Torre Williams
Professor Kirkpatrick
CYSE-200
03 February 2019
What are four ethical issues that arise when storing electronic information about
individuals?
The four ethical issues are the following: Fraud /Theft, Insider Threat, Malicious Hacker,
and Malicious Code. Fraud and Theft are often caused by the hands of authorized administrators,
who are familiarized with the systems. According to the reading, the primary cause of Fraud and
Theft is financial gain. Fraud and Theft are often found among social media, for example,
Facebook, Twitter, and Instagram etc… Social media tends to be used daily, where people tend to not
realize the greater amount of personal information that’s online without being mindful, often bring
about Fraud and Theft. With the use of social media, the results of attackers stealing personal
information can lead up to a social engineering attack. Social Engineering Attack is a
technique that monitors the human interactions that dealt with influenced individuals that have violated
protocol and indulged themselves in things that were very confidential. Along with this,
the APT (Advanced Persistent Threat) is a threat that is a long-term intrusion that gains access to data
and specific information. The second issue is dealing with the Insider Threat. This type of threat
deals with monitoring by the employees who are familiar with the system. They often point
out what was the cause of damage, disorder, and mischief. Also, employee sabotage is another way that causes an Insider Threat. Some examples of the employee sabotage are the following: destroying facilities and hardware, crashing systems, and changing administration passwords to prevent systems access. The third issue is Malicious Hacker. This type of threat deals with people who fully understand networking, programming, and computers to illegally cause damage, steal information and access the systems. The motivation that these anonymous hackers have given these organizations was the motivation to implement new security that is strong enough to protect these organizations. Lastly is the Malicious Code,
which is a virus created for the purpose of attacking a platform. A different division of the
Malicious Code is the following: logic bomb and the worm etc…. All together these divisions of the Malicious Code are many programs that carry out different functions as required.
An Introduction to Information Security.pdf (n.d). Retrieved from
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf