IT278_Unit5_lab

docx

School

Purdue Global University *

*We aren’t endorsed by this school

Course

278

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by CaptainWorld13412

Report
1 Ethics in Information Technology
2 Ethics in Information Technology Ethics is a necessary trait to have a set of principles of moral right, a code one lives by. Although this could be especially true in IT jobs, roles like system administrators can have access to confidential user data or company data. Protecting user’s data is of utmost importance for any systems administrator. It can have ethical repercussions and legal consequences. Being in a position to protect information comes with many trusts, and betraying this can cost several. If they ever caught you stealing users’ data from a company, you would be fired immediately and could face legal prosecution. This will mostly come with no company ever trusting you again to have access again. Keeping one’s self in a great financial state can help take the temptation away. Also, only give access to people that is required. Have systems and processes in place to ensure data can not be copied. User data can be sold for money; for example, credit cards can sell from five dollars up to one hundred and ten dollars Stack (2017). As a system administrator, you can have access to this information, and it is your duty to secure this information. There are many solutions to securing your user’s data. One could hire an outside company that specializes in ethical hacking to find weak points in security. Implementing a least privilege to ensure only the individuals that require access do. Encrypting the data and providing a solid defense while also keeping systems updated on the latest security vulnerabilities. Each of these solutions has a place in protecting users’ data. Depending on your risk appetite, all may be utilized to protect this information. Having a robust internal policy for protecting users’ data and a company-wide understanding of least privilege can help mitigate conflicts from even arising. Individuals will understand that it is not a lack of trust. They do not have access to information but simply a policy of data safety. This can also help if background checks need to be performed every few years as an
3 understanding that the company is just trying to understand their risk level with the data they allow you to access.    
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References Slavin. (2022, July 28). Data Privacy And Protection: 11 Ways To Protect User Data . https://www.duocircle.com/email-security/data-privacy-and-protection-11-ways-to- protect-user-data Stack. (2017, December 6). Here’s How Much Your Personal Information Is Selling for on the Dark Web . Experian. https://www.experian.com/blogs/ask-experian/heres-how-much- your-personal-information-is-selling-for-on-the-dark-web/ Part 2 Containers are an essential application tool in modern enterprise infrastructure. Although some type of container software has been around since the late 1970s, it was not until Docker emerged in 2013 that it exploded in popularity Osnat (2023). Microsoft asked Docker for help to get Docker on Windows Server 2016. Since then, it has been important for system administrators to understand what and how to use containers for their everyday jobs. Containers serve as a lightweight, stand-alone, and executable software package that includes everything needed to run a piece of software, including the code, runtime, system tools, libraries, and settings. Containers are designed to provide a consistent and isolated application environment, making it easier to develop, deploy, and manage applications across different stages and environments. A system administrator needs to understand how to use and troubleshoot containers. There is a variety of tasks, but maybe the most important is how to install it. Since Docker does not come preinstalled on any Windows operating system. Installing
5 Docker is simple: use PowerShell or download the Docker Desktop for a nice GUI. Open up Powershell and type in Install-Module -Name DockerMsftProvider -Repository PSGallery -Force. This will enable container features. Next, install Docker with Install-Package - Name docker -ProviderName DockerMsftProvider. The output will be Docker and a version number with it asking you to reboot. Reboot; you now have enabled and installed Docker Jethva (2022). Having Docker installed does not help you with containers; it is more of just a requirement. The system administrator will need to understand how to work within Docker. To do this, whenever they are working with Docker, they will always add Docker to the front of all the commands. For example, to pull images from a registry, use Docker pull. They will also need to be able to start and stop container services with docker start and docker stop. Containers are a potent tool at the disposal of system administrators. They provide isolation for security and can help ensure your application will work on all sorts of hardware. Knowing and understanding Docker is essential in the modern internet infrastructure. Refences Jethva, H. (2022). How to install and run docker on Windows Server 2016, 2019, 2022. Cloud Infrastructure Services . https://cloudinfrastructureservices.co.uk/how-to-install-and-run- docker-on-windows-server-2016-2019-2022/ Osnat, R. (2023, June 20). A Brief History of Containers: From the 1970s Till Now. Aqua Blog . https://blog.aquasec.com/a-brief-history-of-containers-from-1970s-chroot-to-docker-2016