Tesfamaryam_M_IST530_Assignment2_Week2
docx
keyboard_arrow_up
School
Indiana University, Purdue University, Indianapolis *
*We aren’t endorsed by this school
Course
530
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
8
Uploaded by millionzak
1
Five Ways Hackers Can Get into Your Business
Million Tesfamaryam
California International University
IST 530 – Management Information Systems
Dr. Nancy Severe-Barnett
Sunday, November 19
th
, 2023
2
Information Ethics
The field of information ethics is concerned with the moral and ethical standards that
guide the use, sharing, and management of information. This includes a wide range of issues and
considerations, such as the rights and responsibilities of individuals and organizations, as well as
the potential societal implications associated with the creation and processing of information.
Information ethics involves navigating complex issues related to privacy, data protection,
intellectual property rights, confidentiality, digital rights movement, and pirated software
(Baltzan, 2023, p.76). It is a multifaceted field that requires careful consideration of the ethical
implications of information practices in a rapidly evolving technological landscape.
The Importance of Information Ethics to Businesses
Information ethics is critical to any business for several reasons because businesses that prioritize
ethical information practices are better positioned for long-term success. Here are some key
reasons why information ethics is crucial for businesses:
1.
Customer Royalty
- Maintaining ethical information practices is crucial to build and
retain customer loyalty. When businesses prioritize the secure and ethical handling of
customer data, it creates trust and confidence among the customers. This confidence
eventually leads to increased customer loyalty and retention. By adopting ethical
information practices, businesses can gain a competitive advantage, and earn the trust and
loyalty of their customers.
2.
Trust and Reliability
- Ethical principles play a significant role in information
management and are crucial for establishing trust and credibility with customers and
3
stakeholders. It is imperative for organizations to prioritize ethical behavior and uphold
ethical standards in their information management practices.
3.
Employee Morale and Productivity
- Ethical information practices are crucial for a
positive work environment. When employees see ethical behavior valued, it boosts their
morale and productivity. Trust in employers with sensitive information enhances
employee security and motivation.
4.
Long-Term Sustainability
- Ethical behavior is vital for long-term success. Businesses
that prioritize ethical practices establish enduring relationships with customers,
employees, and partners.
Information Security
Information security is the process of protecting information systems, data, and
technology assets from any unauthorized access, disclosure, alteration, destruction, and
disruption. It involves implementing measures to ensure the confidentiality, integrity, and
availability of data, and aims to prevent any potential risks or threats that may arise. With the
right measures in place, organizations can safely store and process valuable information without
worrying about any unauthorized access or data breaches.
The Importance of Information Security to Businesses
Information security measures are crucial for any business for a variety of reasons, and some
of these reasons are:
1.
Protection of Sensitive Data
- Businesses handle sensitive data like customer
information, finances, and trade secrets. Proper security measures are critical to prevent
unauthorized access, theft, or manipulation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
2.
Maintaining Customer Trust
- Effective information security practices assure
customers that their personal and financial information is handled securely, which is
crucial for building customer trust. Breaches due to cyberattacks or data breaches can
severely affect a company's reputation.
3.
Protection Against Evolving Cyber Threats
- As cybercriminals develop new tactics
and technologies, it's crucial to have updated information security measures, like
antivirus software, firewalls, and intrusion detection systems, to stay protected.
Implementing e-policies to ensure the protection of sensitive data
Protecting sensitive corporate data is a crucial aspect of business operations, which can
be achieved by implementing e-policies. Organizations should develop comprehensive written
policies that establish clear guidelines, procedures, and rules for information management. Two
effective e-policies that can help protect sensitive corporate data are an ethical computer use
policy and an email privacy policy (Baltzan, 2023, p.79). An ethical computer use policy should
contain general principles to guide user behavior, outline acceptable and unacceptable computer
activities, and specify the consequences of violating the policy. This policy should also establish
procedures for account management and access control, provide guidelines for handling
confidential data, and define the roles and responsibilities of employees in maintaining the
security of computer systems and networks.
