StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical, Legal, and Professional Issues in Computing - Essay Example

Cite this document
Summary
The paper "Ethical, Legal, and Professional Issues in Computing" examines the ways computer crimes can harm a firm's assets and how to prevent them. One of the key acts is the Computer Fraud and Abuse Act through which the affected employer can initiate legal proceedings against the employee…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Ethical, Legal, and Professional Issues in Computing
Read Text Preview

Extract of sample "Ethical, Legal, and Professional Issues in Computing"

Insert the assignment need to be submitted Ways computer crimes including hacking can harm organization’scritical assets and how it can prevented Safeguarding critical information in an organization, involves securing it and keeping it in right hands with the aid of Information technology tools and by following important data protection protocols or policies. Rapid changes in electronic and computerized systems enables organizations as well as individuals to store, process and analyze the data. On other hand, changes in communication and storing information also raised numbers of issues regarding security and protection of organizational information assets. Achieving a secure platform to storing the information (with security and privacy) has become more difficult due to various tools used and actions carried out by the miscreants including hacking. In an organizational setup, the miscreants could be mainly the employees, and that makes the process of protecting critical data a more complex and detailed one. Thus, the focus will be on how organization’s critical data could be tampered and stolen by the employees and how it can be protected, as well as how those miscreant employees can be punished through laws. Organizations operating in different industrial sectors would gather a lot of vital information in their daily transactions which is mostly collected, processed and stored into various information systems. These data/information collected could encompass different types of critical assents including personal and private information about the employees, customers, and also researched and analyzed information about the organization’s products and services, and importantly details about the organization’s financial status as well as that of customers’ private financial details. When employees with dubious motivations and also disgruntled employees find about the importance of these information, they could found ways to access and also tamper it. “An employee obtains confidential information from the employers computer system while employed, and then uses the information to the employers detriment.” (Eichten 231). Hacking as a process involves hackers or computer users using various types of information technology tools and also other computer programming knowledge to make an unauthorized access to the computers and information systems of individuals as well as organizations. This perspective of hacking was defined by Duquenoy, Jones and Blundell (18) who stated “hacking as a process carried out by hackers or individuals who seek to gain unauthorized access to computer systems, and obtains illegal access to them.” In that direction, hackers could first target the critical assets, which are not kept under safe environment inside the organizations. That is, if the dubious and disgruntled employees are given authorization and access to their Information System’s infrastructure by the organization and its management, without understanding the employees’ dubious motivations, then they could misuse it. That is, as they have the authorization and even the knowledge about those infrastructures, they could easily infiltrate it and take away the data. Also, if those locations are protected by weaker physical structures and weaker encryption and decryption processes and passwords, then the employees can hack and thereby decipher those passwords, to steal those data. Employees could also hack the data when those data are transferred from one infrastructure or location to another through data transfer mechanisms like internet, intranet, etc., and also by using data storage devices. Thus, when the security of these key critical assets is breached by the employee themselves, they would sell those confidential data for financial gains to the organization’s competitors. Also, they could give it to Third-Party malicious individuals or entities, who might negatively use it to the detriment of the organization. All these acts of accessing computers without authorization or in excess of authorization, and the subsequent use of such access to obtain information can cause loss or damage or defrauds another or the government. (Eichten 231). Therefore information system protection is organization’s paramount necessity To prevent the employees from hacking, organizations need to come up with a range of steps to actualize a strong Information security apparatus. As von Solms and von Solms (2) stated information security is a complex issues, in which there is no single “off the shelf” solution for these issues, and so they have to look at range of options, with the top management in association with the IT department playing the major role. The basic crux of that information security plan is to help and make the user or employee understand in a better manner, what are the acceptable and responsible behaviors while accessing the information assets. This way, the organization can ensure that the employees are imbibed with the safe and secure processing of information in their daily routine (Hone and Eloff 23). In that direction, firstly organization can optimize the security and thereby integrity of its critical data. This can be done by storing those critical data in structurally safe physical structures and then strengthen access to those structures through both physical security and encryption security. As far as physical security is concerned, it has to be multi-layered. The building that holds that infrastructure has to have concrete bollards, metal barriers as well as strong and safe mechanical gates, locks, etc. Then when it comes to the electronic access control that facilitates entry into those systems, it is of key importance to incorporate failsafe feature. That is, multi-level password features has to be included, so only the authorized employee who fully knows the protocol can access it. When others do it, it will fail and shut down. In addition, constant monitoring has to be done through CCTV fixed at vantage points in those structures. Apart from these physical protections, the data importantly has to be protected digitally as well. For that purpose, the stored data and even the transferred data has to be encrypted in a strong manner using various tools. “Secure data storage is defined as the protection of data content and changes in data state from its original storage on electronic media by using encryption processes.” (“Information Technology Security Standards”). When this is done, any employee may not be able to “see” the data, even if they have access to it. That is, with strong encryption, they will have difficulty in decrypting it and also accessing it fully. As only the intended person may know how to decrypt it and access it, other dubious and disgruntled employees will have no chance at it. Apart from these protections, steps have to be taken at the human resources level as well. That is, even before the employees particularly IT related employees are recruited, all the applying and prospective employees’ background have to be checked by the organization through their in-house team or with the aid of external agencies. Then, when apt employees, who have passed the background checks, are recruited there has to be more monitoring, to find whether they are involving themselves in any negative activities. In that direction, cameras could monitor their movement, and can show if there are any suspicious movements. Also, if the organization and management has any doubts about its employees, it can track the employees digitally by checking their phone calls, emails, and even their online bank transactions. Although, this step could give rise to privacy concerns, the option to check them has to be incorporated into the worker’s employee agreement. Despite all these safeguards, employees could indulge in hacking and other computer crimes, thus necessitating strong legal actions against them. In that direction, organizations can use number of acts that can make the hacking by the employees an illegal process and punish them. One of the key acts is the Computer Fraud and Abuse Act (CFAA) through which the affected employer can initiate legal proceedings against the employee, “alleging that the employee intentionally accessed a computer without authorization or in excess of authorized access and obtained and used information accessed from the computer” in a detrimental way to the organization. (Eichten 231). Thus, when the above discussed safeguards are strongly implemented inside the organization, and also the laws are strongly followed, then the behavior of the employees can be on the positive side, and they will avoid indulging in any form of computer crime including hacking. Works Cited Duquenoy, Penny., Simon Jones and Barry G. Blundell. Ethical, Legal and Professional Issues in Computing. Cengage Learning EMEA, 2008 Eichten, Molly. “The Computer Fraud and Abuse Act - a Survey of Recent Cases.” “ Business Lawyer, 66. 1 (Nov 2010): p. 231. Hone, Karin and Jane H Eloff. “What makes an Effective Information Security Policy.” Network Security, 6, (2002): 14-16 “Information Technology Security.” Washington State Department of Information Services, n. d. Web. 12 Dec 2012. von Solms, Basie and Rossouw von Solms. “The 10 deadly Sins of Information Security Management.” Computers & Security, 23 (2004): 371-376 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Ethical, Legal, and Professional Issues in Computing Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Ethical, Legal, and Professional Issues in Computing Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1790946-hacking
(Ethical, Legal, and Professional Issues in Computing Essay Example | Topics and Well Written Essays - 1250 Words)
Ethical, Legal, and Professional Issues in Computing Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1790946-hacking.
“Ethical, Legal, and Professional Issues in Computing Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1790946-hacking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical, Legal, and Professional Issues in Computing

