Friday, June 14, 2019

CASE 5 Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 words

CASE 5 Information Security and Ethics - Essay ExampleBecause it is unfortunate that a leakage of information committed by an internal employee who accesses almost e truly details of the valuable information daily. This issue no doubt harms the ethical bonding between the employees and the transcriptions. But in the cutting of external trespassing into the organizations confidential information zone, the blame would directly go to its security organisation which basically shows the loopholes of its security protocols. But, this is another issue. The organization should make the employees of all levels signed into the document where policies have been stated transparently after distributing and describing the issues about information security. Definitely, an organization containing three employees would differ from the organization with work force of thousand people in the sense of organizational information policy.The implementation of the e-business framework has led many organiz ations into serious threat about information security. From the very commencement of the internet, rather say the from the beginning the internet has came with complications and vulnerabilities that is- its basic communications as well as the nodes, norms about its protocols, authentication of its network and host frameworks and so forth Dissatisfied employees, hackers, opponents and other stakeholders destroyed the internets vulnerabilities which caused damages of privacy, financial damages, loosing of customers, interruption in the activities and unpredictability. Many employees were allowed to access internet for authentic business theatrical role but actually the result went to misuse of information either from lack of compassion for uncertainty, or lack of consciousness of authentic usage of internet in the organization or exactly by the wicked intension. For these reasons, some protocols are generally set inside an organization to make the information security system more

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.