100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Case

WGU IT C299|IHP4 TASK 2 ETHICS AND CYBERSECURITY

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
31-03-2025
Written in
2024/2025

Introduction Any organization that works with information technology must prioritize cybersecurity. Businesses are more likely to experience cybersecurity breaches as they use new technologies to enhance their operations. These breaches can have disastrous repercussions, including data loss, monetary losses, and reputational harm. Using the case study of TechFite, a made-up technology business that had a security breach, we will discuss ethical concerns in cybersecurity in this essay. We'll also make suggestions for how to solve these issues and raise security awareness throughout the company. A. Ethical Guidelines and Standards for Information Security at TechFite Ethical Guidelines and Standards The concepts of discretion, honesty, and accessibility should serve as TechFite's ethical norms and standards (CIA). Only authorized individuals will have access to sensitive information thanks to confidentiality. Integrity guarantees the information is true and full, and availability guarantees that authorized individuals can access the information when necessary (Fischer & McGraw, 2019). All information systems, including hardware, software, and data, should follow these rules. Moreover, TechFite must abide by pertinent regulatory requirements, such as the California Consumer Privacy Act (CCPA) and the Global Data Protection Regulation (GDPR). Most businesses have moral standards that all consumers must abide by. All certified individuals must adhere to the methodology used by CompTIA. Without the customer's express permission, a Certified Person may not reveal any confidential client information. (CompTIA, unknown) If TechFite followed this policy, Carl Jaspers would be unable to access sensitive data from the company's HR and financial departments without the necessary authorization. Due to their close friendship, Nadia Johnson transgresses this rule by failing to properly disclose any criminal behavior carried out by Carl Jaspers. Unethical Practices at TechFite The IT department, especially the Chief Information Officer, acted carelessly and resulted in the security breach at TechFite (CIO). The CIO did not put in place the necessary security precautions, like routine software updates and password changes. Also, the IT division neglected to encrypt private information, opening it up to unwanted access. Data on TechFite's customers, including credit card information, was compromised as a result of this negligence. The unethical behavior is shown by the social connection between Carl Jaspers and Nadia Johnson. Nadia Johnson is under pressure from this relationship to cover up all of Carl Jaspers' illicit acts. Giving Nadia Johnson a present and giving her supervisor a positive assessment about her are unethical behaviors that prevent Nadia Johnson from writing her regular report on internal act

Show more Read less
Institution
WGU IT C299|IHP4 TASK 2 ETHICS
Course
WGU IT C299|IHP4 TASK 2 ETHICS









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU IT C299|IHP4 TASK 2 ETHICS
Course
WGU IT C299|IHP4 TASK 2 ETHICS

Document information

Uploaded on
March 31, 2025
Number of pages
5
Written in
2024/2025
Type
Case
Professor(s)
Prof
Grade
A+

Subjects

Content preview

WGU IT C299|IHP4 TASK 2 ETHICS AND CYBERSECURITY

ADDRESSING ETHICAL ISSUES FOR CYBERSECURITY: A CASE STUDY OF TECHFITE



Introduction

Any organization that works with information technology must prioritize cybersecurity. Businesses are
more likely to experience cybersecurity breaches as they use new technologies to enhance their
operations. These breaches can have disastrous repercussions, including data loss, monetary losses, and
reputational harm. Using the case study of TechFite, a made-up technology business that had a security
breach, we will discuss ethical concerns in cybersecurity in this essay. We'll also make suggestions for
how to solve these issues and raise security awareness throughout the company.

A. Ethical Guidelines and Standards for Information Security at TechFite



Ethical Guidelines and Standards

The concepts of discretion, honesty, and accessibility should serve as TechFite's ethical norms and
standards (CIA). Only authorized individuals will have access to sensitive information thanks to
confidentiality. Integrity guarantees the information is true and full, and availability guarantees that
authorized individuals can access the information when necessary (Fischer & McGraw, 2019). All
information systems, including hardware, software, and data, should follow these rules. Moreover,
TechFite must abide by pertinent regulatory requirements, such as the California Consumer Privacy Act
(CCPA) and the Global Data Protection Regulation (GDPR). Most businesses have moral standards that all
consumers must abide by.

All certified individuals must adhere to the methodology used by CompTIA. Without the customer's
express permission, a Certified Person may not reveal any confidential client information. (CompTIA,
unknown) If TechFite followed this policy, Carl Jaspers would be unable to access sensitive data from the
company's HR and financial departments without the necessary authorization. Due to their close
friendship, Nadia Johnson transgresses this rule by failing to properly disclose any criminal behavior
carried out by Carl Jaspers.

