Ethical Issues

1. Describe four ethical issues that arise when storing electronic information about individuals.

Data is unquestionably one of a company’s most valuable assets. Keeping large volumes of data in one place has become nearly painless thanks to easy-to-use and economical choices like cloud-based storage settings. However, corporations are no longer solely concerned with space.

Protecting storage resources and the data stored on them – both on-premises and in external data centers and the cloud – from accidental or deliberate damage or destruction, as well as unauthorized users and uses, is part of data storage security. Because the majority of data breaches are ultimately caused by a failure in data storage security, it is a vital problem for many organizations.

Various compliance standards, such as PCI-DSS and the EU’s General Data Protection Regulation (GDPR), need well-designed data storage security, giving storage security demands more legal weight.

Accordingly, strong data storage security strives to assure data accountability and authenticity, as well as regulatory and legal compliance, by reducing the risk of data theft, unauthorized disclosure of data, data manipulation, and accidental corruption or destruction.

Businesses in today’s digital environment rely heavily on data storage and transactions to complete certain tasks. Business profitability and efficiency have risen as a result of data use. At the same time, it poses security threats that might cripple a business.

 

The four ethical issues that arise when storing electronic information about individuals are: Privacy and Confidentiality, Security Breaches, System Implementation, and Data Inaccuracies.

 

Privacy and confidentiality:

In the field of cybersecurity, confidentiality is a major ethical concern. By their very nature, security professionals will come into contact with personal, private, or proprietary information that must be kept highly confidential. People who work in these fields may be tempted to spill whatever delicious information they uncovered when running a virus check on someone’s hard disk, but doing so could jeopardize that person’s job or personal life.

 

Security Breaches

A successful effort by an attacker to obtain unauthorized access to an organization’s computer systems is referred to as a security breach in cybersecurity. The theft of sensitive data, corruption or sabotage of data or IT systems, or actions meant to deface websites or harm reputation are all examples of breaches.

Types of Security Breaches

The method of attack used to gain access to secured systems or data is often a defining feature of security breaches. The following are some of the most typical types of security breaches.

Distributed denial of service (DDoS)

Man in the middle (MitM)

Social Engineering

Malware and Ransomware

Password Attacks

Advanced Persistent Threats (APT)

 

System Implementation

Cybersecurity controls are protections or countermeasures put in place by a company to defend itself from an occurrence that could lead to the compromise of electronic data. When it comes to cybersecurity, a compromise of electronic information refers to any occurrence that compromises the information’s confidentiality, integrity, or availability. The popular thinking in today’s quickly expanding technology and cybersecurity landscape is that any firm can and will experience a security incident- it is a matter of when, not if. The deliberate and successful implementation of cybersecurity measures is critical because of this principle.

 

Data Inaccuracies:

Stuxnet and other cyberattacks show the dangers of data inaccurate. A computer software can be tricked into making changes to data that are technically correct but inaccurate as a result of an assault. While computer science considers accuracy to be an intrinsic property of data, law understands that accuracy is a socially produced attribute.

    Stay connected.

    Welcome to a platform where cybersecurity becomes more than a skill; it's a passion. Let's embark on this transformative journey together. Welcome aboard, Cyber Defender!

    Copyright © 2026 Wilondja Jacob