Monday, August 23, 2010

Weekly Questions: Week Five - Ethics and Security

Chapter Four Questions
Ethics and Security
Explain the ethical issues surrounding information technology.

There are a number of ethical issues surrounding IT. The main issues include:
-Privacy: Having your own personal space, having secure data/information and not being observed without consent.
-Confidentiality: Private messages etc are only view for the authorised or intended participants.

Others include:
- Intellectual property: Keeping knowledge & information limited.
-Copyright: Where copyrighted goods are copied illegally.
-Fair use doctrine: Unauthorized use of copyrighted goods, images and creations.
-Pirated software: Where goods are duplicated and distributed without authorization.
-Counterfeit software: A type of software piracy that occurs when fake copies of software are produced in such a way that they appear to be authentic.


 http://www.ust.hk/itsc/antivirus/general/prevent.html





Describe a situation involving technology that is ethical but illegal.
If a friend is broke or poor and would like a computer program such as Microsoft Office and you burn and creat a copy of the program for free for him.

 Describe and explain one of the computer use policies that a company might employee
Acceptable use property: This would be used within a company to ensure the following:

1.Will not violate any laws
2.Will not break the security
3.Will not post commercial messages
4.Will not send spam
5.Will not send mail bombs
This will ensure a employee knows what is expected from them and has guidelines on how to work ethically within the workplace.


What are the 5 main technology security risks?
The 5 main Technology security risks are as follows;
1. Human Error: Not Malicious Error created by humans. Due to lack of training or carelessness leaving computers logged on.
2. Natural Disasters: Floods, Earthquakes, Terrorist Attacks.
3.Technical Failures: Software Bugs, Hardware Crashes
4. Deliberate Acts: Sabotage, White Collar Crime
5.Management Failure: Lack of Procedure, Documentation and Training.



Outline one way to reduce each risk.
1. Human Error: Firewalls or strong passwords
2. Natural Disasters: Regularly testing backing up goods.
3.Technical Failures:Having up to date technology
4. Deliberate Acts: Develop a security plan and purchase a security package to protect against viruses
5.Management Failure: Train staff.

 

What is a disaster recovery plan, what strategies might a firm employee?
A disaster recovery plan is the process of recovering data after an organisation has been affected by a disaster. Strategies include Alternative Site to store information and back up data.



1 comment:

  1. Ref's:
    http://www.computerlaw.com.au/dokuwiki/doku.php?id=wcl:brochures:copyit#importation_of_original_copies_of_copyright_works_into_australia

    http://www.fas.org/irp/crs/RL31423.pdf

    http://www.wisegeek.com/what-is-pirated-software.htm

    http://www.webopedia.com/TERM/C/counterfeit_software.html

    ReplyDelete