Confidential information can include an individual 's personal information, classified materials with national security implications and commercial intellectual property (Kim & Solomon, 2016). In the US, there are laws that protect confidential information and IT systems. These legislations require businesses and organizations to have security control mechanisms that protect the confidentiality of sensitive information. Safeguarding data confidentiality is not always easy as technological advances also provide means of easily accessing information from remote locations and making it accessible to many people (Dhillon & Backhouse, 2000). This is despite the numerous technologies that have been designed to protect sensitive data.
Technology is so advanced that there is people in our society that is smart enough to be able to crack or break into the strongest security protected systems. On the dark net where a lot of illicit activities happens on the internet these people are making profits off ordinary citizen’s personal information that is being on the world-wide
With computer technologies and the internet has connected the world together with the ability to communicate with people in different countries. As a society, we have become very dependent on computers and when the systems go down we cannot function as well, businesses cannot conduct their business. With the internet connecting the world together, it gives concerns for cyber-terrorism and cyber-attacks. Cyberterrorism is when a group attacks a target with intention of causing harm and further political, social, religious, or other goals. Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group.
Organizations must ensure to implement a genuine and licensed security monitoring tool to perform complete security monitoring with all the features embedded, if not there are high risks of security attacks on the network. 2. Security monitoring might prove to be costly, if the budget is not planned properly in order to mitigate many security threats to the organization. Let us consider some of the examples related to providing security monitoring solutions:
The rapid proliferation of information technology has led to a significant rise in the number of people who use the internet in one way or another. With the growth in the number of persons who have an internet connection; certain individuals have begun to exploit this resource through the unethical practice of Identity theft. As more and more individuals are posting their personal information online, cybercriminals are stealing this information with the aim of assuming the victim's identity so as to either obtain financial advantage or benefits that are associated with the victim (Jewkes, 2013). The act of stealing other people's identity cannot be considered as ethical because it violates the victim's right to privacy. According to
Government surveillance can have adverse effects on anyone’s life as it can be used to harm an individual’s reputation by exposing their personal information. In the digital age, terrorist’s use of the internet has increased to such an extent that all their communication and daily transactions occur on the internet. Keeping a close watch of the internet is almost necessary to prevent an unforeseen circumstance and to limit the approach of terrorist organizations around the world. The internet serves as the main source for recruits, funding and information, so limiting their access to the internet can prove effective in countering terrorists. The purpose of this paper is to investigate the question if government surveillance is necessary to counter terrorism.
Proponents on the use of phones argue that phones provide a safe space for people to spread and share positivity. However, in our generation cell phones are a place where people hide behind screens and hurt others, through cyber bullying, hacking and even online stalking. These acts have caused cell phones to ruin our generation. Phones have been used to dehumanize others through the act of cyberbullying, causing a variety of mental health issues. For example, in the article “Cyber Bullying: Just as Bad, Maybe Even Worse¨ the author Alicia Jones states,¨Cyber bullying can be very damaging to adolescents and teens.
Web is widely known as the Internet. Internet is a medium through which information can be viewed, reviewed and used either in a positive or a negative way. As everyone has an access to the information, there is a threat of misusing the data or sources available. A person can modify anyone’s data leading to unauthorized access and huge loss or damage; hence there is a need to secure the system thereby preventing the increasing cybercrimes. Now the question arises how to verify whether the security provided is accurate, adequate and correct?
Data security is the protective digital privacy actions that are applied to avoid unauthorized admission to computers, websites, and databases. It also protects data from corruption. Data security is essential for every different size and type of organizations in IT. The focus of data security is to confirm privacy while protecting personal or corporate data. Data is the raw form of information stored in our databases, network servers, and personal computers.
The Rand report R-609 was the document that began computer security, discussing policy considerations, intrusions, recommendations and physical security threads. 19- Who decides how and when data in an organization will be used and or controlled? Who is responsible for seeing these wishes are carried out? The Chief Information Officer (CIO) decided when and in what ways data will be controlled among an organization and the Vise President of Information Technology is responsible for seeing this wishes carried