THEORETICALLEGAL CREATION OF MYTHICAL COMPANY

Ethics 6 ethical Dilemmas 6 ethical Policies 7 References 8 1.... Lawsuits This portion of the report demonstrates the policies (basically, the ethical and the fair policies) that Future Inc will undertake with regards to the lawsuits in US.... Future Inc Table of Contents 1....
5 Pages (1250 words) Research Paper

Small Group Project

hellip; Business codes of conduct means documents that are applicable in three levels of management: code of conduct for employees, codes of professional practice and codes of business ethics (Bacher, 2007).... After review of existing codes of conduct and related laws and regulations, the following codes of conduct applies to all management and employees of ECG, and are accountable for complying with this code of conduct: Adherence to applicable laws and regulations All employees in all ranks of the company must adhere to the legal requirements of the American government and countries that ECG conducts business....
4 Pages (1000 words) Essay

Social and Legal Aspects of Computing

It is a legal requirement that such personal details should be obtained for a specific purpose only and not for any other reason whether legitimate or lawful.... (Names) (Institution) (Tutor) (Date) Question 1 This study is about safety of personal details against illegitimate use, storage, damage, exposure or interference....
6 Pages (1500 words) Assignment

Product Innovation and Pricing

However, it does offer physical evidence of the user being a photography enthusiast or even a professional.... Mega Pixels can offer large prints of excellent resolution, but most people who would value this feature may opt for more professional cameras.... ompetitive Pricing It is entirely legal for a restaurant owner to copy the price of a generic dish from a competitor, as long as he or she...
4 Pages (1000 words) Essay

Advice for Handling Potential Breaches of the Data Protection Act

Though her immediate supervision has assured her that this is not a… nor a breach of ethical compliance standards, she is concerned about the activity and is considering reporting INF to the Data Protection Commissioner.... In Joan's situation, there is clearly an ethical dilemma as none of the aforementioned public officials or corporate officers are aware that information about them is being stored, accessed, and analysed in the INF Ltd.... Though it has not been offered as to why this information is actually being collected, simply gathering information for future or current use about these officials and public figures creates non-compliance to ethical obligations of the business....
7 Pages (1750 words) Essay

Critique a legal article

Majority of the issues were humanistic in approach tackling about the actual institution of medical ethics.... Such will also prevent critical issues just like the featured case.... Hence, “violation of the standard of care for a care-giving task by a non-licensed aide is also a violation of the standard of care by the professional nurse responsible for supervising the aide” (Snyder, 2010).... However, there have been a growing number of legal concerns that were entertained too....
2 Pages (500 words) Essay

The impact of Technology on the Music

A Gift of Fire: Social, Legal, and Ethical Issues for computing and the Internet.... o the professional musician, the advancement has now created the realization that it would really take a lot of hard work and talent to be differentiated from a non-professional musician.... The challenge therefore rests with the professional musician to distinguish him or herself by adding something more to the song that the software cannot provide....
1 Pages (250 words) Essay

The Legal Issues and Potential Privacy Implications of This IT System

"The Legal issues and Potential Privacy Implications of This IT System" paper states that the company is bound to protect the privacy of a loyal customer and if some pilferage takes place, this might put the customer in a difficult situation while proving embarrassing for the company.... Legal issues can basically arise when somebody in the company tries to take undue advantage of the gullible customer had passed off the data to third parties or the retail company itself tries to sell off products or services without taking the customer into confidence....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us