Answer to Question #197784 in Sociology for Jean Claude

Question #197784

IT2O5


Question 5

a) Identify and explain with practical examples the top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target for hackers. EV(10 Marks)


4 b) According to Jim Moor (1985), Computer Ethics had rapidly evolved because computers are logically malleable, and versatile. What does this mean? AP(5 Marks)


c) Whistle-blowing is sometimes defined as the act of an employee exposing an employer’s wrongdoing to outsiders, such as the media or government regulatory agencies. Distinguish between the two types of whistle-blowing that exist in Ghanaian society. AP(5 Marks) T


1
Expert's answer
2021-06-03T04:22:03-0400

Question 5

a) Identify and explain with practical examples the top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target for hackers. EV(10 Marks)

The Ten Most Dangerous Cybersecurity Threats Social engineering is the process of manipulating people's Social engineering assaults take use of social interaction to gain access to sensitive information.

Deception is at the heart of all social engineering attacks. Cybercriminals deceive and influence their victims into taking specific actions, such as circumventing security measures or disclosing sensitive information. Because the target invites hackers inside the system, even the strongest network security mechanisms cannot prevent social engineering attacks. According to experts, social engineering attacks are on the rise, which is why we consider them the most serious threat that must be eliminated.

Hackers can take data from third-party vendors using similar software, same as they did in the 2013 Target malware attack. Even if the attack is perpetrated by a third party, the firm that contracts the third-party supplier is still liable, and the law mandates that it notify its customers and regulators if a data breach occurs. Failure to update software patches on a regular basis might expose a company to a variety of information security threats.

Cloud Security Vulnerabilities. The higher our reliance on cloud data storage, the greater the potential of significant data breaches. Cloud-based services are susceptible to a variety of cyber-attacks. Account hijacking and denial of service (DoS) assaults are examples of this, which block companies from accessing your information. Because no technology can totally remove weaknesses, strong protection requires a holistic approach. Insurance is a crucial aspect of a comprehensive cyber risk management plan's protection. Data snooping Ransomware is a severe cyber security issue.

Ransomware is one of the top ten cyber threats, and it's a common strategy for cyber criminals to target organizations. Endpoint protection, which helps decrease lateral propagation and speed up response time, and multi-factor authentication (MFA) for remote network access, which helps prevent attacks before they happen, are both highlighted by ransomware.

Threats to mobile security. Mobile technology can be a valuable tool for a company, but it can also expose it to network security risks. Malware and malicious Wi-Fi are at blame for the majority of these attacks. companies often review threat and prevent them before happening

BYOD (Bring Your Own Device) Policy As part of their Bring Your Own Device (BYOD) policy, several organizations encourage employees to use personal devices at work. While BYOD policies have numerous advantages, they can also expose enterprises to major cybersecurity risks. Hackers have more access to personal devices than they have to corporate ones, giving them greater possibilities to disrupt networks and destroy data. To reduce cyber threats, it's critical to review these policies and ensure that personnel receive proper training.

The Internet of Things (IoT) (IoT). The Internet of Things (IoT) uses the Internet to connect gadgets all around the world. Many people and businesses use it because it is handy, but making it convenient also makes it vulnerable. Hackers can use an Internet connection as a point of entry to steal information. Extra security measures by campanies is expensive but must be taken to protect data.

Hardware that is no longer supported. Software isn't the only source of cyber-threats. It might be challenging for hardware to keep up with the rate at which software upgrades are published. As a result, there are dangers that corporate data may be compromised. Many antiquated devices will be unable to update with the newest updates and security measures when hardware becomes obsolete.

Older software-based devices are more vulnerable to cyberattacks, resulting in major potential risks. It's critical to keep an eye on this and act immediately if equipment becomes obsolete. You must keep your hardware up to current, just as you must keep your software up to current.

other measures by companies

9.avoid sharing of data to third parties

10.updating security softwares more often

4 b) According to Jim Moor (1985), Computer Ethics had rapidly evolved because computers are logically malleable, and versatile. What does this mean? AP(5 Marks)

In society, computer ethics poses new and distinct issues. We have lagged behind in defining this new discipline of ethics study due to the size of the information technology revolution. In technology-related sectors, intangible elements must be taken into account. To cope with moral challenges in a changing environment, we must identify policy gaps and establish new policies. Experience detecting trap kinds using "Moss" Teachers are sometimes concerned that their pupils may imitate each other's programming assignments, but they must be sufficiently differentiated. Moss is a system that compares program codes and verifies copy evidence, although it's unclear how it works in practice. Moss was used in computer science classes at the University of South Florida by Kevin Bowyer and Lawrence Hall. Moss can efficiently detect cheating when copying code from other students in the class, but not when copying code from other sources, according to the researchers.

c) Whistle-blowing is sometimes defined as the act of an employee exposing an employer’s wrongdoing to outsiders, such as the media or government regulatory agencies. Distinguish between the two types of whistle-blowing that exist in Ghanaian society. AP(5 Marks)

Whistleblowers are often employees who discover that their code of ethics has been breached, either purposefully or accidentally, posing a threat to the firm, consumers, or the public. Employees who work for a company are part of a team that makes and implements decisions. The reporting necessitates a reexamination of the same work and a split with the group that the journalist believes is necessary for the group's and company's financial success or survival. Whistleblowing can cause people's lives to be disrupted and the entire organization to be scrutinized. An organization's employee or former employee seeks to explain what they believe they did wrong in the organization. Internal, exterior, personal, and impersonal whistles are all possible. Whistling goes against the deep bonds and cultural standards that show commitment among Ghanaian society. When a devoted employee witnesses or assists the boss in unlawful or immoral action, an ethical problem can occur, and you must determine what to do. Blowing the whistle will not only cost you your work, but it will also harm your professional and personal life.

Internal whistleblowing is the first type. This means that the whistleblower informs another individual within the organization about the misconduct. External whistleblowing is the second type.The pressure applied to whistleblowers might range from complete termination to a more nuanced form of pressure.


Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
APPROVED BY CLIENTS