Journal Entry #2

on

Several ethical issues can arise when storing electronic information about individuals.

One of the foremost concerns is the protection of the privacy and personal data of the individual. Storing this sensitive information opens the door to attackers stealing personal and financial records, medical information, or browsing habits.

Informed consent and transparency are crucial to have before storing electronic information. If individuals are not aware of what data are being collected, how it is being used, who will have access to it, and the potential risks involved, it is not ethical to use such data.

Integrity, part of the main tenants of cybersecurity, is maintaining the accuracy of the stored data. Inaccurate data can have consequences for all parties involved. Their lives can be turned upside down by falsified information. The information must be reviewed regularly for accuracy.

The retention and disposal of data raise ethical concerns as well. How long should data be retained? Is the data from 10 years ago reflective of your current person? Organizations should also have clear policies on when data should be disposed of.

The U.S. faces cybersecurity threats that other countries do not.

The United States faces significant cyber threats due to its digital landscape. We have a large digital infrastructure, and a large economy, and nearly all of it relies on advanced technology. Not to mention, we have the largest military in the world which functions through the use of this technology. The U.S. is often a target for cybercriminals due to these reasons.

Other countries face similar cybersecurity challenges, but not at the scale the U.S. does. Countries like Costa Rica are prime targets for cybercriminals looking for an easier target. With less education on cyber threats, remote countries open themselves to these types of risks.

One of the separating factors of the U.S. is that it has a good regulatory framework. Different laws and regulations across federal, state, and industry levels help to provide a more comprehensive outline of how to mitigate and react to such attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *