StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber security - Coursework Example

Cite this document
Summary
Cyber Security Name Institution Topic 1 Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society. However, in the dynamic state it represents contemporary beliefs expressed modes through ideas, creativity in thought and actions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Cyber security
Read Text Preview

Extract of sample "Cyber security"

Download file to see previous pages

An example of how cultural values impact on the moral legitimacy can be drawn on the norms regarding theft in society. The golden rule concerning ethical behavior stresses on treating other as you would wish for them to treat you (Cavalier, 2005). Consequently, the cultural norm pertaining to theft is that, it is a vice and a morally illegitimate behavior. On the other hand, if one’s cultural values ascribe to the ethics that justifies an action is morally right so long as it results to personal interest, the moral legitimacy is granted (Spinello, 2004).

The implication, resulting here is that theft is morally justified since it serves to benefit the thief. The linkage between the effect cultural values and cyber ethics is intricate and drawn from the moral legitimacy of one’s actions (Spinello, 2000). For, example in the case of content piracy, it is a form of theft yet based on the actor’s different points of view, issues pertaining to legitimacy arise. Foremost, there is one individual who views content piracy as illegal and a violation of cyber ethics.

His/her logic is drawn from the tenets of the Golden rule. However, on the flip side, there is one internet user who justifies his/her action based on the personal benefit derived from the action. His or her logic arguments include; why pay for expensive, when I can freely download it from the piracy sites? Besides, I am not harming anyone by my actions? Consequently, the different perspective regarding one’s cultural values and legitimacy of moral actions are the major challenges about the regulation of cyber ethics.

Topic 2 Ethics refers to the prescribed set of laws that govern the precincts of right or wrong behavior or actions in society (Averweg, 2006). The contemporary society is rapidly developing into a global village due to increased access and growth of information technology. Furthermore, companies have integrated information technology in facilitating their day to day functions. Beneath the growing fascination with internet use, there lies the need for developing a code of ethics that guides the behavior and actions of employees in the use of information and communication technologies.

There are several practices that can be integrated in the acceptable internet use policy of a company. Foremost, guidelines should specify that data must be strictly used for the satisfaction of the company’s business objectives. Furthermore, access to the internet can only be done via the company’s authorized firewall, router and content scanning software. Moreover, any employee accessing data should respect and comply with the legal protection accorded to it by the relevant licenses and copyrights.

In addition guidelines regarding security of both data collected and user should be addressed. Consequently, security measures such as encryptions and firewall software are to be applied in the company’s computer server system (Criddle). In relation to the acceptable conduct policy, a specific guideline for inclusion pertains to disclosure of data use information. Consequently, all employees are obligated to disclose any information regarding the type of data they store and their plans for usage.

Furthermore, company staff should only access and collect data in a manner that is not deemed as illegal or unfair. Another guideline pertains to the accuracy of data collection and retention policy. In light of this policy, all employees

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber security Coursework Example | Topics and Well Written Essays - 750 words”, n.d.)
Cyber security Coursework Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1457306-cyber-security
(Cyber Security Coursework Example | Topics and Well Written Essays - 750 Words)
Cyber Security Coursework Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1457306-cyber-security.
“Cyber Security Coursework Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1457306-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber security

Jobs in Cyber security

Instructor Date Jobs in cyber security According to occupational employment projections to 2014, employment is projected to rise to about 18.... hellip; For instance, in response to the growing threat of cyber-attacks, there has been an increase of cyber security positions, and this upwards trend is projected to last over the next 30 or so years (Geeks News Desk); cyber security jobs are well paying, and these professional earn way over their counterparts in general IT (Ballenstedt)....
3 Pages (750 words) Essay

Cyber Security Industry

cyber security industry is one of the emerging and evolving industries in the twenty first century as the business community and governmental agencies are commonly practicing the widespread usage of the internet.... By looking at the market trends of the growing businesses, it has come to notice that cyber security industry is one of the sectors that are growing at an unprecedented rate due to the technological advancement (Gallaher, Link & Rowe, pp.... intends to initiate the business in the cyber security industry....
14 Pages (3500 words) Research Paper

Cyber Security Policy Initiatives

The present paper under the title "cyber security Policy Initiatives" concerns the policy of cyber security.... hellip; The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as cyber security.... With the ever evolving cyber world, cyber security is of paramount importance....
11 Pages (2750 words) Research Paper

Cyber Security and Business

In addition, cyber security is important to the functioning of safety essential systems like the response to an emergency and to the guard of the government's infrastructure systems.... The private sector has been opposing governments efforts to impose stricter regulation of cyber security but it is of great significance to protect the telecommunication sector and electric grid that is in the hands of the private sector.... The author concludes that cybersecurity is very essential to national and homeland security in it assists in barring computer hackers from accessing critical information....
6 Pages (1500 words) Term Paper

Sample Cyber Security Profile

This paper discusses the many facets of protecting these vulnerabilities against large-scale attacks… One of the most crucial elements to understanding within the realm of security is the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element According to many publications, NIST is very proactive in this element as one of the main is attacks on User Domain....
4 Pages (1000 words) Essay

Cyber Security and Startups

The attack targets… The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort cyber security and Start-ups What is a DDoS attack?... The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information.... They do not also install security measures to protect against such attacks, which make them vulnerable to pay the ransom demanded....
1 Pages (250 words) Case Study

Cyber Security in Business Organizations

With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks.... Johnson and Goetz (2007) describe security risk management as a balance between “maintaining security” and keeping the Information security failures tip the balance and expose organizations to the aforementioned threats.... Organizations are challenged by the trend to ‘go global' which implies that security programs should encompass the entire global market of a firm....
5 Pages (1250 words) Case Study

Key Features of Cyber Security

The author of this coursework "Key Features of cyber security" describes significant cybersecurity vulnerability and associated threats in mobile computing.... hellip; cyber attacks can emerge from the Internet, internal networks, and/or other public systems as well as private systems....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us