Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
SOLUTION
Ethics and Cybersecurity Analysis Report for TechFite
To protect data, organizations and businesses have in place information technology security personnel responsible for protecting the organization’s networks, infrastructure, and systems. This personnel competently can apply ethical security principles and processes, which are uniquely aligned to an organization’s standards and identify with their specific need and demand to guarantee data confidentiality, integrity, and availability. This report, therefore, provides an analysis of TechFite company’s ethical and security concerns and challenges and develops a training program for awareness creation.
Ethical Issues for Cybersecurity
Ethical Guidelines or Standards
Ethical guidelines and standards for professionalism typically inform information security operations. Based on the TechFite report case study, the first identifiable information systems security association code of ethics is to maintain appropriate confidentiality of proprietary or otherwise sensitive information encountered in professional activities (Martin, 2017). This guideline and professional standards dictate that an individual, a company, or an information technology organization should ensure complete confidentiality of the data collected from external sources and only use them based on the existing laws or when authorized by a client. From the case study report, Carl Jaspers contacted and visited a client of Orange Leaf Software LLC through the CEO – Noah Stevenson – and other companies, after which hecollected and gave them to these businesses’ competitors. This confidential and sensitive information was stored on the applications division’s servers.
The second information systems security association code of ethics identified in the case study is a requirement for security professionals to protect the public’s trust and infrastructure. Based on the case study, there was a poor security posture in the Applications division. This created a conduit for sensitive data to be leaked to their competitors, and it became a public domain. Based on the case study, the information leakage found its way into public newspapers and cast doubt on TechFite’s ability to keep client data confidential.
Behaviours, or Omission of Behaviors, of the People Who Fostered the Unethical Practices
Based on the case study report, the first instance where there were behaviors, or omission of behaviors, of the people who fostered the unethical practices is; the failure to maintain appropriate confidentiality of proprietary information by Carl Jaspers. Therefore, this behavior or omission of the behavior is portrayed as an unethical practice of disregard for the trust put into him by both TechFite and their clients to handle information correctly. These second instance of behaviors, or omission of behaviors, of the people who fostered the unethical practices is the failure to accurately assess the security posture of the Applications division by Nadia Johnson. This behavior or omission of the behavior is portrayed as an unethical practice of perpetuating a nonchalant approach to proper security practices.
Sample Solutions
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Phasellus hendrerit. Pellentesque aliquet nibh nec urna. In nisi neque, aliquet vel, dapibus id, mattis vel, nisi. Sed pretium, ligula sollicitudin laoreet viverra, tortor libero sodales leo, eget blandit nunc tortor eu nibh. Nullam mollis. Ut justo. Suspendisse potenti.
Get sample solution
Order Now
Sed egestas, ante et vulputate volutpat, eros pede semper est, vitae luctus metus libero eu augue. Morbi purus libero, faucibus adipiscing, commodo quis, gravida id, est. Sed lectus. Praesent elementum hendrerit tortor. Sed semper lorem at felis. Vestibulum volutpat, lacus a ultrices sagittis, mi neque euismod dui, eu pulvinar nunc sapien ornare nisl. Phasellus pede arcu, dapibus eu, fermentum et, dapibus sed, urna.
Morbi interdum mollis sapien. Sed ac risus. Phasellus lacinia, magna a ullamcorper laoreet, lectus arcu pulvinar risus, vitae facilisis libero dolor a purus. Sed vel lacus. Mauris nibh felis, adipiscing varius, adipiscing in, lacinia vel, tellus. Suspendisse ac urna. Etiam pellentesque mauris ut lectus. Nunc tellus ante, mattis eget, gravida vitae, ultricies ac, leo. Integer leo pede, ornare a, lacinia eu, vulputate vel, nisl.
Suspendisse mauris. Fusce accumsan mollis eros. Pellentesque a diam sit amet mi ullamcorper vehicula. Integer adipiscing risus a sem. Nullam quis massa sit amet nibh viverra malesuada. Nunc sem lacus, accumsan quis, faucibus non, congue vel, arcu. Ut scelerisque hendrerit tellus. Integer sagittis. Vivamus a mauris eget arcu gravida tristique. Nunc iaculis mi in ante. Vivamus imperdiet nibh feugiat est.
Ut convallis, sem sit amet interdum consectetuer, odio augue aliquam leo, nec dapibus tortor nibh sed augue. Integer eu magna sit amet metus fermentum posuere. Morbi sit amet nulla sed dolor elementum imperdiet. Quisque fermentum. Cum sociis natoque penatibus et magnis xdis parturient montes, nascetur ridiculus mus. Pellentesque adipiscing eros ut libero. Ut condimentum mi vel tellus. Suspendisse laoreet. Fusce ut est sed dolor gravida convallis. Morbi vitae ante. Vivamus ultrices luctus nunc. Suspendisse et dolor. Etiam dignissim. Proin malesuada adipiscing lacus. Donec metus. Curabitur gravida