Saturday, October 19, 2019

Writer's choice Term Paper Example | Topics and Well Written Essays - 750 words

Writer's choice - Term Paper Example With the implementation of effective security mechanism we can gain a great deal of confidence and peace of mind while using these systems at home or marketplace (Shelly, Cashman and Vermaat; Turban, Leidner and McLean). This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems. There are many issues and threats which are hindering the successful operation and working on information and computer system arrangements. In this scenario, one of the initial risks is security issues from less effectively recruited staff personnel. For instance, any staff member with some illegal aims and objectives can set a virus in the database or hack the overall corporate information. Additionally, this is one of the major ethical dilemmas in information and computer systems (UN; Farshchi, Gharib and Ziyaee). In addition, differences in operating systems, versions and patches can also create various problems and issues regarding defense and protection of information and computer systems. In the absence of such protection strategy the overall information and data can be hacked or deleted. In worst case the business information can be accessed by corporate competitors. Additionally, absence of antivirus software for information and computer systems can also cause a huge problem for personal or business data and information. In case of such situation any virus can simply attack and destroy or stop the overall working of systems. In addition, one of the main issues is about the absence of internal firewalls. In this scenario, any user of systems and web services are open to virus attacks, malware, or Trojan attacks. In such situation overall information and computer systems can be hacked or influenced in case of effective handling and management of operations (UN; Farshchi, Gharib and Ziyaee ). This section discusses how some of the major and critical security, privacy and ethical issues happen.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.