Assignment #3
docx
keyboard_arrow_up
School
University of Central Oklahoma *
*We aren’t endorsed by this school
Course
12416
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by DukeSquirrelPerson963
1
Assignment #3
Question #1
Information ethics would be the area that focuses on the relationship of using information
ethically and following the moral codes when knowing private information within a company.
Information security is the practices of keeping data secure from outside, unwarranted sources.
For example, confidentiality, the firewalls, password protections systems, and policies put into
place are information security. These aren’t just important to keeping an organization safe, they
are critical. You need to be able to see who is accessing certain files and ensure people who
aren’t, can’t get into them. Passwords, encryption, and authentication must all be in place for big
businesses like a bank for instance. Working for a bank means, confidentiality agreements,
training programs, and a strong IT department to ensure each employee knows their role in
information ethics and security. In order for a bank to even send out private information outside
of personal contact customers must know their secret words set up when opening accounts, their
social, and they are given another password directly to enter a software program they can go in
and access the information they requested. If each employee fails to follow these rules, they will
receive discipline and in major events they can be fired and reported to the law.
2
Question #2
The first epolicy that a business could use would be firewalls and restricted access to websites
not needed or important for employees to be on at work. This will protect the company’s private
information from viruses and from employees entering information in places they shouldn’t that
could lead to giving hackers the information needed to enter their databases and other private
information. The next way a business could protect their private information is by applying
password protection for logging onto all computer devises, all programs the employees use, files,
folders, and mail logs. For advanced password protection employees should be require to change
their password every month or every two months and never share their information with other
people or employees. Working in the banking industry has taught me a lot about privacy
protection and having a strong IT department to maintain safe protection is a must for large
companies, especially ones in charge of large amounts of money. Companies like ours also have
IT department send out fishing emails to employees to make sure everyone is following the
correct procedures and not clicking on unprotected links sent by unverified users, if you do not
follow procedure and click on a link you are required to take extra training webinars and may be
subject to a write up.
3
Question #5
There are many different reasons hackers want to gain access to data that an organization holds.
One of the main reasons is ransom attacks and money. Hackers love to steal information and
hold it “hostage” and make the company comply with their needs or wants which is usually
money. In the banking world, people like to obtain checks and account information in order to
pay for things and obtain large amounts of cash until the customer finds out they have been
hacked. Hackers also like to obtain this information for identity theft and open accounts or credit
cards without your permission for their own personal gain. I also believe other companies hire
hackers to obtain business information so they can get a competitive advantage against other
companies and steal their ideas to make themselves a more profitable company so they can lead
whichever market they are in. Fraud is a huge problem, and it has been for a while, people would
rather steal, and cheat than actually work for their money and a lot of times they prey on older
people who don’t seem to understand what they are doing when it comes to technology today.
Working at a bank I have seen countless people give up their information to hackers when they
think they are helping or have won certain prizes.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
Peer-Reviewed Journal
A HACKER'S MIND: HOW THE POWERFUL BEND SOCIETY'S RULES, AND HOW TO BEND THEM BACK.
(2022). Kirkus Reviews, Xc(23) Retrieved from
https://libproxy.uco.edu/login?
url=https://www.proquest.com/trade-journals/hackers-mind/docview/2746884792/se-2
Citations
No citations were used, all answers were given upon work experience in a company that relies
heavily on information security.