This week we were introduced to information technology and how it plays a role in the cybersecurity realm. Information Technology are tools that help us work with information and perform tasks for information processing. In a nutshell, information technology is the use of technology to work with information. This means to produce, manipulate, store, communicate, and/or dismantle information. Information can come in a variety of forms such as text, image, sound and video. We were also introduced to Information Security which protects data and information systems from unauthorized access, disclosures, or destruction. During this module we also went over the risks, threats, and ethical issues that arise when storing electronic information about people. The information security triad are work around three main components: confidentiality, integrity, and availability. Confidentiality protects information and restricts access to those who are allowed to see it. This can be seen in the healthcare system where there is patient-doctor confidentiality. Next, integrity gives assurance that the information being accessed has not been tampered with. Lastly, Availability means that the information can be accessed and changed by anyone that is authorized to do so. Although the security triad helps create a secure atmosphere for most companies, ethical issues can still arise. Thought unintentional, integrity can be lost due to a computer power surge corrupting a file. Another way integrity can be lost is when someone who is authorized to make a change accidentally deletes a file or enter information incorrectly. Another ethical issue is in authentication. A form of authentication is done by confirming something that the user knows. In most cases it is ID and password. This can raise ethical issues because it is easy to compromise the user and their identity can be potentially stolen. Another ethical issue is access control. Access control can find which users are authorized to read, modify, add, and/or delete information. ACL’s raise ethical issues because each information resource is managed separately. Therefore, if security administrators want to add or remove users, it would be difficult to do so. Furthermore, as the number of users increase, ACLs become harder to maintain.