Chapter Four Questions
1. Explain the ethical issues surrounding information technology.
Ethical issues surrounding I.T. include the following:
· Intellectual property- the collection of rights that protect creative and intellectual effort. Advances in technology make it easier for people to copy everything such as music and pictures.
· Copyright – the exclusive right to do, or omit to do, certain acts with intangible property such as a song, video game etc.
· Pirated software – the unauthorized use, duplication, distribution or sale of copyrighted software.
· Counterfeit software- software that is manufactured to look like the real thing and sold as such.
· Fair use doctrine- to use someone else’s property no to make a profit
2. Describe the relationship between an ‘email privacy policy’ and an ‘Internet use .policy’
Email privacy policy are details the extent to which email messages may be read by others while an internet use policy contains general principles to guide the proper use of the internet. The policy:
1. Describes available Internet services
2. Defines the purpose and restriction of Internet access
3. Complements the ethical computer use policy
4. Describes user responsibilities
5. States the ramification for violations
The relationship between the two policies is that email privacy policy is a branch of internet use policy.
3. Summarise the five steps to creating an information security plan
1. Develop the information security policies: must identify who is accountable and in charge of designing and implementing the organizations information security policies.
2. Communicate the information security policies: educate and train all employees on the policies and establish their expectations.
3. Identify critical information assets and risks: necessitate the use of passwords and anti-virus software and technical protections such as firewall.
4. Test and re-evaluate risks: continually performs security checks, audits and assessments
5. Obtain stakeholder support: gain the approval and support of the information security polices from the board of directors and stakeholders.
4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.
Authentication: is a method for confirming users’’ identities.
Authorisation: is the process of giving someone permission to do or have something.
The most secure type of authentication involves:
1. Something the user knows e.g. password
2. Something the user has e.g. smart card
3. Something that is part of the user e.g. fingerprint
5. What the Five main types of Security Risks, suggest one method to prevent the severity of risk?
1. Human error- incorrect training’
2. Natural disasters- earthquakes and floods, disaster recovery needed
3. Technical failures- robust systems, hardware crashes
4. Deliberate acts- sabotages and white collar crimes
5. Management failure- lack of procedure and documentation
¡ Known Viruses
¡ Suspicious looking code
However, these must be updated regularly