Thursday, October 17, 2019
Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 words - 1
Information Security and Ethics - Essay Example Organizational strategies (policies, leadership, training, etc.) specification is one policy that would be required where each employee has his or her computer, to prevent spread of viruses when one is infected. Further, the organization should control the sites in the network and also external devices plugged into to the computer. This can be appropriately be described as type of software that support advertisements. It displays or downloads a banner that is not wanted by the user, within his or her software. The software is most of the time embedded with the software of interest by the manufacturer, with the intent of sinking the cost of development. With regard to protecting the organization system from adware, the organization should ensure that, only licensed and registered software is purchased. They should also install antivirus to attack the abrupt advertisements. Furthermore, it should within the planning of the organization, to trades with licensed software producing companies. It should also ensure that employees have clear instruction as to whom to consult in case of software installation in their computers. The impact of the threat is that it can either corrupt the data or steal the information stored by the user. Example is the computer virus which decodes or corrupts the system information of the computer, autorun à It is defined as a malicious set of instructions that executes actions within the machine without userââ¬â¢s legal authorization. The impacts of Trojan include data copying, modification, blocking, deleting or even disruption of network and computer performances. à Installation of firewall, security passwords, and data encryption should be done. The local connection within the organization should have identification, such that; only those people permitted to access, can gain entry in to the system. Another threat experienced by the organizations is hackers. These are unwarranted users of network or computer. Their impact to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.