Information Security System Implementation (Ethics)

How This Custom Writing Service Works

1. Place your order

Provide all instructions about the type of paper, length, deadline and pay.

2. Thorough research

Our team of professional writers conduct in-depth research on the topic to extract information from relevant sources.

3. Writing and proofreading

The experienced writers knit together all ideas into an original paper. Our editors go through the paper to correct any errors.

4. Product Delivery

You get your completed paper in your email. In case you need any corrections, we do ammendments free of charge.

Step 1 of 2

  • Price: $0.00

Why Buy Dissertations from us?

100% Original writing

No plagiarism. Original content written from scratch just for you. and custom free plagiarism report

Affordable writing service

Get your paper at a cheaper price than our competitors. Save money.

Timely delivery of orders

Never miss your submission deadlines again. We keep time & help you smile.

24/7 Customer support

Contact customer support or your writer any time for updates, drafts, etc. Call, Text, Whatsapp.

100% Private & Confidential

Your connection is private, your personal & payment information is secure

Need help placing your order?

Let nothing stop you from enjoying the best writing services. Save your time and focus on other aspects of your studies as professional writers work on your paper.
Affordable

Information Security System Implementation (Ethics)

Module 3: Information Security System Implementation

Case Assignment Brief

Based on the reading sources in the below sections and your own research,

prepare a 5-page report to address the following questions:

  1. Why is information security more than technology?
  2. How to design and implement a successful information security system.

 

Assignment Expectations

Your paper should provide a summary of your findings from the assigned materials

and any good quality resources you can find. Please cite all sources and provide a

reference list at the end of your paper. The following items will be assessed in

particular:

  1. Ability to consolidate ideas from reading materials.
  2. Demonstration of your understanding of how to create an information security

management process.

  1. The ability to express your ideas clearly.

 

Use at least 3 citations from the sources below

 

Required Sources

Ethics and Laws

Brey, P. (2007). Is information ethics culture-relative? International Journal of Technology and Human Interaction, 3(3), 12-24. Retrieved from https://search-proquest-com.ezproxy.trident.edu/docview/223245714?accountid=28844

Ethics retrieved on March 18, 2013, from http://fair-use.org/g-e-moore/ethics/

The security laws, regulations and guidelines directory. Retrieved on March 6, 2013, from http://www.csoonline.com/article/632218/the-security-laws-regulations-andguidelines-directory

Differences between ethics and laws. Retrieved on March 18, 2013, from http://www.kedah.edu.my/sahc/a_portal/portal_tekvok/ict/nota_ict_n_soceity/Microsoft%20Word%20-%20les7.pdf

 

U.S. Laws on information security – General law

Computer fraud and abuse act. Retrieved on March 18, 2013, from http://energy.gov/sites/prod/files/cioprod/documents/ComputerFraud-AbuseAct.pdf

Computer fraud and abuse act of 1986. Retrieved on March 18, 2013, from https://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_%28CFAA%29

National information infrastructure protection act of 1996. Retrieved on March 18, 2013, from http://ecommerce.hostip.info/pages/769/National-Information-Infrastructure-Protection-Act-NIIPA-1996.html (This law made changes to the above mentioned

Computer Fraud and Abuse Act. These changes were meant to add strength to that Act by closing legal voids to protect the computer information and networks.)

USA patriot act. Retrieved on March 18, 2013, from http://www.fincen.gov/statutes_regs/patriot.  (This law modified previous laws to grant law enforcement agencies more access to combat terrorism related activities. It has touched upon laws on electronic technology.)

Computer Security Act of 1987. Retrieved on March 18, 2013, from https://www.csp.noaa.gov/policies/csa-1987.htm

Computer Security Act of 1987. Retrieved on March 18, 2013, from http://epic.org/crypto/csa/

 

Information Security System Implementation (Ethics)

Information is an important aspect of life. It is disastrous for information to be in the hands of the wrong people. Successful implementation of information security systems protects information and reduces threats while maintaining the integrity of an organization, employees and all stake holders. Security is an integral part of any successful organization (Moore, 2017). Throughout the centuries, people have always created safety mechanisms to safeguard critical information from the reach of unauthorized people. Brands, governments and various groups of people keep information about their dealings more secretly than the technology itself. The federal government, for instance has legislated many laws, regulations and procedures that define the security issues of a system. Various state agencies and independent bodies such as the national institute of Standards and Technology and the Constitution contain various acts and laws which govern information systems.

