Sunday, June 16, 2019
Information Security and Ethics Essay Example | Topics and Well Written Essays - 500 words - 1
Information Security and Ethics - Essay ExampleOrganizational strategies (policies, leadership, training, etc.) judicial admission is one policy that would be required where each employee has his or her computer, to prevent spread of viruses when one is infected. Further, the organization should control the sites in the network and also outer devices plugged into to the computer.This female genital organ be appropriately be described as type of packet that support advertisements. It displays or downloads a banner that is not cute by the user, within his or her software. The software is most of the time embedded with the software of interest by the manufacturer, with the intent of sinking the cost of development.With regard to protect the organization system from adware, the organization should ensure that, only licensed and registered software is purchased. They should also install antivirus to attack the abrupt advertisements. Furthermore, it should within the planning of the o rganization, to trades with licensed software producing companies. It should also ensure that employees have clear instruction as to whom to consult in case of software installation in their computers.The impact of the threat is that it can either corrupt the data or steal the information stored by the user. Example is the computer virus which decodes or corrupts the system information of the computer, autorunIt is defined as a malicious set of instructions that executes actions within the machine without users legal authorization. The impacts of Trojan include data copying, modification, blocking, deleting or even time out of network and computer performances.Installation of firewall, security passwords, and data encryption should be done. The local connection within the organization should have identification, such that only those battalion permitted to access, can gain entry in to the system.Another threat experienced by the organizations is hackers. These are unwarranted users of network or computer. Their impact to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.