Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Research Paper:
Computer Security Ethics and Privacy
In today's fast evolving world of ICT, the advancement in processing and storage of information is of paramount importance, and it's crucial that the information be kept in the safest way possible. Computers and their various uses ranging from running multi-billion organizations to personal computers must be protected from harm, abuse and loss of valuable information. For this reason, the corporate sectors have employed different ways and strategies to prevent intrusions and disruption to the flow and normal working of the information system (Robert Plotkin). Cybercrimes are unlawful acts that take place online, these unlawfully acts have led to loss of information which costs most affected companies billions of dollars annually. Therefore, they have been termed as high alert risk; by the federal bureau of investigation that often monitor online malicious activities to prevent such crimes (Hauptman).
A hacker is an attacker who's unlawfully access computers with the intention of harm or retrieving information not meant for them. Apart from hackers, other cybercrime perpetrators are the cyber terrorist and cyber extortionist. The cyber terrorists are responsible for hacking into networks for political reason whereas the extortionist do it so as to interfere with emails and threaten the affected party in a bid to acquire money from them. The cyber terrorist will take advantage and will always request for an amount in order to let go the information hence blackmail (Miyazaki and Fernandez). Given the chance and resources, they are usually a continuous criminal cycle that frustrates the firms and, therefore, a lot of enforcement and tracing need to be put in place in order to put to a stop to their activities. Other crime perpetrators include script kiddie who are defined as the amateurs of the cybercrimes, because they use programs to hack and crack into systems. As the name describes, script kiddie is a teenager who has the motive of doing harm especially to the website (Dinev and Hart).
Unethical employees also play a big role in the distortion and theft of information and they either do it for the money or with an aim of revenging an earlier grievance. In such cases, the attack to the system is usually an inside job, and it usually causes a lot of damage as it is by a person who understands the strength and weaknesses of the company. Corporate spies are highly skilled professionals who hack computers to alter or retrieve data. They are the favorites of some companies that are trying to eliminate competition through unscrupulous ways. They usually hack into computers and carry out corporate espionage in a bid to outdo the other competitor (Robert Plotkin).
The risks involved when transferring or accessing information comes with attacks from four types of attacks on your computer, and they include, the virus, worm, Trojan horse and the rootkit. These are the main attacks used by all the cybercrime perpetrators to either corrupt or gain access to a computer. The virus account for the highest percentage of attacks and any computer that has no antivirus program or a well-built firewall usually is vulnerable to these attacks. The virus once introduced into a computer, it will always alter the functioning of the computer in a way that impairs it. With its continuous affection of the files, the virus spreads through the entire system leading to its failure (Cavusoglu, Mishra and Raghunathan). Lots of valuable information are usually lost this way making it very important to possess the antivirus that keeps the system on check and eliminates any unwanted or suspected programs and files especially when one is online. Another solution would be to make use of online security check- up services to detect vulnerability online service like the email (Dinev and Hart).
A computer worm is a program that continuously replicates and it takes up a lot of bandwidths leading to its wastage. Unlike viruses which make themselves a part of the executable files, the worm attaches to any file. The Trojan horse is a program that camouflages and acts appear to be like the normal programs but it's not (Dinev and Hart). It does not make copies of itself like the virus and the worm but causes the same potential of harm to the computer. Another common malicious program mostly used by hackers is the rootkit. The program is…[continue]
"Computer Security Ethics And Privacy" (2012, April 21) Retrieved December 5, 2016, from http://www.paperdue.com/essay/computer-security-ethics-and-privacy-112548
"Computer Security Ethics And Privacy" 21 April 2012. Web.5 December. 2016. <http://www.paperdue.com/essay/computer-security-ethics-and-privacy-112548>
"Computer Security Ethics And Privacy", 21 April 2012, Accessed.5 December. 2016, http://www.paperdue.com/essay/computer-security-ethics-and-privacy-112548
This information, stored on a computer and used to correlate with other data could be considered invaluable by many researchers, but the patients have a right to keep certain information private, and to suggest anything else would be an ethical violation of the patient's privacy. Because computer ethics is such a volatile issue, an entire branch of study has grown up around computer ethics, which proponents who believe the computer
The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it
Computer Security Analysis Security Analysis Managing security strategies for an enterprise requires intensive levels of planning and integration across each of the functional area, in conjunction with synchronization across departments, business units and divisions (Bellone, de Basquiat, Rodriguez, 2008). Enterprise Security Management strategies continue to become part of the overall strategic plans of an enterprise, supporting each strategic initiative and its related tactics to ensure profitable growth (Bellone, de Basquiat, Rodriguez, 2008).
Ethical Issues in Computer Security The ubiquity of information systems, more particularly those that are internetworked, has provided for better personal lives and enabled business to operate more efficiently and effectively ever than before. Congruent to the rise of various information systems and the information technologies that drive thereto is the challenges posed by these emerging and constantly evolving technologies and systems particularly in the milieu of ethics in computer
Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration
Patient Safety and Security Patient information, privacy and security are at the heart of providing a high level of medical services. These issues are vitally important if patient confidence is to be retained, in addition to ensuring that no potential harm comes to the patient. Hence, the information systems at any hospital should be managed in such a way as to retain the confidentiality of patient information, particularly where such information
Ethics in Technology Business - Management The purpose of this paper is to highlight and present the ethical issues that are involved in using modern technology. The paper highlights some of the current ethical issues faced by computer users that are due to unethical practice and lack of proper ethical policies by different businesses. The paper pinpoints the causes and gives recommendation on how the current issues can be minimized. A portion