Question: Write a minimum two (2) page research paper that identifies some of the different strategies and processes that you are going to be using to

Write a minimum two (2) page research paper that identifies some of the different strategies and processes that you are going to be using to protect your using information technology Develop your plan to address the following issues:

Security Ethics Privacy

Ethics is a branch of philosophy that deals with issues of morality, that is, consideration of which human actions and reactions are morally right and wrong.It is important to make intelligent decisions from an ethical perspective about the actions that we takethat is, to consider whether our actions feel right or wrong to us and why. These actions range in scope from personal actions to the actions of our businesses and organizations, the actions of our governments, and ultimately the actions of our species. In recent years, we have seen the rise of a new type of hacker group. Hacker activists, or hacktivists, hack computer networks for a perceived righteous cause.

Privacy refers to being free from intrusion; it is the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself. With the digitization of all forms of information and the increasing use of the Internet for all types of activities, it has become easy to collect detailed information about individuals. This has helped businesses to locate customers for their products, allowed government and law enforcement to monitor individuals behavior, and enabled criminals to find victims. Loss of privacy is so widespread and is occurring so quickly that some believe that it is too late to do anything about it. Others are interested in maintaining some forms of privacy. Still others are embracing a transparent lifestyle, broadcasting their every action to the world. Information security refers to the protection of computers, information systems, data, and information against unauthorized access, use, manipulation, or destruction. Information security is a growing concern as increasing amounts of important and private information are stored digitally on systems connected to public networks and wireless private networks. From bank account and credit account access codes, to personal medical records, to secret business strategies, to national defense initiatives, to email sent to a friend, people trust information systems to keep their most valuable and secret information safe and secure. But can information systems be trusted?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!