Wednesday, April 17, 2019
Associations such as the ACM and the Australian Computer Society have Essay
Associations such as the ACM and the Australian Computer Society admit unquestionable code of morality for computing professionals - Essay ExampleOrganisations such as Association for Computer Machinery (ACM) and Australian Computer Society (ACS) atomic number 18 strong advocates of ethical practices by IT personnel and have laid protrude sets of recommendations. This essay will look at some of their codes and how they can have practical use in reducing clearly identified threats to computer systems.At the outset, it is important to remember that almost any soma of art enterprise today will have a dedicated IT department. Hence the code of ethics laid down by ACM and ACS are applicable to IT personnel of such departments, irrespective of the business ambit of the particular organisation. Some of the frequently occuring learning security breaches are common for almost all businesses that are enabled by Information Technology. Broadly speaking, the term system security threats refers to the acts or incidents that can and will tinct the integrity of business systems, which in turn will affect the reliability and privacy of business entropy. (Lin, 2006). Irrespective of the size of the organisation, the threat is persistent, and hence measures have to be undertaken to curb security breaches and ensure business continuity.Beyond the commonly identified security threats such as Viruses, Spyware, Adware, etc, a major source of information leakage and misappropriation occurs due to the abuse/misuse of computer network by employees themselves. (Lin, 2006). Since IT personnel have privileged access to vital business information, it is often very tempting for them to misuse this privilege and vitiate the prospects for their employers. Employees are also prone to using Internet connectivity for their personal use when in fact they were rigorously meant for official use. For example while email and general Internet access are given to remedy productivity, surve ys have shown that employees (including IT personnel) use them for such activities as online-shopping, playing games, social
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.