question archive National University CollegeHSE 420 1) What is the significance of applying Ethics to Information Security? 2) What are the most salient challenges to the U
Subject:BusinessPrice:3.87 Bought7
National University CollegeHSE 420
1) What is the significance of applying Ethics to Information Security?
2) What are the most salient challenges to the U.S., in terms of developing an effective information security program within an ethical framework?
Answer:
1.
What is the significance of applying Ethics to Information Security?
ANS
The cyber community's principal priority is to safeguard this vital asset. When it comes to protecting an information system, technical and technological security measures are sometimes insufficient. Because in an information system, there is a human factor. Ethics is a set of moral guidelines that people follow. Better and more reliable security can be achieved with the help of ethics.
Every day, new threats and unauthorized actions emerge as information technology advances. One of the most pressing issues today is protecting information assets from these threats and acts. However, sometimes technical and technological safeguards are insufficient to safeguard an information asset. Because there are so many variables to consider regarding information security, additional precautions must be taken. People are one of these variables. System administrators, security specialists, employees, and users are are the individuals who interact with the computer system. To keep people safe, param was created.
Information security safeguards the confidentiality, integrity, and availability of data assets from a variety of risks. Information security cannot be achieved solely through technical safeguards. There must be other options. To build robust and reasonable information security, operational, ethical, sociological, and legal measures must be considered in addition to technical standards.
The importance of people in achieving strong information security cannot be overstated. As a result, ethics comes to the rescue. Information security is ensured by people who act ethically in information systems.
significance of applying Ethics to Information Security
Cyber attacks frequently target personal and sensitive information. The loss of such sensitive data might be disastrous for your consumers, so you must have complete faith in the people you've employed to keep it safe. Cybersecurity experts have access to the sensitive personal information that they were engaged to safeguard. As a result, staff in these industries must have a strong sense of ethics and respect for your client's privacy.
Information technology also expands and alters so rapidly that navigating it requires a solid ethical foundation. Your team must determine what's best for your customers and coworkers.
Information technology also expands and alters so rapidly that navigating it requires a solid ethical foundation. Your employees must assess what's best for your consumers and the firm as a whole. Specific scenarios that your employees may face are difficult to predict. Therefore a solid ethical core can serve as the foundation that allows employees to behave in their best interests even in challenging, unforeseen situations.
2.
What are the most salient challenges to the U.S. in developing an effective information security program within an ethical framework?
Denial of service: Rather than compromise a service, the attacker tries to prevent it from being used. A denial of service attack is carried out via a large number of hosts.
• Trojan horse: Malicious malware that masquerades as harmless software.
• Computer virus: This type of virus reproduces by attaching itself to other executable files, and once executed, it can harm.
• Worm: A self-replicating program that duplicates itself. Worms can quickly spread over e-mail address books.
• Logic bomb: a logic bomb is inert until triggered by an event, such as a date, a user action, or, in certain situations, a random trigger.
• IP spoofing: An attacker can make a bogus IP address so that the receiver believes it was transmitted from a location where it is not considered a danger.
• Man-in-the-middle attack: Also known as session hijacking, this attack involves an attacker gaining access to a network through an open session, attacking the client machine to disable it, and claiming to be the client using IP spoofing.
• Rootkit: A set of tools used by an attacker after acquiring root-level access to a host computer to disguise its activity on the host and allow the attacker to maintain root-level access to the host through covert means after gaining root-level access.
References
Tipton, H. F., & Krause, M. (Eds.). (2006). Information Security Management Handbook, Volume 3 (Vol. 3). CRC press.
Siponen, M., Pahnila, S., & Mahmood, M. A. (2010). Compliance with information security policies: An empirical investigation. Computer, 43(2), 64-71.