Assignment #3

docx

School

University of Central Oklahoma *

*We aren’t endorsed by this school

Course

12416

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by DukeSquirrelPerson963

Report
1 Assignment #3 Question #1 Information ethics would be the area that focuses on the relationship of using information ethically and following the moral codes when knowing private information within a company. Information security is the practices of keeping data secure from outside, unwarranted sources. For example, confidentiality, the firewalls, password protections systems, and policies put into place are information security. These aren’t just important to keeping an organization safe, they are critical. You need to be able to see who is accessing certain files and ensure people who aren’t, can’t get into them. Passwords, encryption, and authentication must all be in place for big businesses like a bank for instance. Working for a bank means, confidentiality agreements, training programs, and a strong IT department to ensure each employee knows their role in information ethics and security. In order for a bank to even send out private information outside of personal contact customers must know their secret words set up when opening accounts, their social, and they are given another password directly to enter a software program they can go in and access the information they requested. If each employee fails to follow these rules, they will receive discipline and in major events they can be fired and reported to the law.
2 Question #2 The first epolicy that a business could use would be firewalls and restricted access to websites not needed or important for employees to be on at work. This will protect the company’s private information from viruses and from employees entering information in places they shouldn’t that could lead to giving hackers the information needed to enter their databases and other private information. The next way a business could protect their private information is by applying password protection for logging onto all computer devises, all programs the employees use, files, folders, and mail logs. For advanced password protection employees should be require to change their password every month or every two months and never share their information with other people or employees. Working in the banking industry has taught me a lot about privacy protection and having a strong IT department to maintain safe protection is a must for large companies, especially ones in charge of large amounts of money. Companies like ours also have IT department send out fishing emails to employees to make sure everyone is following the correct procedures and not clicking on unprotected links sent by unverified users, if you do not follow procedure and click on a link you are required to take extra training webinars and may be subject to a write up.
3 Question #5 There are many different reasons hackers want to gain access to data that an organization holds. One of the main reasons is ransom attacks and money. Hackers love to steal information and hold it “hostage” and make the company comply with their needs or wants which is usually money. In the banking world, people like to obtain checks and account information in order to pay for things and obtain large amounts of cash until the customer finds out they have been hacked. Hackers also like to obtain this information for identity theft and open accounts or credit cards without your permission for their own personal gain. I also believe other companies hire hackers to obtain business information so they can get a competitive advantage against other companies and steal their ideas to make themselves a more profitable company so they can lead whichever market they are in. Fraud is a huge problem, and it has been for a while, people would rather steal, and cheat than actually work for their money and a lot of times they prey on older people who don’t seem to understand what they are doing when it comes to technology today. Working at a bank I have seen countless people give up their information to hackers when they think they are helping or have won certain prizes.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 Peer-Reviewed Journal A HACKER'S MIND: HOW THE POWERFUL BEND SOCIETY'S RULES, AND HOW TO BEND THEM BACK. (2022). Kirkus Reviews, Xc(23) Retrieved from https://libproxy.uco.edu/login? url=https://www.proquest.com/trade-journals/hackers-mind/docview/2746884792/se-2 Citations No citations were used, all answers were given upon work experience in a company that relies heavily on information security.