The IT Manager was excited about your plans to implement software restriction po
ID: 3903090 • Letter: T
Question
The IT Manager was excited about your plans to implement software restriction policies in the new network upgrade. They have been experiencing problems with employees downloading unlicensed software off of peer-to-peer networks and installing them on company computers. Discuss these challenges with your team.
What are the ethical and moral dilemmas in using peer-to-peer networks? Are they fundamentally right or wrong?
Describe at least two successful legislations related to computer security, information privacy, or Internet crime. Did they effectively address the issues? How could they do better?
Explanation / Answer
Enterprise security has grown in complexity over the last decade. The goal of this publication is to show the proper methods of creating, implementing, and enforcing an enterprise information security plan. During the initial phase of the plan, the assessment, it is imperative that the shareholders of the enterprise identify the most valuable assets that need protection. The information technology department must be part of this determination so that strategies for network vulnerability mitigation can begin to emerge. Once there is a clear image of what it is that needs the most protection, then costing analysis can start. That is why identifying all possible vulnerabilities is critical so that if cost is an issue we can start prioritizing those assets in terms of what risks can the business afford versus what policies must be in place to avoid the exposure of the asset to the risk, by curbing employees’ current behaviour.
ETHICAL DILEMMAS IN USING PEER-TO-PEER NETWORK:
Peer-to-peer networks are one of the main sources of Internet traffic, and yet remain very controversial. On the one hand, they have a number of extremely beneficial uses, such as open source software distribution, and censorship resilience. On the other hand, peer-to-peer networks pose considerable ethical and legal challenges, for instance allowing exchanges of large volumes of copyrighted materials. the ethical quandaries posed by peer-to-peer networks are rooted in a conflicting set of incentives among several entities ranging from endusers to consumer electronics manufacturers. The discussion then turns to the legal, economic, and technological remedies that have been proposed, and the difficulties faced in applying them.
LEGISTATION RELATED TO COMPUTER SECURITY:
Electronic Communications Privacy Act (ECPA): this law setting standards for how the government can access digital information of citizens ,ECPA allows the government to obtain access to digital communications -- including email, Facebook messages, information sitting in your public cloud provider's databases, and a variety of other files -- with only a subpoena and not a warrant once those items are 180 days old.
Cyber Intelligence Sharing and Protection Act (CISPA):At a basic level, CISPA dictates how companies share information about cyberthreats with the federal government.
Computer Fraud and Abuse Act (CFAA): CFAA makes it a federal crime to access and share protected information.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.