Friday, June 14, 2019
Technologies and Citizens Privacy Research Paper
Technologies and Citizens Privacy - Research Paper ExampleWith doing away of paper based services people store their selective information in computers. Spy packet and network sniffing programs that are readily avail up to(p) in the Internet have aided people in violating other people privacy. People, thus, need to be able to protect their network securities and computers from any form of intrusion. This calls for risk management when it comes to peoples personal information (Lindsay & Thomson, 2005). The government and business agencies need to find saucily ways and means that can protect peoples identity and privacy when delivering or offering services. Form a citizens point of view, it is open(a) that online and other forms of digital transactions are vulnerable to breach of securities (Davenport, 2006). Citizens lack proper knowledge to understand what happens when their identity is stored in the online government systems and other businesses. through and through the use of sp y software, a person can be tracked wherever and whenever he or she uses credit cards. There is the need for citizens to be amend on how to protect their personal information (Davenport, 2006). Advantages and Disadvantages of the Public Being Able to Access Information All forms of technological developments do come with their own issues colored on both the negative and positive sides. The issue of technology has brought the Internet age which has been having great importance in human lives and by so doing world able to enhance human interaction and business operations (Bhunia, 2006). However, the issue of insecurity has as head been experienced and which is in need of tentative depth psychology towards curbing all the issues of insecurity which comes as a result. The issue of network security is something which has been given the necessary concern and establishment by nations as well as organizations. Due to this kind of development, the network security is able to change the f ocus of security groups or security blueprint over the past a couple of(prenominal) years. With the public is able to access information, there is a need to audit the systems that host the information. There are few things that an information security auditor needfully to be previewed before carrying out an audit of the information security data centers. The auditor needs to be well informed about the organization and how it conducts its crank business activities (Lindsay & Thomson, 2005). This will immensely help when it comes to performing a data or information center assessment. Every organization should have a data center and its main objective should be to align the data center actions with the goals of the organization. At the same time it should be able to preserve the safety and rectitude of the public data and information in the data centers. Prior to conducting the audit process, the following are some of the things that an information security auditor needs to do meet with the IT management and carry out a review of its department organizational structure, conduct a review of the job description of all the employees at the data center, know all the application and operating systems in use at the data centers, review the data centers emergency recovery plans, and evaluate the IT departments or organizations policies and procedures when it comes to handling their data centers (Davenport, 2006). Protecting Information The issue of netw
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.