Saturday, December 21, 2019
The Ethics in Securing the Internet Essay - 4456 Words
The Ethics in Securing the Internet Introduction In order to understand the concept of internet security and why it is necessary it would be worthy of analysis to discuss what would happen if not enough of it is provided, meaning that the levels of security are not utilized to the full extents. This is exactly where the big issue of hacking and hackers becomes involved. Hackers can benefit from a wide range of weaknesses in security, break into systems, find the information they need, and eventually change them to fulfill their desire. This, over the years, has resulted in great deals of information loss in big companies throughout the world, causing them to not functioning properly or eventually break apart. This is preciselyâ⬠¦show more contentâ⬠¦The next step taken was in 1966 by Roberts (from MIT), Donald Davies and Roger Scantlebury of NPL. Roberts who at that time was planning to set up ARPANET in MIT, was informed by the two NPL people about the work done by NPL and the RAND group - who had written a paper on packet switching networks in 1964.[1] After spending some time talking about their work, they came to know that MIT, RAND and NPL had been working in parallel without any of them knowing about the other ones work. So eventually, pocket was picked from the work done by NPL and the line speed - upgrading from 2.4 kbps to 50kb ps, was decided to be used in ARPANET. During the years, after 1969 computers were added to the ARPANET and attempts were made to complete the host-to-host protocol. In December 1970, the Network Working Group finished working on the initial ARPANET protocolShow MoreRelatedSecuring It Infrastructure At Wd Enterprises1268 Words à |à 6 PagesSecuring IT Infrastructure at WD Enterprises In order to properly secure the Information Technology (IT) infrastructure today, there are many different areas that need to be addressed. Each of these areas pose different vulnerabilities and challenges to properly securing an IT environment. By identifying these vulnerabilities, applying controls to address them, and designing a robust security plan the IT infrastructure at WD Enterprises will be more secure and provide better protection against theseRead MoreShould You Hire an Experienced Hacker to Protect Your It Systems819 Words à |à 4 PagesIn undertaking the daunting task of securing your Information Technology systems, I think you have to take what ever measures necessary. You can not afford to let competitors or criminal minded individuals gain access to your vital data. I say who better to safeguard this information than someone who knows the intricacies of what a hacker looks for when trying to infiltrate a network. I think you would be making a mistake not to at leas t look in to hiring a hacker to help your organization. FistRead MoreEthics of Wiretapping1104 Words à |à 5 PagesPatrick Hughes Philosophy 203 ââ¬â Introduction to Ethics August 7, 2015 ETHICS OF WIRETAPPING Since the First World War, government has been known to use private companies to wiretap phone lines for information. The legal structures, established by the 1978 Foreign Intelligence Surveillance Act (FISA), have defined a framework for legally securing a warrant for searches and tapping into phone lines of the American populace. Sometimes the government uses warrantlessRead MoreEthical Issues Regarding Information Technology1638 Words à |à 7 Pagesincreasingly aware of the need for the ethical use of technology. Information technology (IT) users need a code of ethics developed, so that they can navigate through the ethical issues they confront while using information technology. When ethical violations occur, enforcement of the ethical standards is required. With the advancement of online education, there is a need to interpret how a code of ethics would be established within this academic environment. In our generation the technology has been beneficialRead MoreThe Value of Digital Privacy in the Information Technology Age1283 Words à |à 5 Pagesthe one hand and the need for protecting the privacy of individuals on the other, are creating a myriad of conflicts regarding ethics, laws and personal rights. Never before in the history of modern society has there been such a strong emphasis on capturing, analyzing, categorizing and using personal data that had been highly protected in the past for purposes of securing nations (Ottensmeyer, Heroux, 1991). Correspondingly, there has never been a time when every aspect of life in an organizationRead MoreSetting And Enforcing Clear Lines Of Responsibility Essay1461 Words à |à 6 Pages(Tadesse, 2006). 2.4.4. Promoting Appropriate Ethics and Values Trevino et al (1999) study showed having specific characteristic of ethics in auditing had an impact on the corporate governance of companies. This study found that consistency in companyââ¬â¢s action towards policy that led to action of ethics ensured that there was creation of financial statements that were truthful. Collins (2001) asserted that leaders are responsible in promoting a culture of ethics and values in the organization that theseRead MoreWhat Discovery Invention Or Idea Could Have The Greatest Impact On The 21st Century?1231 Words à |à 5 Pagesthe 21st century? Many of us take advantage of the internet in our daily lives now, in fact now there are more devices connected to the internet than the entire human population of our planet. Cisco believes that by 2020 the total things connected to the internet will surpass 50 billion. That doesnââ¬â¢t even include all the devices and things not connected; such as a cell phone without battery. A new form of internet systems is beginning to emerge, and in the coming years it will seeRead MoreSocial Media As A Marketing Tool1602 Words à |à 7 PagesThe way that individuals and businesses communicate and interact has radically changed. With the development of technology and the internet, people can connect almost instantaneously and with very little effort. Social media has come to play a huge part in the way that the world communicates with each other. In fact, a recent report shows that in a single month people spend over 25 hours on social networks (ââ¬Å"The Digital Consumerà ¢â¬ ). With consumers committing that much time to social media sites, socialRead MoreThe Influence of Ethical Issues on Information Technology Usage1165 Words à |à 5 Pagesethical principles of beneficence, fidelity, nonmaleficence, autonomy, justice and veracity. These principles along with other provisions set a standard for nursing care. Nonmaleficence is the avoidance of harm or hurt; core of medical oath and nursing ethics (nursingworld.org, 2013). This is a nurseââ¬â¢s primary obligation. In nursing informatics, nonmaleficence should be a main commitment. It is the reason privacy settings are set on computers;à only authorized health care professionals are allowed to viewRead MoreNetwork Security For Organizations And Organizations1669 Words à |à 7 Pagesupdated software. Provide tools to make it helpful for IT staff and implement the policy. Permanently close the backdoor of the network so that it will provide high security. Plug the security holes by installin g updates and improve the efficiency. Securing Organization by keeping password resets which gives access to trusted authorities only. 2. To what extent it can perform efficiently in the organization. Efficiency for organization will only done by protecting with technical passwords which are
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.