Explain the ethical issues surrounding information technology.
Technology-related ethical issues:
- Intellectual Property (The collection of rights that protect creative and interllectual effort)
- Copyright (Exclusive right to do, or omit to do, certain acts with intangible property)
- Fair use doctrine (Certain situations, it is legal to use copyrighted material)
- Pirated software (Unauthorised use, duplication, distribution, or sale of copyrighted software)
- Conterfeit software (Software that is manufactured to look like the real thing and sold as such)
Technology-related ethical issues:
- Intellectual Property (The collection of rights that protect creative and interllectual effort)
- Copyright (Exclusive right to do, or omit to do, certain acts with intangible property)
- Fair use doctrine (Certain situations, it is legal to use copyrighted material)
- Pirated software (Unauthorised use, duplication, distribution, or sale of copyrighted software)
- Conterfeit software (Software that is manufactured to look like the real thing and sold as such)
Describe a situation involving technology that is ethical but illegal.
The ethical issues surrounding copyright infringement and intellectual property rights are consuming the e-business world. Advances in technology make it easier for people to copy everything from music to pictures. Technology poses new challenges for our ethics - the principles and standards that guide our behaviour toward other people.
Describe and explain one of the computer use policies that a company might employ.
Ethical Computer Use Policy
- contains general principles to guide computer user behaviour.
- For example: ethical computer use policy may state that users should refrain from playing computer games during working hours. The policy basically ensures how users should behave at work, etc.
- There are variations in how organisations expect their employees to use computers, in any approach, the overriding principle when seeking appropriate computer use should be informed consent.
Ethical Computer Use Policy
- contains general principles to guide computer user behaviour.
- For example: ethical computer use policy may state that users should refrain from playing computer games during working hours. The policy basically ensures how users should behave at work, etc.
- There are variations in how organisations expect their employees to use computers, in any approach, the overriding principle when seeking appropriate computer use should be informed consent.
What are the 5 main technology security risks?
1. Authentication
2. Authorisation
3. Prevention
4. Resitance
5. Detection and Response
1. Authentication
2. Authorisation
3. Prevention
4. Resitance
5. Detection and Response
Outline one way to reduce each risk.
1. Authentication: a method for confirming user's identities. Once a system determines the authentication of a user, it can then determine the access privileges (or authorisation) for that user.
2. Authorisation: - is the process of giving someone permission to do or have something. 3. Prevention : technologies to stop intruders from accessing intellectual capital.
For example, Sony Inc installed an advanced intrusion detection system allowing it to monitor all of its network activity including any potential security breaches.
4. Resitance: technologies to stop intruders from accessing intellectual capital.
For example, Sony Inc installed an advanced intrusion detection system allowing it to monitor all of its network activity including any potential security breaches.
5. Detection and Response: The most common type of defence within detection and response technologies is antivirus software.
- Something the user knows, such as a user ID and password.
- Something the user has, such as a smart card or token.
- Something that is part of the user, such as a fingerprint or voice signature.
What is a disaster recovery plan, what strategies might a firm employ?
The process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organisation after a naturla or human disaster.
Control measures such are steps or mechanisms that can reduce or eliminate various threats for organisations. The types of measures:
1. Preventive measures- these controls are aimed at preventing an event from occuring.
2. Detective measures- these controls are aimed at detecting or discovering unwanted events.
3. Corrective measures- these controls are aimed at correcting or restoring the system after disaster or event.
A firm may employ strategies such as back-ups for data protection.
The process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organisation after a naturla or human disaster.
Control measures such are steps or mechanisms that can reduce or eliminate various threats for organisations. The types of measures:
1. Preventive measures- these controls are aimed at preventing an event from occuring.
2. Detective measures- these controls are aimed at detecting or discovering unwanted events.
3. Corrective measures- these controls are aimed at correcting or restoring the system after disaster or event.
A firm may employ strategies such as back-ups for data protection.
No comments:
Post a Comment