Preview

Handling Security And Ethical Issues IT

Better Essays
Open Document
Open Document
1627 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Handling Security And Ethical Issues IT
Handling Security and Ethical Issues
Handling Security and Ethical Issues at TBWI
Course: IT560-01
Handling Security and Ethical Issues at TBWI
A growing concern, especially with the recent information leak at Target, is the issue of security. Outlined are security concerns for TBWI and how best to handle them. In addition to handling security issues, there may be complicated ethical issues that may occur. To best handle these situations, those ethical issues are addressed, with recommendations for how best to handle them.
Security Concerns
In 2013, B2B International and Kaspersky Lab conducted a Global Corporate IT Security Risks survey and the results were quite startling. In a conservative estimate, “The average damage suffered by large companies from a single serious incident was $649,000. For small and medium-sized companies, the average damage was $50,000” ("Global corporate it," 2013). These damages can be the result of fines, lawsuits, as well as lost revenue from customers, who no longer have faith in the security of the company. It takes many years for a business, such as TBWI, to build a reputation, but it can all be lost in a matter of seconds. Because of this, the following security concerns need to be recognized, with a plan in place for prevention.
External threats
External threats are those that occur from people not involved with TBWI. These could be competitors or random hackers or thieves. These types of threats can occur at the software and hardware level.
External Software Threats and Solutions.
At the software level, the types of crimes include viruses, spam emails, phishing emails, data sniffers, denial of service (DOA) and other cyber-attacks.
To protect against these threats, the first thing needed is a strong firewall needs to be in place on all of the servers to help build a defense against viruses being sent to the server or any workstations. Complementing the firewall should be a type of intrusion detection software that



References: Global corporate it security risks: 2013. (2013). Retrieved from http://media.kaspersky.com/en/business-security/Kaspersky_Global_IT_Security_Risks_Survey_report_Eng_final.pdf Relkin, J. (2006, August 15). 10 ethical issues confronting it managers. Retrieved from http://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/ Shinder, D. (2005, August 02). Ethical issues for it security professionals. Retrieved from http://www.computerworld.com/s/article/103564/Ethical_issues_for_IT_security_professionals?pageNumber=1 Stair, R., & Reynolds, G. (2012) Principles of information systems. Boston: Cengage Learning

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Security + 280 Exams

    • 2838 Words
    • 12 Pages

    | (TCO 1) What is the most common threat to information security in an organization?…

    • 2838 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    > A third party vendor which is an HVAC company based in Pennsylvania, was given access to Target's systems. The systems of this third party vendor became the first point of entry for attackers to gain access to…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Souryal, Sam S. (2007). Ethics in Criminal Justice: In search of the Truth (4th ed.). Cincinnati,…

    • 1753 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    information technology

    • 420 Words
    • 2 Pages

    Information technology provides more opportunities for difficult ethic issues to arise as Information technology allows the reduction in both budget and staff. Policy decisions at the very senior level need the sensitivity that IT experts can bring to the table. CIOs will know the capabilities of Information Technology and that the misuse of those capabilities will result in a difficult ethical issue.…

    • 420 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mason, R. “Four Ethical Issues of the Information Age”. MIS Quarterly, vol. 10 no. 1. (1996).…

    • 1931 Words
    • 8 Pages
    Powerful Essays