To protect sensitive corporate data, businesses can also implement an email privacy
policy. This policy should clearly define the acceptable and unacceptable use of corporate email
addresses. It should also provide guidelines for employees on the responsible use of their email
accounts. Additionally, it should specify how emails containing confidential information should
be handled, including proper encryption protocols and secure storage measures. To strengthen
5
the email privacy policy, companies should include provisions for monitoring and enforcing
compliance. Routine audits of email accounts and reviews of email usage logs can ensure that
employees are adhering to the policy. By implementing and enforcing these e-policies,
companies can protect sensitive corporate data from breaches and other threats.
Using Authentication and Authorization technologies to prevent information theft
Authentication is the process of verifying the identity of users. Once the identity of the
user is confirmed, the system can determine the access privileges, also known as authorization,
for that user. Authorization involves granting permissions to the user, such as access levels, file
access, hours of access, and allocated storage space (Baltzan, 2023, p.87). The ultimate goal of
authentication and authorization is to prevent unauthorized individuals from gaining access to the
system.
Implementing Multi-Factor Authentication is an effective way for organizations to
enhance their security. This method requires users to provide multiple forms of identification,
such as a password and a temporary code that can be sent to their mobile device or generated by
an authentication app. Biometric authentication methods like fingerprint scans, facial
recognition, or iris scans can also be used to secure the authentication process further.
Additionally, Role-Based Access Control can be utilized to manage authorization. This involves
defining roles within the organization and assigning specific access permissions to each role.
Users are then assigned to their respective roles based on their job responsibilities. This approach
ensures that employees have access only to the information and resources that are necessary for
them to perform their duties and responsibilities.
6
Using Prevention and Resistance technologies for protection
To protect employees from cyber threats, businesses can use various technologies that
work together to detect and prevent malicious attacks and reduce the impact of security breaches.
These technologies include deploying firewalls at network perimeters to monitor and control
incoming and outgoing traffic based on pre-defined security rules, which prevents unauthorized
access and reduces the risk of malware infiltration. Another prevention technology is to install
antivirus software on all employee devices. This software detects, blocks, and removes malicious
software, providing real-time protection against viruses, Trojans, and other malware, ensuring
the integrity of employees' devices.
It is important to not only focus on prevention technologies but also implement resistance
technologies such as Backup and Disaster Recovery (BDR) and Endpoint Protection to safeguard
against hackers and viruses. Critical data can be protected by regularly backing it up with a BDR
solution and establishing a data recovery plan in the event of a cyber-attack or data loss. The use
of endpoint protection solutions, including advanced threat detection, encryption, and device
control features, is crucial for securing individual devices.
Information Security Implementation Plan
Creating an effective information security plan requires a systematic and comprehensive
approach. The first step towards this goal is to conduct a risk assessment which involves
identifying and evaluating potential risks to critical information. This helps the organization
understand its vulnerabilities and areas of concern. The impact and likelihood of incidents should
be assessed, and risks should be prioritized based on their severity. The second step is to develop
information security policies for data classification, access control, encryption, incident response,
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
and acceptable use. These policies should be aligned with regulatory requirements and industry
best practices. It is important to communicate these policies to all employees to ensure they
understand their roles and responsibilities in keeping organizational information secure.
To ensure information security, it is crucial to educate employees about best practices and
the importance of safeguarding critical information. Regular training sessions on phishing
awareness, social engineering, and password security can help achieve this. To prevent malware
infections and unauthorized access, endpoint protection must be deployed by installing and
regularly updating antivirus and anti-malware software. Lastly, conducting periodic refresher
training sessions for employees to promote awareness and encourage proactive participation is
crucial.
In conclusion, businesses can establish a strong defense against cyber threats and ensure
the protection of their critical information assets by following an information security
implementation plan and emphasizing continuous improvement. To maintain a robust
information security posture, it is crucial to regularly monitor security, provide employee
training, and adapt to evolving security landscapes.
8
References
Andress, Jason. (2019).
Foundations of Information Security: A Straightforward Introduction
.
San
Fransico, California: No Starch Press.
Baltzan, Paige. (2023).
Business Driven Information Systems (8
th
Edition)
. New York, NY:
McGraw Hill LLC.
George, Reynolds. (2014).
Ethics in Information Technology
. Boston, MA: Cengage Learning.
Todorov, Dobromir. (2007).
Mechanics of User Identification and Authentication: Fundamentals
of Identity Management
. Boca Raton, FL: Auerbach Publications.