Tuesday, May 5, 2020

Issue of Cyber Crime Provided a Solution Samples †MyAssignmenthelp.co

Question: Discuss about the Issue of Cyber Crime Provided a Solution. Answer: Introduction The security of information that is related to stakeholders and clients is a wide topic which covers a large number of sins. The business persons cause security breaches to find a competitors strategic marketing plan, and several ex-employees leak the secret information to take revenge from the organization for being dismissed. All these unlicensed access to delicate information framework cause genuine security issues. In this case, we have examined the issue of cyber-crime, which is known to be an ethical concern which managers in my organization had failed to notice. And, I designated as an IT expert provided a solution to this problem or issue using the process of DET. Security Issue Main Issue The information is a life-sustaining asset for an organization, therefore, it is necessary to keep it secure from the access of unauthorized people. The security tools help in decreasing the errors, crimes, and financial loss in the e-commerce or e-business networks that interconnect organization with their suppliers, clients, and their stakeholders (Foster, 2010). Here, in this case, I have discussed a situation which my organization had faced, such as, encrypted messages, passwords, files, and other information had been sent in the disorganized frame and unscrambled for licensed users. Our organization regularly has to face major sorts of ethical issues or problems. These are Security of customers personal information associated with the organization, cyber-crimes as well as loss of organizations intellectual property, etc. In our organization, a number of workers use electronic and different types of high-tech technologies. Information sent over this vast network of networks may p ass through many different computer systems before it reaches its last destination. Therefore, the information about organizations running and upcoming projects were leaked and security of clients sensitive data was at risk (Colvin McCracken, 2016). Related issues The security issue here, in this case, means unlicensed or unauthorized access, use, modification, as well as the destruction of an organizations software and hardware. The loss and theft of data network assets, the unlicensed release of data, unauthorized software are some of the problems which organization had faced due to this security issue. There is no reliable and accurate statistics on the measure of computer security crimes and economic losses occurred in the organization, partly because some of these crimes are evidently not detected by our organization. Facts Indeed, even the absolute best software that our organization uses have security vulnerabilities (Dale, 2016). Many of us envision that adequately great software and networks can be totally protected. Due to this belief, numerous clients of our organization get angry when services and machines they utilize end up being vulnerable to assaults. The software upgradations is critical for our security. Ethical Issues Non-ethical issues The ethical and moral issues in data frameworks have provided new earnestness by the ascent of the Internet as well as electronic trade. The web and computerized firm advancements make it less demanding than ever to collect, incorporate, and disperse data, unleash new worries about the suitable utilization of clients data, the security of individual protection, and the insurance of licensed property. Who is Affected by issue The managers who want to secure the frameworks for which they all are responsible for gets affected by this issue, employees who utilize information to provide benefits to the organization are also affected by this security issue (Landau, 2014). The stakeholders associated with us are also influenced by this theft of sensitive data as they dont want that some unauthorized person uses their delicate data. The organization also gets affected by this issue as no one wants to do business with an organization which already face security issues, hence, loss of revenues, loss of clients trust are some issues which an organization has to face (Reisch, 2011). Ethical Issues and its implications Here, in this case, hackers, hack copy security mechanisms of our organization. The pirates distribute and make unauthorized or illegal copies of secured programs and works. The hackers and competitors have less technical skills and they largely utilize our work to increase their revenues. The theft of delicate information or business disturbance causes serious dangers to the reputation of our organization. The economic prosperity, as well as personal privacy of our clients' data, also gets affected by these security issues. Steps to solve issue The CEOs obligation with regards to the security and moral issues ought to be same as in some other parts of the organization or business (Trompeter Eloff, 2001). Furthermore, they ought to include all aspects of security issues which organization faces and manage monetary, operational, as well as business hazard decisions. They have to oversee strategies and methodology on how an organization can handle and ensure its customers information which envelops a wide assortment of information. Options The utilization of authorized and legitimate software is the option here that will diminish the security dangers (Wood, 2005). The perspective for present day business software is to increase the future growth of an organization that can't be underestimated, as nowadays clients require, as well as expect high-quality services. The integration of entire division is necessary to guarantee that exceptional services are given to our clients. Another option for this issue is the storage of delicate data in Centralized Data Model which reduces the probability of data loss as well as theft. Suitable Option The Centralized Data Model is the best option here to overcome security issues as centralized data frameworks or model is capable of completely taking the responsibility to secure and integrate organizations data. Along with it, the integration and safety of data are no longer a responsibility of the organization alone, but it is also a shared responsibility of the organization which facilitating the data (Vadza, 2011). It, thus, becomes in the best interest of that host to ensure that the data is kept safe. Conclusion This study concludes that to plan a security solution that really ensures information, our organization must comprehend the security necessities pertinent to our business procedure, and the extent of current dangers to the organization's data. It has also been concluded that when a business utilizes IT tools intensely, and providing services to clients, stakeholders, and workers, in a manner that they easily controlled and secure this data then organization surely overcome this issue within the organization. References Colvin, C. McCracken, M. (2016). Work Ethic, Social Ethic, no Ethic: Measuring the Economic Values of Modern Christians.Journal Of Applied Econometrics. Dale, O. (2016). Ethical issues and stakeholders matter.Addiction,111(4), 587-589. Foster, D. (2010). Worldwide Testing and Test Security Issues: Ethical Challenges and Solutions.Ethics Behavior,20(3-4), 207-228. Landau, S. (2014). Security and Privacy: Facing Ethical Choices.IEEE Security Privacy,12(4), 3-6. Reisch, R. (2011). International service learning programs: Ethical issues and recommendations.Developing World Bioethics,11(2), 93-98. Trompeter, C. Eloff, J. (2001). A Framework for the Implementation of Socio-ethical Controls in Information Security.Computers Security,20(5), 384-391. Vadza, K. (2011). Cyber Crime its Categories.Indian Journal Of Applied Research,3(5), 130-133. Wood, P. (2005). Implementing identity management security - an ethical hacker's view.Network Security,2005(9), 12-15.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.