Search This Blog

Friday, March 25, 2011

Week 5 Questions - Ethics and Security

1. Explain the ethical issues surrounding information technology?

Ethical issues that have surrounded information technology have increased overtime. Advances in technology have made it easier for people to copy things such as movies, music and pictures. Some ethical issues that are technology related include:
  • intellectual property - rights that protect creative and intellectual effort
  • copyright - exclusive right to do, or omit to do, cerain acts with intangible property
  • pirated software -unauthorised use, duplication, distribution of copyrighted software
2. Describe a situation involving technology that is ethical but illegal?

3. Describe and explain one of the computer use policies that a company might employee?

One computer use policiy that could be implemented by  a company could be an email privacy policy.
For instance, a sent amial is sent to 3 or 4 different computers. Simply deleting an email from one comupter does not delete from the other computers. Companies can therefore mitigate many of the risks using this system.

4. What are the 5 main technology security risks?

The five main security risks, include:
  • Human Error
  • Natural Disasters
  • Technical Failures
  • Delibriate Acts
  • Management Failure
5. Outline one way to reduce each risk?

Ways to prevent security risks:
  • Human error - Standard of training
  • Natural Disasters - Should have diaster recover plan, for e.g data back up, communication plan
  • Technical Failures - Robust system, backups
  • Delibriate Acts - This includes hackers, unhappy employees, viruses and spams
  • Management Failure - have some support training for managers in place
6. What is a disaster recovery plan, what stratergies might a firm employee?

 A disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.
Some strategies that firm might implement include:
  • Installing regualar virus updates
  • Perform data restorations tests
  • Back up all laptops and desktops
  • Monitor implemenation, and
  • perform off-site data back up and storage
REFERENCE LIST

Baltzen, Paige; Phillips, Amy; Lynch, Kathy; Blakey, Peter 2010, Business Driven Information Systems, McGraw-Hill Australia Pty Ltd

No comments:

Post a Comment