MMT2_Task3 kgood11.docx - IT STRATEGIC SOLUTIONS MMT2 TASK...

This preview shows page 1 - 5 out of 16 pages.

IT STRATEGIC SOLUTIONS MMT2 TASK 3 1 IT STRATEGIC SOLUTIONS MMT2 TASK 3 Kathryn Goodwin, 000635338 WGU 04/15/2020
IT STRATEGIC SOLUTIONS MMT2 TASK 3 2 Table of Contents A. A-Energy’s Security Policies Concerning Ethical Issues ........................................................................ 3 A1. Two Possible unethical using of company technologies and/or data by internal end-users ............... 4 A2. Two Potential unethical uses of company technology and/or data by external users ......................... 5 B. Effectiveness of A-Energy Company’s security policies regarding security threats ............................... 6 B1. Potential security threats from internal users ..................................................................................... 8 B2. Potential security threats from external parties ................................................................................. 9 C. Update to Company Policies ................................................................................................................. 10 C1. Mitigating Unethical Uses ............................................................................................................... 13 C2. How changes would mitigate the security threats discussed in B1 and B2 ...................................... 14 D. References ........................................................................................................................................... 16
IT STRATEGIC SOLUTIONS MMT2 TASK 3 3 A. A-Energy’s Security Policies Concerning Ethical Issues Security policies are an individual or collection of guidelines that specifically describe the security protocols, procedures, and strategies an entity has implemented to control access to its properties and infrastructure. Security policies also help to regulate the actions and operations of internal and external users to whom the infrastructure, data or other confidential information of the company might be given access. To be successful in security policies they need to be detailed, easy to comprehend, understood by and readily accessible to those required to comply with them. They will need to be periodically reviewed and modified as the demands of the enterprise shift and as current and growing security risks react to. One significant aspect to address when creating or assessing security policies is that some of them represent, in portion or as a whole, a breach of commonly established ethical norms. It is essential to reconcile the protection requirements of the enterprise with the human freedoms of its internal and external stakeholders and personnel. A comprehensive analysis of the ethical security policy of AEnergy indicates that the company employs safety mechanisms to protect the network's employee and consumer records. Many methods are used to ensure that approved individuals have access to confidential data by utilizing access controlled systems, network tracking or secure passwords and pattern analysis. The business controls the usage of the funds so as to protect consumers and cost centers. In fact, the organization classifies the data according to the relevance and reliability to ensure that staff, vendors, stakeholders and consumers handle similar data products together...
IT STRATEGIC SOLUTIONS MMT2 TASK 3 4 A1. Two Possible unethical using of company technologies and/or data by internal end-users 1. Usage of private data among internal end-users A-Energy is responsible for any company-owned data and private data. The taking of this material and its use for unauthorized activities is deemed unethical by the internal user. The unauthorized usage of personal information is a clear breach of data security policies. Since A-

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture