Module 2

There are four ethical issues that arise when storing information electronically about individuals. Overall, computer crime is the number one problem when dealing with computer ethics. Computer crime is but not limited to; hacking, the stealing of any personal property, phishing, ransomware attacks, etc. The second main problem has to do with the ownership and responsibility for computer failure and holding those accountable. The third issue in ethics deals with the protection of computer property, records, data, and software. The fourth and final problem has to do with the privacy of the physical assets meaning the employees, the company itself, and the potential customers and clientele. Having proper protection for an organization can save a lot of money and time in the long run. Around 80% of the Cyber threats that the U.K. faces on a day to day basis are phishing attacks. The other portion falls susceptible to spyware, malware, and ransomware attacks. There are many different forms and types of malware. Malware can come in the form of botnet software which is designed to take as many computers and networks down at once as possible. A ransomware attack locks the user out of his or her account until the pay the requested amount from the holder of the account. The United States faces more generic attacks. Hacking is the U.S. number one cyber threat. Insider threats are also fairly common. This can happen when a disgruntled employee decides he or she doesn’t agree with company standards or policies or if they have been fired. The Internet of Things has become increasingly susceptible to attacks as there are many weak endpoints in the model. The United States also is weak in the region of trojan horse attacks, spyware attacks, rootkits, boot kits, and remote access trojans. A trojan is a form of malware that disguises itself as legitimate software on your computer while in actuality it is stealing information through malicious attacks on that device.

Leave a Reply

Your email address will not be published. Required fields are marked *