Different cultures have different moral inclinations towards various aspects of information ethics. According to Brey (2007), the key aspects of information ethics include privacy, freedom of information and intellectual property.

Western countries have stricter recognition of individual rights than non-western countries.  Prevailing moral systems are important in enacting laws regarding information security. In order to enact and enforce information laws, intercultural information ethics must be employed in interpreting, comparing and normalizing the existing problems in the culture at hand. Cultural diversity explains the difference in ethical connotations in implementation of information security systems in various countries.

There are several laws regulating information security. The following are some of the most commonly known laws: The Computer Fraud and Abuse Act (CFAA) aims to reduce unauthorized interference with computer systems. According to CFAA specifications, access to computer systems by outsiders or intruders without authorization is punishable (ILT EFF, 2017). The Computer Security Act of 1987 provides computer standards which ensure computer security to the whole government and workers (NOAA OCIO, 2017; Computer Security Act of 1987, 2017). The law directory (CSO Staff, 2017) lists broadly applicable laws and regulations for corporate affairs, payment data security, consumer information, electronic funds, trade, children privacy and civil lawsuits. It also specifies laws regulating various industries, states and international relations.

Information security is always a work in progress. In order for information to be secure, it has to be protected by two policies. The first one deals with preventing external threats and the second one deals with reducing internal dangers. Both policies help in maintaining the integrity of information.

In order to address external aggression, technology must be enforced. In computer security systems, various technologies like the use of firewalls, email filters, antivirus software and anti-hacking technology helps in detecting unwanted users. Internal aggression is different. It mainly depends on the moral, goodwill and ethical values of people. Internal security entails employment of tactful management and the use of diplomacy and laws in regulating employee behaviors. Well defined policies can help organizations from inappropriate activities which violate security systems and information integrity.

Implementation of information security systems in an organization needs an all-inclusive approach. Nothing should be left to chance. This section outlines the procedure of developing and implementing an information security system.

 

  1. Identification of risks

In order to identify the risks, you must conduct a risk assessment to determine the most important data to the organization. While doing risk assessment, it is easy to identify security vulnerabilities threatening information safety. Generating a risk register can help in identifying critical systems, internal and external threats and vulnerabilities that are most likely to affect the system. The first step is important because it lays the foundation upon which all other processes rest. The process also helps in identifying the scale of operation and the budget estimates (Continuity Central Archive, 2017).  While identifying risks, you should specify the type of information whose access should be restricted. The best way of identifying risks is by monitoring the system and user information.

The type and amount of information accessed depends on the organization and the guiding policies in place. While some employees may feel that their user-generated data and their privacy is at risk, system monitoring helps in getting deeper insights about a system. To avoid ethical issues outlined in this paper, employees or system users should be informed about system monitoring. They should also be assured of safety of their information.

 

  1. Learning from others

Before adopting information security systems, it is important for an organization to learn from similar organizations. It is possible to get security information about various aspects online or through other sources such as books and publications. It is good practice to read various information system policies before adopting the best and workable ones.

 

  1. Formulation of policies

Once your organization obtains the information, it should formulate its own policies. It is not appropriate to pick any policies being used elsewhere and apply in your organization. All organizations are different. The policies developed should reflect the organization’s vulnerabilities and threats. Password policies, terms of use policies, privacy policies, encryption policies and any other applicable regulations should identify and specify the standards of accessing information in the organization. If necessary, create specific processes of following the policies and procedures.

