WEEK TWO CMGT 400 INDIVIDUAL ASSIGNMENT
January 19, 2015
Common Information Security Threats involving Ethical and Legal
Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.
Identification of Threats
There are many threats a network faces when the IT department allows students to connect to the network or Internet …show more content…
Legal, Ethical, and Regulatory Requirements
People deliver sensitive data to organizations that have a clear need of it and that they trust to have their best interests in mind. Because a college campus has access to sensitive financial data, including tax information, bank accounts, and federal financial aid, there are many ethical and legal reasons to have enhanced network security. If a breach does occur, not only is it detrimental to the people involved, but the college could face the loss of reputation, large financial penalties, and possibly expensive lawsuits.
From an ethical standpoint, the personnel in charge of analyzing, developing, and maintaining security protocols should have the proper training and knowledge about what data the campus believes important and what protocols or procedures are in place to protect it. Integrity and honesty are also important for ethical practices. The college must validate and authenticate each person having access to the system, especially those handling sensitive information. Additionally, employees should receive training on the best practices needed to follow the college policies on password and network access and what threats to watch for.
From a legal