Journal #3

It is apparent that computer security is a highly debated issue in the field of computer ethics. In this era, computer viruses and global spying by hackers can be as far as thousands of miles away. The issue is not so much the physical hardware security such as keeping it from theft, fire, flood, and so on. However, “logical security,” which is broken into five parts: privacy and confidentiality, integrity (ensuring that data and programs are not modified without sufficient authorization), uninterrupted service, consistency (ensuring that the data and behavior we see today will be the same tomorrow) and controlling access to resources. One of the first computer ethics concerns to spark public interest was privacy. Computer technology is especially dangerous to anyone who wants to keep different kinds of sensitive information out of the public domain or out of the hands of people who are thought to be potential threats.

An example of sensitive information are medical records. This is due to how easily and efficiently computers and computer networks can be used to gather, store, search, compare, retrieve, and share personal information. Safeguarding data integrity is extremely important for both businesses and their consumers. When the correctness, dependability, and system are guaranteed and illegal change is avoided, data integrity is safeguarded. Consistency guarantees that the facts and behavior we observe today will persist into the future. That is why it imperative to understand the ethical issues that arise when storing electronic information about individuals. Control access to assets according to organizational needs, user administration, authentication procedures, and monitoring all are necessities in terms of planning for businesses who are in this line of work.

Leave a Reply

Your email address will not be published. Required fields are marked *