100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Case uitwerking

WGU IT C299|IHP4 TASK 2 ETHICS AND CYBERSECURITY

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
31-03-2025
Geschreven in
2024/2025

Introduction Any organization that works with information technology must prioritize cybersecurity. Businesses are more likely to experience cybersecurity breaches as they use new technologies to enhance their operations. These breaches can have disastrous repercussions, including data loss, monetary losses, and reputational harm. Using the case study of TechFite, a made-up technology business that had a security breach, we will discuss ethical concerns in cybersecurity in this essay. We'll also make suggestions for how to solve these issues and raise security awareness throughout the company. A. Ethical Guidelines and Standards for Information Security at TechFite Ethical Guidelines and Standards The concepts of discretion, honesty, and accessibility should serve as TechFite's ethical norms and standards (CIA). Only authorized individuals will have access to sensitive information thanks to confidentiality. Integrity guarantees the information is true and full, and availability guarantees that authorized individuals can access the information when necessary (Fischer & McGraw, 2019). All information systems, including hardware, software, and data, should follow these rules. Moreover, TechFite must abide by pertinent regulatory requirements, such as the California Consumer Privacy Act (CCPA) and the Global Data Protection Regulation (GDPR). Most businesses have moral standards that all consumers must abide by. All certified individuals must adhere to the methodology used by CompTIA. Without the customer's express permission, a Certified Person may not reveal any confidential client information. (CompTIA, unknown) If TechFite followed this policy, Carl Jaspers would be unable to access sensitive data from the company's HR and financial departments without the necessary authorization. Due to their close friendship, Nadia Johnson transgresses this rule by failing to properly disclose any criminal behavior carried out by Carl Jaspers. Unethical Practices at TechFite The IT department, especially the Chief Information Officer, acted carelessly and resulted in the security breach at TechFite (CIO). The CIO did not put in place the necessary security precautions, like routine software updates and password changes. Also, the IT division neglected to encrypt private information, opening it up to unwanted access. Data on TechFite's customers, including credit card information, was compromised as a result of this negligence. The unethical behavior is shown by the social connection between Carl Jaspers and Nadia Johnson. Nadia Johnson is under pressure from this relationship to cover up all of Carl Jaspers' illicit acts. Giving Nadia Johnson a present and giving her supervisor a positive assessment about her are unethical behaviors that prevent Nadia Johnson from writing her regular report on internal act

Meer zien Lees minder
Instelling
WGU IT C299|IHP4 TASK 2 ETHICS
Vak
WGU IT C299|IHP4 TASK 2 ETHICS









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU IT C299|IHP4 TASK 2 ETHICS
Vak
WGU IT C299|IHP4 TASK 2 ETHICS

Documentinformatie

Geüpload op
31 maart 2025
Aantal pagina's
5
Geschreven in
2024/2025
Type
Case uitwerking
Docent(en)
Prof
Cijfer
A+

Onderwerpen

Voorbeeld van de inhoud

WGU IT C299|IHP4 TASK 2 ETHICS AND CYBERSECURITY

ADDRESSING ETHICAL ISSUES FOR CYBERSECURITY: A CASE STUDY OF TECHFITE



Introduction

Any organization that works with information technology must prioritize cybersecurity. Businesses are
more likely to experience cybersecurity breaches as they use new technologies to enhance their
operations. These breaches can have disastrous repercussions, including data loss, monetary losses, and
reputational harm. Using the case study of TechFite, a made-up technology business that had a security
breach, we will discuss ethical concerns in cybersecurity in this essay. We'll also make suggestions for
how to solve these issues and raise security awareness throughout the company.

A. Ethical Guidelines and Standards for Information Security at TechFite



Ethical Guidelines and Standards

The concepts of discretion, honesty, and accessibility should serve as TechFite's ethical norms and
standards (CIA). Only authorized individuals will have access to sensitive information thanks to
confidentiality. Integrity guarantees the information is true and full, and availability guarantees that
authorized individuals can access the information when necessary (Fischer & McGraw, 2019). All
information systems, including hardware, software, and data, should follow these rules. Moreover,
TechFite must abide by pertinent regulatory requirements, such as the California Consumer Privacy Act
(CCPA) and the Global Data Protection Regulation (GDPR). Most businesses have moral standards that all
consumers must abide by.

All certified individuals must adhere to the methodology used by CompTIA. Without the customer's
express permission, a Certified Person may not reveal any confidential client information. (CompTIA,
unknown) If TechFite followed this policy, Carl Jaspers would be unable to access sensitive data from the
company's HR and financial departments without the necessary authorization. Due to their close
friendship, Nadia Johnson transgresses this rule by failing to properly disclose any criminal behavior
carried out by Carl Jaspers.

