Thursday 21 April 2011

Week Five - Ethics and Security

Explain the ethical issues surrounding information technology.
Ethics is a system of moral principle that considers our actions from right and wrong
Ethical issues surrounding informational technology are:
-Intellectual property: many IT users around the world ignoring Intellectual property laws and are copying software in order to save large sums of money
-Copyright: using copyrighted materials without consent
-Fair use doctrine: use copyright materials without consent and in countries that are illegal
-Pirated software: unauthorized use, duplicate, distribution , or sale of copyrighted software.
-Counterfeit software: unethical business conduct and fraud the customer

Describe a situation involving technology that is ethical but illegal.
Acting ethically and legally are not always the same for instance, when a family member collapses, you take it upon yourself to take them to the hospital. By driving your car and going above the speed limit and ignoring other traffics laws,  to get to the hospital as soon as possible. This can be seen as a ethical and illegal thing as it right to take the patient to the hospital and also illegal as the driver is ignoring all traffics rules thus risking other people's lives.


Describe and explain one of the computer use policies that a company might employee
Internet use policy contains general principles to guide the proper use of the Internet with an organisation. These policies are:
1. Describe available internet services
2. Define the purpose and restriction of Internet access
3. Complements the ethical computer use policy
4. Describes user responsibilities
5. States the ramification for violations
 A policy that company employee is
 'Describes user responsibilities': This ensures that users understand the behavioural guidelines of the business. In addition, it also boosts the efficiency of the work standards and the effectiveness of their  employees in the company. 

What are the 5 main technology security risks AND Outline one way to reduce each risk.
The Five man technology security risks are:
-Human Error: after complete recheck to find any mistakes
-Natural Disasters: regularly save data as back up and in alternative area
-Technical Failures: install a trustworthy spyware fighter and  regularly save data in a separate
-Deliberate Acts: constantly monitor the employees actions when working in the firm
-Management Failure: Ensure proper training and procedures in the workplace to new employees



What is a disaster recovery plan, what strategies might a firm employee?
Disaster Recovery is a process of regaining access to computer systems and data after a disaster has taken place.
All firms should have a comprehensive disaster recovery plan that outlines exactly what happens in a disaster . The plan should list things like:
-communications plan: regular recovery tests and well documented procedures              
-alternatives sites- off site data kept in date order
-Business connection                                                        
-location of backup data: offsite data kept in order

No comments:

Post a Comment