Sunday, February 27, 2011

Ethics and Information Security


4.1 Explain the ethical issues surrounding information technology.
Information technology and its advancements can stir up issues such as violating copyright as well as property rights.  The right to privacy and confidentiality are two main issues that are related to ethics. This is all based around topics of trust. It is a matter of online information remains exclusive to authorized access. It reflects ethics of the company and avoids any customer violations.

4.2 Identify the differences between an ethical computer use policy and an acceptable use policy.
Ethical computer use policy ensures that user behaviors are conducted in a matter that complies with the general guidelines fit to user policy. This controls user behavior limiting their access to distractions. Acceptable use policy is the agreement in order to receive access to the internet or network.

4.3 Describe the relationship between an email privacy policy and an Internet use policy.
Email privacy policy is the measure of privacy of email messages to outsiders. It is up to the organization of the email system to determine the privacy level. Email is not completely private. Internet use policy regulates appropriate use of the internet. This regulates offensive resources found on the internet.

4.4 Explain the effects of spam on an organization.
Spam affects the email of all levels of an organization. It backs up email systems and distracts IT resources from important business processes.  Spam is used as business communication that can be deceived as unimportant to receivers.

4.5 Summarize the different monitoring technologies and explain the importance of an employee monitoring policy.
Employee access to internet services can interfere with the work expected to be completed. There are many ways to monitor employee activity. Key logger records every keystroke and click of the mouse by the user. Hardware key logger is the device that interprets keystrokes from the keyboard to the motherboard. Cookies allow websites to access customer activity from a small file.  Spyware tracks online activity, regulates the information on the computer and uses the CPU to complete tasks unknown to the user. One set of information stored on a web server is a web log for every visitor to a website. Clickstream records information such as which websites were visited, how long, what was purchased and what ads were displayed on the website. Other forms of monitoring employees are through monitoring policies. These are important to businesses by informing workers of proper behavior. Monitoring policies organize when, how, and where the company monitors employees.

No comments:

Post a Comment