logo

Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession

This is a group assignment requiring each group of students to study a topic treated in this course and deliver an oral presentation in class.

20 Pages1848 Words225 Views
   

Added on  2023-06-04

About This Document

This group presentation covers personal privacy and security, how it is breached, and possible solutions. It also discusses organizational privacy and security, threats, and effects of breach. Additionally, it covers ethical conduct in IT security profession. The presentation cites various studies and researches to support the information presented.

Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession

This is a group assignment requiring each group of students to study a topic treated in this course and deliver an oral presentation in class.

   Added on 2023-06-04

ShareRelated Documents
Privacy and Security
Group presentation
Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession_1
Personal Privacy and Security
Personal privacy refers to the seclusion of an individual or information
about an individual from the public (Zhang, Sun, Zhu, & Fang, 2010).
Privacy focuses on giving individuals more control of their personal
information.
The level at which personal information is considered private depends
upon the individual person, laws, and policies, and culture and morality.
Security refers to the protection of personal data from unauthorized
access.
Security of personal data focuses more on ensuring the confidentiality,
availability, and integrity of personal data.
Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession_2
How personal privacy and security is
breached
Surveillance which infringes on personal private environment
especially in the workplace.
Unauthorized dissemination of personal information to either the
public or to parties who are not authorized to get the information
(Baek, Kim, & Bae, 2014).
Use of online cookies which store browsing data in a website and
user’s passwords.
Replication of personal data/ Information without the owner’s
consent.
Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession_3
Cyber attacks which expose personal data.
Masquerading which is where a person takes the identity of another
person.
Participation in online surveys which have no reliable means of
ensuring privacy and security of personal data (Medaglia & Serbanati,
2010).
Government agencies which tap communication lines and collect
personal data without informing the parties involved.
Social media platforms which use personal data for purposes other
than the one in the privacy terms and conditions.
Personal Privacy and Security: Threats, Solutions, and Ethical Conduct in IT Security Profession_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Analysis of Information Security Issues - OPM Data Breach
|5
|842
|267

Addressing Cyber Security Risks Information 2022
|1
|557
|17

Online Privacy - Issues of Digital Privacy
|9
|2330
|17

Reflective Journal on Ethics
|4
|767
|143

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Organizational Security Proposal : Fiction Private Limited.
|8
|1401
|100