Edudorm Facebook

Identify one to two potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one solution that security professionals could take

Questions and Topics We Can Help You To Answer:
Paper Instructions:

Please respond to the following: 1-2 paragraphs. Then respond in one paragraph to the additional post.

Identify one to two potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one solution that security professionals could take in order to mitigate the challenge(s) in question. Justify your response.

Among the three definitions of cyber terrorism, give your opinion as to the one definition that is the most accurate with regard to information security and infrastructure protection. Next, describe the impact that cybercrimes and cyber terrorism are likely to have in the future. Provide a rationale for your response.

Once that section is completed, respond in one paragraph to the post below. State if you agree or disagree and the reasoning why. You may also add on to the conversation.

Employees that are in certain lines of work can have access to a lot of important private information about individuals.  As more and more information becomes accessible to the person it can be tempting to use this information for the wrong reasons.  I think this happens more than people know about in areas of work that employees would have access to criminal backgrounds.  Maybe the person is looking for a babysitter to come to their home and want to know as much as possible about that person.  If the person works in law enforcement then this gives them access to background checks for criminal and driver's license information.  With so many applications being mobile now if the employee was not in the office working they may think it is okay for them to access this information because they aren't "working" however the access to the information is for work purposes only so very much unethical to be done outside of the job.  The IT department could make it so the applications are not accessible outside of the office so this type of issue would not occur. 

The definition of cyber terrorism that talks about it involving an attack that denies service and disrupts daily life but does not cause substantial, irreversible, or lasting damage I think is about as close as it comes to what I think of when I think of cyber terrorism.  Although sometimes I do think that there is damage that is done that is irreversible.  I think as technology continues to grow on a daily basis cyber terrorism will decrease because security will become much better in the upcoming days to make it more impossible for this to occur.  

436 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...