Question: Write a minimum two (2) page research paper that identifies some of the different strategies and processes that you are going to be using to
Write a minimum two (2) page research paper that identifies some of the different strategies and processes that you are going to be using to protect your using information technology Develop your plan to address the following issues:
Security Ethics Privacy
Ethics is a branch of philosophy that deals with issues of morality, that is, consideration of which human actions and reactions are morally right and wrong.It is important to make intelligent decisions from an ethical perspective about the actions that we takethat is, to consider whether our actions feel right or wrong to us and why. These actions range in scope from personal actions to the actions of our businesses and organizations, the actions of our governments, and ultimately the actions of our species. In recent years, we have seen the rise of a new type of hacker group. Hacker activists, or hacktivists, hack computer networks for a perceived righteous cause.
Privacy refers to being free from intrusion; it is the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself. With the digitization of all forms of information and the increasing use of the Internet for all types of activities, it has become easy to collect detailed information about individuals. This has helped businesses to locate customers for their products, allowed government and law enforcement to monitor individuals behavior, and enabled criminals to find victims. Loss of privacy is so widespread and is occurring so quickly that some believe that it is too late to do anything about it. Others are interested in maintaining some forms of privacy. Still others are embracing a transparent lifestyle, broadcasting their every action to the world. Information security refers to the protection of computers, information systems, data, and information against unauthorized access, use, manipulation, or destruction. Information security is a growing concern as increasing amounts of important and private information are stored digitally on systems connected to public networks and wireless private networks. From bank account and credit account access codes, to personal medical records, to secret business strategies, to national defense initiatives, to email sent to a friend, people trust information systems to keep their most valuable and secret information safe and secure. But can information systems be trusted?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
