Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Create a letter to the editor based upon the Cyber ethical issue within Informat

ID: 3853995 • Letter: C

Question

Create a letter to the editor based upon the Cyber ethical issue within Information Technology Management such Security and Privacy.

Template: Letter to the Editor (Ethics Issue)

<Name of Media Outlet or Publication>

<Attention: >

<Address 1>

< Address 2>

<City>, <State> <Zip or Postal Code>

Dear Editor:

(Do not indent paragraphs in a letter.)

(Do not use any first-person pronouns – I, me, we, us, our, ourselves, mine, my)

(Single-space your letter)

(Erase all directions including these and the ones below in your final copy. Make it look like a letter – without headings such as “Paragraph I – Introduction.)

Paragraph 1 – Introduction

States the topic you will be discussing and it is usually one or two sentences. Save your stance and supporting facts until later. As with all introductions, this should be attention-grabbing and draw the reader in.

Paragraph Two –Reaction

This is where you actually state your opinion on the topic you mentioned. It should be only one or two sentences.

Paragraph Three through Five – Supportive Arguments for your stance

These paragraphs are where you sell your opinion. You must use examples, strong facts, and details to support your stance. Each paragraph should be two or three sentences. Each paragraph contains a different argument for your opinion.

Paragraph Six – The Other Side

By making a counterargument (giving the other side), you are making your own argument stronger. Only one paragraph is needed. After you state the other side, you must then refute it. In other words, give reasons showing why that side is not valid.

Paragraph Seven – Suggestions or Solution

What do you propose to solve the issue? This should be one paragraph. Provide some options to fix the problem.

Paragraph Eight – Conclusion

End with an appeal to the reader(s). What do you want them or officials to do? What message do you want them to away from the editorial?

Sincerely,
<Writer’s Signature>

<Name of Writer>

<Writer’s Title>

<Writer’s Organization >

Explanation / Answer

XYZ Media,

South extension,

part-1, lane no. 12

new delhi, India , 110045

Dear Editor,

This is to draw your kind attention towards risking cyber ethical issues in Information Technology Management like security/privacy.These issues could be mishandled or addressed either by security professionals or employees of the organization.

Cyber attack, even ethical is a bigger threat for million users and business houses.knowledge about this issue at early stages in professionals plays an important role.

Security and privacy of data, information, decisions, work process etc. in personal or business houses, if breached, creates a big havoc to them. Network administrator, professionals or hackers have many rights to access the different information. The nature of work depends on their learning or practices followed.

Sometimes even knowing about or understanding the breach professionals do not inform the same to the client, which results in their big loss.

Even professional's access or privileges to encrypted data allows them to see through most of the information.What and how they do with these rights are actually the topic, here discussed.

Network administrator have the rights to access or keep logs of what the user or an employees does over the network. By keeping an eye on the websites visited,the content of e-mails sent or recieved or different activities over the network they somewhat try to maintain the code of conduct or discipine in the organization.For example if an employee visits porn sites during work hours, share the company's secret process information to outsider or opening the harmful files received by e-mails may harm the organization.

Other example is 'RansomeWare' threat which is recently happened all over the world results in locking of computers data and loosing right to access it. To resume data, one needs to pay handsome money to hackers.

There are many ways to solve the above issue.One of which is to introducing these issues at early stages to young professionals and make them learn about the ETHICS and not only the technologies or policies involved in learning or understanding the 'Cyber Security issues'. Also implemetation and practices of ethics after learning may play a vital role in security and privacy.Encouraging the professsional to make healthy decisons at work place with strong different access privileges may results in changing the game.

Learning technologies in cyber security issues or getting certificates alone can not bring the good name in IT industry. Reaching good decisions and practising healthy learning with access rights make the IT industry bloom along with the professionals name and position.

Sincerely,

Leon Parker

IT-Head

Pan IT Limited

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote