Module 8 Review
1. What can be done to improve the security of business uses of the Internet? Give several examples of security measures and technologies you would use.
Some improvements that can be done to improve the security of business uses of the Internet would be by using encryption, firewalls and email monitoring emails. First, encryption is when data that is sent between users and it will be scrambles so that other user will not be able to read it but only approved users can read it. Second, is the firewall because it stop internal and external users from accessing sensitive materials through the internet. Third, would be monitoring emails because hackers send out many emails with viruses and by just opening the email the network will become infected.
2. What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems? Give several examples.
The potential security problems that I see with the increasing use of intranets and extranets in business are denial of service, hackers and unauthorized data access. The reason for this is because as business are becoming more involved with the internet or the extranet and the chance of security risks are increase quite a bit. However, to solve such problems would be by knowing what website people are visiting to make sure that they are secure. Firewalls are a good was from preventing any unauthorized users from breaching the network. Lastly, is to make sure that all employee are following the policies and procedures because that will be any company’s main defense.
3. What is disaster recovery? How could it be implemented at your school or work?
A disaster recovery plan is when the company is continually backing up their data and sending it offsite just in case a natural disaster happens or a man-made act like hacking destroys the company’s data. This way the company’s data will not be lost forever and the recovery time to get back on track will be less. The way it could it be implemented at your school or work would be when the students are taking a test and something happens the data will be saved. At a company mast of all the data is important s but if there is a team project that has been going on for months, with the disaster recovery plan all of the data will not be lost.
4. What are several business decisions that you will have to make as a manager that have both ethical and IT dimensions? Give examples to illustrate your answer.
Several business decisions that I will have to make as a manager that have both ethical and IT dimensions are when I would be implementing new updated modern machine technology onto the shop floor. I would be taking jobs but I would just locate the employee to a different area. Also, when I change the way we do documentation by going from paper to paperless because it would be a big learning curve. Many employees that have been doing documentation on paper for the last thirty years and having to get used to a computer can be a challenge. Furthermore, once computers are implemented many employee do not know the risk associated with the internet and emailing. Therefore, I will have to educate the employee before they use the internet so that they do not cause any harm to the company.
You’re Internet Job Rights: Three Ethical Scenarios
a) Do you agree with the advice of the attorney Mark Grossman in each scenarios? Why or why not?
With each of the three scenarios I do agree with each one that Mark Grossman gave advice on because the reason being they all made scene. As an employer it is important to make sure that they are covered when it comes employee