Unethical Practices at TechFite

The IT department, especially the Chief Information Officer, acted carelessly and resulted in the security
breach at TechFite (CIO). The CIO did not put in place the necessary security precautions, like routine
software updates and password changes. Also, the IT division neglected to encrypt private information,
opening it up to unwanted access. Data on TechFite's customers, including credit card information, was
compromised as a result of this negligence. The unethical behavior is shown by the social connection
between Carl Jaspers and Nadia Johnson. Nadia Johnson is under pressure from this relationship to
cover up all of Carl Jaspers' illicit acts. Giving Nadia Johnson a present and giving her supervisor a
positive assessment about her are unethical behaviors that prevent Nadia Johnson from writing her
regular report on internal activity at TechFite. Furthermore, it is unethical for Carl Jasper to have created
two fictitious user identities in order to get unauthorized access to the private data of the Finance and
HR departments.

, The behavior of Sara Miller and her coworkers Megan Rogers and Jack Hudson is another act that results
in unethical activity. In order to obtain information from these corporations without permission, they are
illegally scanning the networks of other businesses. Nonetheless, upholding the code of ethics typically
forces Sarah Miller to request the necessary authorization and consent before carrying out any network
scan activities.

Factors Leading to Lax Ethical Behavior

The lack of a clear security policy, a lack of understanding of cybersecurity dangers, and inadequate
training for IT workers are only a few causes of TechFite's unethical activity. Because cybersecurity was
not given priority by the organization, security was handled reactively rather than proactively. The CIO,
who oversaw cybersecurity, lacked the required technical know-how and didn't take it seriously. Because
TechFite lacks a policy governing employee interactions, Carl Jaspers was able to persuade Nadia
Johnson to cover up his illicit conduct by filing a false audit report. The team led by Sara Miller was able
to engage in illegal network scanning activity at TechFite due to a lack of effective implementation of the
vulnerabilities and threats management scanning policies and procedures. Any network scanning
activities carried out without the necessary authorization and agreements will generally be regulated
and punished with a good application of this policy. For instance, Sarah Miller, Megan Rogers, and Jack
Hudson were able to engage in unlawful and unethical network scanning activity on the networks of
other businesses without the required authorization and agreement thanks to TechFite's improper
application of this regulation. There are no suitable account and identity management policies or
procedures in place at TechFite that would restrict or forbid any workers from giving access to create two
fictitious user accounts. Because there were no policies in place, Carl Jasper was able to access the
private information of the TechFite HR and Finance Departments by setting up two fictitious user
identities.

B. Mitigating Problems and Building Security Awareness



Information Security Policies

Two information security policies can be implemented by TechFite to stop or lessen criminal activities.
First TechFite should enact a stringent password policy requiring staff members to update their
passwords frequently and refrain from using passwords that are simple to decipher. Third-party vendors
who have access to the company's systems should be covered by this policy as well.

A data encryption strategy that mandates that all sensitive data be encrypted in order to guard against
unauthorized access should be put into effect by the second TechFite. The user account administration
policy and process as well as the identity management policy should be TechFite's first policies to be
reinforced and made sure they are enforced. By putting these standards into place, it will be easier to
audit all user account activity and find the two false user accounts Carl Jaspers set up. The identity
management policy will also help in monitoring every user account activity, checking a list of users'
rights, and preventing unauthorized users from accessing confidential data belonging to TechFite and its
clients.

TechFite should support the interpersonal interactions at work with this policy, which goes beyond
information security. With the aid of this policy, TechFite will support the development of a positive, safe,
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
wguexamhub

Get to know the seller

Seller avatar
wguexamhub Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
9 months
Number of followers
0
Documents
62
Last sold
6 months ago
"WGU Exam Hub: Study Smarter, Pass Faster!

Welcome to WGU Exam Hub – Your Partner in Academic Success! At WGU Exam Hub, we understand the challenges of balancing studies, work, and life. That’s why we’re here to make your academic journey smoother, smarter, and more successful. Whether you're preparing for exams, tackling assignments, working on projects, or diving into research, we’ve got you covered! Our Services: Exam Help: Access expert study guides, practice tests, and personalized tutoring to help you ace your exams with confidence. Assignment Assistance: Get step-by-step support to complete your assignments on time and to the highest standard. Project Support: From planning to execution, our tools and resources will help you deliver standout projects. Research Guidance: Find curated resources, tips, and frameworks to streamline your research process and produce top-quality work. At WGU Exam Hub, we’re committed to helping you achieve your goals. Let’s turn your hard work into success – one step at a time. Start exploring today!

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions