or any workstations. Complementing the firewall should be a type of intrusion detection software that



References: Global corporate it security risks: 2013. (2013). Retrieved from http://media.kaspersky.com/en/business-security/Kaspersky_Global_IT_Security_Risks_Survey_report_Eng_final.pdf Relkin, J. (2006, August 15). 10 ethical issues confronting it managers. Retrieved from http://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/ Shinder, D. (2005, August 02). Ethical issues for it security professionals. Retrieved from http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?pageNumber=1 Stair, R., & Reynolds, G. (2012) Principles of information systems. Boston: Cengage Learning

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security + 280 Exams

    • 2838 Words
    • 12 Pages

    | (TCO 1) What is the most common threat to information security in an organization?…

    • 2838 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Sabriya states she is a run-away because Santana and her boyfriend (Willie) got into a big altercation. It happened over her bigger sister being sick, but she got caught up in the middle of it. They were yelling and screaming. Willie turned on Sabriya and choked her. He put his hand around her neck, held her down, and choked her. Santana got a stick and hit her. There were no marks/bruises. She ran to a friend’s home, and the police got her and took her to the Juvenile Center on…

    • 91 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Souryal, Sam S. (2007). Ethics in Criminal Justice: In search of the Truth (4th ed.). Cincinnati,…

    • 1753 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mason, R. “Four Ethical Issues of the Information Age”. MIS Quarterly, vol. 10 no. 1. (1996).…

    • 1931 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    information technology

    • 420 Words
    • 2 Pages

    Information technology provides more opportunities for difficult ethic issues to arise as Information technology allows the reduction in both budget and staff. Policy decisions at the very senior level need the sensitivity that IT experts can bring to the table. CIOs will know the capabilities of Information Technology and that the misuse of those capabilities will result in a difficult ethical issue.…

    • 420 Words
    • 2 Pages
    Good Essays