This report discusses the importance of ethics in IT and the need to secure personal information of customers. It explores the implementation of secure networks and cloud-based services for information security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: Ethics in IT0 Ethics in IT Report Student names
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Ethics in IT1 Table of Contents Part- a...............................................................................................................................................2 Part –b..............................................................................................................................................3 Part –c..............................................................................................................................................4 Part –d..............................................................................................................................................5 References........................................................................................................................................6
Ethics in IT4 from internal as well as external sources. Security policies are implemented on the all employees and they are responsible for their computer system and process. Therefore, system can be more secure form cyber-attack. Part –c In present era, most of the organizations are expending business in market. Therefore, it is necessary to implement cloud-based services in InfoSec program of OZ Dispatch.Cloud-based approach in business is most popular thing in present time. It will provide competitive advantage to the organization as well as more security and flexibility. It is a basic need of an information system to include cloud-based services to enhance their services. Data warehouse and business intelligence will be beneficial for OZ dispatch in terms of economic advantages. Business intelligence will provide a new face to their market. It will helpful in the decision-making. According to(teaching.csse.uwa.edu.au, 2019), ethics should maintain in the system to avoid unethical activities in a system by staff member. According to many survey, it founded that internal staff members are also provided help in data breaches for their personal benefits. Therefore, it is necessary to design code of ethics to secure customers and business data, such as sales and product information.To make more secure, they can involve biometric authentication to verify details of all the employees. It will provide high security to the organization. It is not too much expensive, as it will require basic biometric devices and software to manage all the things. Information security requires holistic approaches to secure customers and business information from the cyber-attacks as well as internal unethical access of personal data of the customers, such as emails, mobile numbers, and many others(Soomro, et al., 2016). Business Intelligence is highly used in present time in analysis of data by the data analyst, which will provide analysis reports and analysis templates. Those things are useful for the decision- making by managing director and other mangers(Baars & Kemper, 2008). They should implement latest server, which can manage different domains of the organization, as the company will establish headquarter at a single place. Therefore, they will require access of all the systems and sites from headquarter. The company can manage all the things from a single place, with the help of better servers and network. They will have large volumes of product, sales, and customers information in their system. Therefore, they will involve data warehouse to
Ethics in IT5 manage all the data in a structured way. All the processes are having unstructured data, which are not suitable for analysis.
Ethics in IT6 Part –d For OZ Dispatch, it must follow the defend security policies and standards, which are provided by the Australian government and agencies. It is a necessary step to secure the information security system more secure from cyber-attacks and internal security. According to( Cobb, 2010), ISO/IEC27001 standard is beneficial to secure different resources of the organization, such as servers, networks, computers, and many others. It is a necessary and required standard to secure information assets of an organization.Australian government Information Security Manual (ISM) will be followed to design a secure network for the customers and business information security(ACSC, 2019).ISM secures all the tangible and non-tangible resources of the organization, such as data, security system, and many others. It will prevent all resources form cyber-attacks as well as any disaster. There should be a backup server that has a backup of all the data and information of customers and business, which is useful for the business continuity after any disaster or cyber-attack on the system. Ethical framework of IT will be followed to make secure whole system form internal and external attacks. For personal benefits, employees provide their personal authentication to others. Therefore, it is necessary to implement the entire security essential to secure all the system. Information security policies will be designed based on the Australian government and computer security agencies guidelines. It will stop all the bad things in the network and it will provide details responsibilities of employees in the organization(Dunham, 2018). According to( Kostadinov, 2018), information security policy is playing a huge role in security of data. That policy is having many key elements, which will provide security to personal information of customers and business.According to(Humphreys, 2008), information security standardsarebeneficialforthegovernance,complianceandriskmanagementofthe organization. It will provide vulnerabilities of the whole system using risk assessment and it will provide proper risk controls to handle those risks, if they will occur in future.Organization should make code of conduct to secure their resources and information assets through laws, rule, regulations, and policies. They can also use intellectual property rights for their resources and innovations. It makes them secure as per the rules and laws.OZ dispatch will secure their servers and network through security policies and firewalls configurations.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Ethics in IT8 Mason, R. O., 2017. Four ethical issues of the information age.In Computer Ethics,1(1), pp. 41- 48. McDermid, D., 2008.Ethics in ICT: An Australian Perspective, Frenchs Forest N.S.W.. Australia: Pearson Education Australia. McDermid, D., 2015.Ethics in ICT: an Australian perspective.2nd ed. Australia : Pearson Higher Education AU.. Meredith , D., 2018.Ethical Hacking: Vulnerability Analysis.[Online] Available at:https://www.pluralsight.com/courses/ethical-hacking-vulnerability-analysis [Accessed 14 March 2019]. Soomro, Z. A., Shah, M. H. & Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,pp. 215-225. teaching.csse.uwa.edu.au, 2019.Australian Computer Society Code of Ethics.[Online] Available at:http://teaching.csse.uwa.edu.au/units/CITS3200/ethics/acs-ethics.htm [Accessed 12 March 2019].