 

  1. Conforming to policy and legal requirements

Federal laws regulating system security and access to data and information should be followed depending on the type of organization, jurisdiction and location. If required to follow certain laws, it is important to adhere to the minimum standards to avoid conflicts and ensure security and integrity of information. In case the company holds personal information, more stringent measures should be enforced to avoid infringement of personal rights and security breaches of the users.

 

  1. Staff training and involvement in policy development

Technical training of staff is necessary in ensuring compliance with the laws. Proper training should be done in case an organization uses new technology. All staff should be thoroughly informed of the security awareness by knowledgeable trainers. The staff should also be involved in decision making and in the implementation of the security system for better compliance. Employees do not like policies dictated from senior managers; they prefer to be part of the solution. The policies should be written and well displayed for easy access by all employees.

 

  1. Implement monitoring programs

After installation, security systems need regular monitoring in order to detect vulnerabilities and areas of weaknesses. Anomalies in networks and system access may lead to costly information breaches. System anomalies are indicators of more intensive system attacks which may expose information to unauthorized people. Weekly review of security logs or even more stringent measures can secure an organization’s system.

  1. Setting and enforcing penalties

Information security should be treated with utmost care. For instance, the network security of an organization’s computers is a serious matter. Given that a lot of sensitive information is at stake, there should be severe penalties for perpetrators of system insecurity and information breaches.  While implementing system safety, the organization should put measures in place for punishing offenders.  Haphazard compliance with the regulations is equivalent to having o policy at all.

  1. Update your staff

The network of a security system is always evolving. It is necessary to update the staff about any challenges, opportunities or threats affecting the system. The security policy document can be modified according to new discoveries in the system. Open communication is important to keep the staff informed of the day-to-day operations affecting their information.

  1. Installing necessary tools

Formulating a policy is different from enforcing it. Many companies are good at formulating and bad at enforcing policies. Installing necessary tools such as antiviruses, firewalls, two-step authentication and other related mechanisms can ensure adherence to policy. Although some tools cost money and expenses in installing, they must be implemented for safety of operation (Duigan, 2017).

 

  1. Finding the right balance

In information security, there is no one solution that fits all problems. Each organization must implement, verify, rectify and verify again until they get the right solution. With the evolution of threats, it is not possible to reach a time when systems are free from threats and weaknesses. Hackers, viruses and other vulnerabilities are constantly evolving to exploit weak spots in information systems. The need for constant implementation of security measures is as urgent as when you first began.

 

Conclusion

Implementation of information security systems is an important undertaking in any organization which desires safety and security of data. There are many statutory laws and regulations governing data safety and access to data depending on the national, cultural and ethical connotations. Just because laws seem good does not always imply that they can be used in any culture. In the implementation of security systems, the laws should not infringe into personal rights of the users. In order to secure information, proper laws should be enacted and enforced.

 

References

Brey, P. (2007). Is Information Ethics Culture-Relative? International Journal of Technology and Human Interaction3(3), 12-24. http://dx.doi.org/10.4018/jthi.2007070102

Moore, G. (2017). EthicsFair-use.org. Retrieved 27 September 2017, from http://fair-use.org/g-e-moore/ethics/

CSO Staff. (2017). The security laws, regulations and guidelines directoryCSO Online. Retrieved 27 September 2017, from https://www.csoonline.com/article/2126072/compliance/compliance-the-security-laws-regulations-and-guidelines-directory.html

ILT EFF. (2017). Computer Fraud and Abuse Act (CFAA) – Internet Law TreatiseIlt.eff.org. Retrieved 27 September 2017, from https://ilt.eff.org/index.php/Computer_Fraud_and_Abuse_Act_%28CFAA%29

NOAA OCIO. (2017). Computer Security Act of 1987Csp.noaa.gov. Retrieved 27 September 2017, from https://www.csp.noaa.gov/policies/csa-1987.htm

Computer Security Act of 1987. (2017). EPIC. Retrieved 27 September 2017, from http://Electronic Privacy Information Center

Continuity Central Archive. (2017). Implementing a good information security programContinuitycentral.com. Retrieved 27 September 2017, from http://www.continuitycentral.com/feature1093.html

