MMT2 Task 3.docx - Security Evaluation Ethical Issues:...

This preview shows page 1 - 3 out of 5 pages.

The preview shows page 1 - 3 out of 5 pages.
Security EvaluationEthical Issues: After reading the current security policies, it is clear to me that security is a very high priority, as it should be. The security policies all touch on the typical hot points and the ethical behavioral aspects therein. These are signed by each employee at their time of hire and each employee is required to adhere to these policies and regulations. These are comprised of, but not limited to; login and network user credentials and accessing and utilizing company website/resources appropriately. The data policy describes who the audience is (internal/External), classifies the data as public or private, and the type of ethical behavior that is expected of employees and management. The employer security policy dictates that all new employees must undergo certain security education. These trainings cover only general security issues that are common and serve as a warring. They highlight of the consequences of not following or abusing the policies. Potential Unethical Use - Internal1.There is always a potential for unethical use of network and system resources. AEnergy does well to cover these in their policies, but it is impossible to cover them all. The first unethical issue is the misuse of data. Data theft is a huge problem and there is not any specific security policy that eliminates this risk. It is said to be against policy, but there are not any steps taken to prevent it other than the employees promise (signature). 2.The second potential unethical issue would be to Intellectual property or trade secrets. Internal users have access to a much of the company’s intellectual property. An employee with proper knowledge of how to extract this information could deliver a devastating blow to AEnergy’s bottom line and use this information to help a competitor or simply to obtain employment with a competitor.
Potential Unethical Use - External1.Many clients/vendors have access to AEnergy’s network, and this is of concern. Both physical and digital security measures are taken, but they are not enough. AEnergy’s data is made

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 5 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
Maurice Green
Tags
security policy, Security engineering, AENERGY

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture