Wednesday, May 6, 2020

The Ethical Issue Of Cybersecurity - 1407 Words

Cybersecurity has always been a big issue because everyone can imagine putting up the most advanced security into place and call it good. However, these measures aren’t always the most convenient and/or they infringe on the privacy boundary. The blame has been put on everyone and fingers were pointed to everyone as well when data was compromised. Laws proposed are usually always under fire because of privacy infringement. Businesses are being hacked and it falls onto the consumers to watch for â€Å"suspicious charges† on their account. The population posts information on social media without thinking about the bigger picture. The ethical issue is that businesses should feel morally inclined to protect their customers’ personal information to the best of their ability. The privacy issue is that consumers on social media are posting anything and everything thinking that their privacy settings are sufficient. Adding on to that, as said before, the government propos es laws that infringe on the privacy boundary. These issues exist because businesses are implementing an ineffective security strategy, the government wants complete lockdown on an issue, and the public expects that their data is safe because they think companies are responsible for that. Each faction addresses their own issues differently because for businesses it is a matter of ethics, and for the government and the public, it is a matter of privacy. To start, I will be going over the business world. In an articleShow MoreRelatedOutline And Outline Of Organizational Development And Strategies1717 Words   |  7 Pagesplay a key role in the effective implementation of cyber-security. B. What ethical implications must be considered and addressed by the technology manager in implementing these strategies? A. Describe how organizational structure, culture and decision making strategies play a key role in the effective implementation of cyber-security. Cybersecurity has, in the past few years, emerged as one of the most significant issues of discussion among company board of directors and leaders. The frequencyRead MoreHow Cybersecurity Is An Aspect Of Security1170 Words   |  5 PagesIntroduction Cybersecurity is an aspect of security that has shaped the way we as a people think and live our everyday lives. For the past 10 years and even before then, this trend of cybersecurity has been a constant topic of both discussion and protection of our data and of our financial assets as well. There have been numerous attacks on companies and federal organizations from big name Fortune 500 companies such as Visa, Target, etc. to big name federal agencies such as National Security AgencyRead MoreRole Of Systems Support Specialist747 Words   |  3 Pages Systems Support Specialists Systems support specialists are responsible for software problems, hardware failures, and network issues. They are responsible for installing and configuring computer hardware and operating systems and applications. The entry requirements for this job role are. English, mathematics, IT or science, BTEC national certificate and diploma IT Practitioners, Business information technology, Business systems engineering, Computer networking and hardware, Computer scienceRead MoreIntroduction To Autonomous Vehicles (Avs). What Are Autonomous1525 Words   |  7 Pagesof the world, but, at the same time, it also has its drawbacks and there can still be a lot of room for error in AVs. One such area of susceptibility is in the fact that it’s more prone to hacking remotely, and, thus, this danger highlights why cybersecurity matters more now in vehicle technology. Despite it having many possibilities for the failing AV system to fail, it’s still such a milestone in technology today that it’s already making its impact on society today and in policy-making. AVs are slowlyRead MoreThe Role Of Cybersecurity And Its Effects On The World1621 Words   |  7 PagesCybersecurity Cybersecurity has only been around for a short time. In the short time it’s been around, it’s gone from a simple application process in security, to one of the most complicated things to get right in order to protect the internet. In the late 80’s the very first computer worm was created by Robert Morris. He released it into the internet in the early 90’s. With it, he shut down large portions of the internet. (Infosecurity Magazine) Back then, the internet didn’t play a large roleRead MoreReport On The Happenings Provided By Professor Slater s Presentation1445 Words   |  6 PagesCongress, those who made false assumptions were let go. 8. How will the Edward Snowden Compromise affect the Cybersecurity Career Field? It will affect us in terms of more strict contingencies such as qualifications, experience, controls related to data and definitely more background checks for anyone working in the Cyber security career field. This will not only make the Cybersecurity career field more stringent but watched upon by all means. With the increasing technology, there is also an increasingRead MoreThe Problem Of The Government1586 Words   |  7 Pagesindividual laptop can grow into a devastating power plant failure or failing banking infrastructure, such as attackers stealing $81 million from Bangladesh central bank (Finkle, 2016). Our businesses have current regulations to maintain moral and ethical standards that state and federal rules may enforce. More important is the current and ever growing partnership that the government plays with the private sector. A tangible and immediate example of this is the contractors and private industry thatRead MoreThe Private Sector Public Sector Cybersecurity Issue s Essay952 Words   |  4 Pagesstudy is to explore the Private Sector-Public Sector Cybersecurity Issues, when focusing on the use and collection of meta-data. Meta-data is the big-data collection of information about consumers to determine customer’s habits and personal information. This will be explored through an analysis of Facebook and social networking. With this collection of information, the issue of who owns, use, and access the information has arisen. Also the issue of privacy, and protection come into the light, andRead MoreA Research Study On Health Insurance Coverage1999 Words   |  8 Pagesexecutives to see the value in its implementation. 4.5. Legal and ethical issues There are many issues that have emerged regarding legal and ethical issues of telemedicine. These issues can be generalized under the awarding of credentials and privileges, malpractice liability, prescribing medication via telehealth, licensing across several locations and informed consent. Telemedicine applications highlight the need to deal with issues such as protecting patients’ personally identifiable health dataRead MoreTexas State Case Study1000 Words   |  4 Pagesincidents of cyber insecurities that are targeting both households and companies like the WannaCry Ransomware that happened on May 17, 2017. Like the Senator, I would like to resume the office of a senior government official in the committee of cybersecurity to save the nations from any further loss of data and vast amounts of money like the one that happened On May 17, 2017. Secondly, I would like to take the seat of Senate Representation of Dallas in the committee of Education to diversify the educational

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.