Duigan, A. (2017). 10 steps to a successful security policyComputerworld. Retrieved 27 September 2017, from https://www.computerworld.com/article/2572970/security0/10-steps-to-a-successful-security-policy.html

Types of Academic Papers

Essay
Dissertation
Research Paper
Reaction Paper
Lab Report
Journal
Book Report
Book Review
Movie Review
Synthesis Paper
Review of the Literature
Research Proposal
Thesis Proposal
Dissertation Proposal
Annotated Bibliography
Article Critique
Term Paper
Case Study
Capstone Project
Artices
Presentation Design
Mathematical Problem
Mind Game
Tricky Questions

Dissertation Chapters

Dissertation Abstract

Dissertation Introduction

Dissertation Literature Review

Dissertation Methodology

Dissertation Results

Dissertation Discussion

best essay writing services

Types of Essays

Expository essay
Analytical essay
Persuasive essay
Narrative essay
Definition Essay
Descriptive essay
Process Essay
Personal essay
Admission essay
Compare and contrast essay
Cause and effect essay
Critical analysis essay

Order Your Custom Paper Now

Step 1 of 2

  • Price: $0.00

Acoustics
Agriculture
Anatomy
Animation
Anthropology
Archeology
Architecture
Artificial Intelligence
Arts
Astronomy
Biological Sciences
Biology
Business Management
Business Studies
Chemical Engineering
Chemistry
Civil Engineering
Communication
Computer Science
Construction

Consumer Science
Criminology
Cultural Studies
Design
Divinity
Earth Sciences
Economics
Education
Electrical Engineering
Engineering
English Language
Environment
Family
Fashion
Finance
Food Science
Forestry
Gender Studies
Geography
History

Human Resource Management
Journalism
Law
Library
Literature
Logic
Management
Marketing
Marketing
Mathematics
Mechanical Engineering
Media
Medicine
Military Sciences
Museum Studies
Music
Nursing
Nutrition

Philosophy
Physics
Political Science
Programming
Psychology
Public Administration
Religious Studies
Science
Social Work
Sociology
Software Engineering
Space Sciences
Sports
Statistics
Systems Science
Technology
Textiles
Theology
Transportation
Veterinary Medicine

Write My Dissertation offers top-notch customer support services. 

When working on your dissertation paper, expect to find us online via Live Chat 24/7/265. 

Our customer support agents are always ready to listen to you and deliver a quality dissertation.

Be free to contact the customer support team if you have any questions or comments.

How To Order PhD dissertation

Could you help me write my dissertation?

Yes. That’s our work to write a dissertation.

Use the green order form to order the entire dissertation.

Instead of pay someone randomly selected from the internet, it’s good to use a reputable company like WMD which specializes in dissertation services.

It’s now easy to buy academic papers online. You can phone place order, fill out the order form, pre order product and hire someone to write your paper just like that. Expect to get great work, just like many others have, for your first order and all others.

You’ll experience the best, get your order 100% unique and delivered in time (timely delivery).

Write my dissertation delivers custom writing services to customers from all states in the USA. Our services are provided in the English language. You can find the best custom dissertation services if you are from any of the following states or territories in the United States of America: 

Alabama, Alaska, American Samoa, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, District of Columbia, Florida, Georgia, Guam, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Minor Outlying Islands, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Northern Mariana Islands, Ohio, Oklahoma, Oregon, Pennsylvania, Puerto Rico, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, U.S. Virgin Islands, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming

If you need dissertation writing help in the English language, then we’ve got you covered.

Our clients are mainly English speakers  from: Australia, New Zealand, United Kingdom, United States, Antigua and Barbuda, Bahamas, Barbados, Belize, Canada, Dominica, Federation of Saint Christopher and Nevis. Others include Fiji, Ghana, Grenada, Guyana, Ireland, Jamaica, Kenya, Liberia, Nigeria, Papua New Guinea, Saint Lucia, Saint Vincent and the Grenadines, Sierra Leone, Singapore, South Africa, Trinidad and Tobago.