Unethical Practices at TechFite

The IT department, especially the Chief Information Officer, acted carelessly and resulted in the security
breach at TechFite (CIO). The CIO did not put in place the necessary security precautions, like routine
software updates and password changes. Also, the IT division neglected to encrypt private information,
opening it up to unwanted access. Data on TechFite's customers, including credit card information, was
compromised as a result of this negligence. The unethical behavior is shown by the social connection
between Carl Jaspers and Nadia Johnson. Nadia Johnson is under pressure from this relationship to
cover up all of Carl Jaspers' illicit acts. Giving Nadia Johnson a present and giving her supervisor a
positive assessment about her are unethical behaviors that prevent Nadia Johnson from writing her
regular report on internal activity at TechFite. Furthermore, it is unethical for Carl Jasper to have created
two fictitious user identities in order to get unauthorized access to the private data of the Finance and
HR departments.

, The behavior of Sara Miller and her coworkers Megan Rogers and Jack Hudson is another act that results
in unethical activity. In order to obtain information from these corporations without permission, they are
illegally scanning the networks of other businesses. Nonetheless, upholding the code of ethics typically
forces Sarah Miller to request the necessary authorization and consent before carrying out any network
scan activities.

Factors Leading to Lax Ethical Behavior

The lack of a clear security policy, a lack of understanding of cybersecurity dangers, and inadequate
training for IT workers are only a few causes of TechFite's unethical activity. Because cybersecurity was
not given priority by the organization, security was handled reactively rather than proactively. The CIO,
who oversaw cybersecurity, lacked the required technical know-how and didn't take it seriously. Because
TechFite lacks a policy governing employee interactions, Carl Jaspers was able to persuade Nadia
Johnson to cover up his illicit conduct by filing a false audit report. The team led by Sara Miller was able
to engage in illegal network scanning activity at TechFite due to a lack of effective implementation of the
vulnerabilities and threats management scanning policies and procedures. Any network scanning
activities carried out without the necessary authorization and agreements will generally be regulated
and punished with a good application of this policy. For instance, Sarah Miller, Megan Rogers, and Jack
Hudson were able to engage in unlawful and unethical network scanning activity on the networks of
other businesses without the required authorization and agreement thanks to TechFite's improper
application of this regulation. There are no suitable account and identity management policies or
procedures in place at TechFite that would restrict or forbid any workers from giving access to create two
fictitious user accounts. Because there were no policies in place, Carl Jasper was able to access the
private information of the TechFite HR and Finance Departments by setting up two fictitious user
identities.

B. Mitigating Problems and Building Security Awareness



Information Security Policies

Two information security policies can be implemented by TechFite to stop or lessen criminal activities.
First TechFite should enact a stringent password policy requiring staff members to update their
passwords frequently and refrain from using passwords that are simple to decipher. Third-party vendors
who have access to the company's systems should be covered by this policy as well.

A data encryption strategy that mandates that all sensitive data be encrypted in order to guard against
unauthorized access should be put into effect by the second TechFite. The user account administration
policy and process as well as the identity management policy should be TechFite's first policies to be
reinforced and made sure they are enforced. By putting these standards into place, it will be easier to
audit all user account activity and find the two false user accounts Carl Jaspers set up. The identity
management policy will also help in monitoring every user account activity, checking a list of users'
rights, and preventing unauthorized users from accessing confidential data belonging to TechFite and its
clients.

TechFite should support the interpersonal interactions at work with this policy, which goes beyond
information security. With the aid of this policy, TechFite will support the development of a positive, safe,
€11,84
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
wguexamhub

Maak kennis met de verkoper

Seller avatar
wguexamhub Western Governers University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
9 maanden
Aantal volgers
0
Documenten
62
Laatst verkocht
6 maanden geleden
"WGU Exam Hub: Study Smarter, Pass Faster!

Welcome to WGU Exam Hub – Your Partner in Academic Success! At WGU Exam Hub, we understand the challenges of balancing studies, work, and life. That’s why we’re here to make your academic journey smoother, smarter, and more successful. Whether you're preparing for exams, tackling assignments, working on projects, or diving into research, we’ve got you covered! Our Services: Exam Help: Access expert study guides, practice tests, and personalized tutoring to help you ace your exams with confidence. Assignment Assistance: Get step-by-step support to complete your assignments on time and to the highest standard. Project Support: From planning to execution, our tools and resources will help you deliver standout projects. Research Guidance: Find curated resources, tips, and frameworks to streamline your research process and produce top-quality work. At WGU Exam Hub, we’re committed to helping you achieve your goals. Let’s turn your hard work into success – one step at a time. Start exploring today!

Lees meer Lees minder
0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen