Saturday, April 3, 2010

Week Five Questions

1. Explain the ethical issues surrounding information technology

There are several ethical issues surrounding information technology such as Intellectual Property, Copyright, Fair use doctrine, Pirated Software, Counterfeit software.

Intellectual property is the collection of rights that protect creative and intellectual effort.
Copyright is the exclusive right to do, or omit to do, certain acts with intangible property such as a song, video game and some types of proprietary documents.
Pirated Software is the unauthorised use, duplication, distribution, or sale of copyrighted software.
Counterfeit software is software that is manufactured to look like the real thing and sold as such.


2. Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.

The email privacy policy details the appropriate ways in which email messages should be used and the extent to which emails may be read by others. The email privacy policy also defines who legitimate email users are. The policy should complement the ‘ethical computer use policy’. Similar to the email policy, the ‘Internet use policy’ contains general principles to guide the proper use of the internet within an organization such as the available internet services and the ramifications for violations. The use of emails may be covered in the internet policy.


3. Summaries the five steps to creating an information security plan






4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

Authentication is a method for confirming user identities such as face recognition or smart cards where as authorization is the process of giving someone permission to do or have something.

Authentication and authorization can be classified into three categories. (1) Something the user knows such as a password or user ID, (2) something the user has such as smart card or token, (3) something that is part of the user, such as fingerprint.

5. What are the five main types of Security Risks, suggest one method to prevent the severity of risk?

The five main types of security Risks are:

1/Human Error

2/Technical Failure

3/Natural Disasters

4/Deliberate Acts

5/Management Failure

To prevent technical failure, a organisation may use robust systems and implement backups to prevent the loss of information.

No comments:

Post a Comment