SlideShare a Scribd company logo
1 of 3
Download to read offline
1- An information security manager routinely monitored Web Surfing among her company's
employees. She discovered that many employees were visiting the "sinful six" web sites (Note:
The "sinful six" are web sites with material related to pornography, gambling, hate, illegal
activities, tastelessness and violence.) She then prepared a list of the employees and their surfing
histories and gave the list to management. Some managers punished their employees. Some
employees, in turn, objected to the monitoring claiming that they should have a right to
privacy.With this in mind, please answer the following two questions:
a- Is monitoring of web surfing by managers ethical, (it is legal to do this)? -- Support your
answer.
b- Is employee web surfing on the "sinful six" ethical? Support your answers.
2-Discuss the idea that an information system by itself can rarely provide a sustainable
competitive advantage. Justify your position.
3- Discuss why the Sarbanes-Oxley Act is having an impact on information security. Support
your answer.
4- How are the network applications of communication and collaboration related? Do
communication tools also support collaboration? Give Examples. (NOTE: there are two
questions that need to be answered in your response. I will be looking to see if both questions are
answered accordingly)
5- Explain why master data management is so important in companies that have multiple data
sources.
Solution
Ans 1.
a)
Yes, monitoring of web surfing is ethical and an important duty of both network administrator
and Information Security managers too. Any unethical use of the system can be detected only by
scrutinizing the system. Though in the given scenario, some employees think it to be intrusion of
their privacy but using organizational resources for their own private uses, and that too surfing
pornographic sites, in office hours is completely unethical both professionally and morally. As
the company must have female employees too and surfing pornography in front of them has high
probability of causing embarrassment to them. Company has provided the computer and internet
connection for official works only but using them for own personal use is at all not acceptable.
Hence it is the employees’ duty to use office provided computer and internet connection for
office works only and not to stray into one of the “sinful six” websites.
b)
No, it is not ethical on part of the employee to surf sites like “sinful six”. Firstly, the organization
must definitely have female employees and surfing pornographic sites will definitely cause
embarrassment to them. Secondly, the computer and internet resources provided by the company
are for official purpose only. Wasting company resources and time on visiting sites related to
pornography, gambling is not ethical for employees. Thirdly, several companies have clearly
stated policies on refraining use of official IT resources on visiting sites especially related to
pornography or gambling. Hence visiting “sinful six” site is also breaching the company policy.
Fourthly, most of the pornographic or gambling sites contain viruses, and visiting those sites may
in all probability resulted into company IT resources being infected. Fifthly, hackers to steal
information from other computer resources mostly use the pornographic or gambling sites. So
visiting such sites also make your organization resources highly prone to hacking attacks and
may result into stealing of confidential information.
Ans.2
The importance of information systems (IS) as a strategic resource capable of gaining sustainable
competitive advantage is gradually weakening. In actuality, organizations are using IS as more of
a technological tool for faster processing rather than using it for strategical purposes. A company
can gain competitive advantage only if it does the things that its competitors can't do or have. In
fact, scarcity of a resource makes it as a source of sustainable competitive advantage and not its
easy availability. And now a days IS is so commonplace that each and every organization (both a
organization and its competitors) is using it for more and more technological purposes that its
potential as a source of sustainable competitive advantage has lessened.
Ans. 3
Sarbanes-Oxley Act (SOX) is an important legislation created by the U.S. Congress at the time
when the industry was witnessing high profile accounting scandals at firms such as Enron and
WorldCom. When drafted the core objective of the SOX is not on Information Security but to
restore investor confidence and to improve corporate governance and, most importantly, to
establish financial transparency. However, with due passage of time and with compliance efforts
have been introduced, organizations started realizing that without a certain level of assurance
regarding IT security controls, compliance is not possible.
Each organization that is affected by SOX has a certain level of dependence on IT to process and
store the data that is the basis of financial reports. The Act requires these organizations to
implement the IT security controls to maintain the confidentiality, integrity, and accuracy of the
data. Specific attention should be given to secure the corporate network, prevent unauthorized
access to systems and data, and ensure data integrity and availability in the event of a disaster or
other failures. In addition, any application that deals with critical financial reporting data should
have validation controls such as edit and limit checks built-in to minimize the chances of data
inaccuracy. A properly designed IT security control structure that is operating effectively is
important to SOX compliance.

More Related Content

Similar to 1- An information security manager routinely monitored Web Surfing a.pdf

Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 

Similar to 1- An information security manager routinely monitored Web Surfing a.pdf (12)

Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 

More from meejuhaszjasmynspe52

Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdfHomework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdfmeejuhaszjasmynspe52
 
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdfHand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdfmeejuhaszjasmynspe52
 
Find the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdfFind the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdfmeejuhaszjasmynspe52
 
Disorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdfDisorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdfmeejuhaszjasmynspe52
 
Differentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdfDifferentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdfmeejuhaszjasmynspe52
 
Could someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdfCould someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdfmeejuhaszjasmynspe52
 
Consider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdfConsider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdfmeejuhaszjasmynspe52
 
a) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdfa) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdfmeejuhaszjasmynspe52
 
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdfA.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdfmeejuhaszjasmynspe52
 
1. inside source IP address and port number 172.16.1.2020translat.pdf
1. inside source IP address and port number 172.16.1.2020translat.pdf1. inside source IP address and port number 172.16.1.2020translat.pdf
1. inside source IP address and port number 172.16.1.2020translat.pdfmeejuhaszjasmynspe52
 
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdfmeejuhaszjasmynspe52
 
6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdf6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdfmeejuhaszjasmynspe52
 
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdfmeejuhaszjasmynspe52
 
1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdfmeejuhaszjasmynspe52
 
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdfmeejuhaszjasmynspe52
 
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdfCan a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdfmeejuhaszjasmynspe52
 
Write a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdfWrite a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdfmeejuhaszjasmynspe52
 
Why are culture media sterilized before they are used Do you think .pdf
Why are culture media sterilized before they are used  Do you think .pdfWhy are culture media sterilized before they are used  Do you think .pdf
Why are culture media sterilized before they are used Do you think .pdfmeejuhaszjasmynspe52
 
What recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdfWhat recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdfmeejuhaszjasmynspe52
 
What are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdfWhat are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdfmeejuhaszjasmynspe52
 

More from meejuhaszjasmynspe52 (20)

Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdfHomework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
 
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdfHand geometry 1. Definition2. Importance3. Advantages and d.pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
 
Find the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdfFind the general solution of the given differential equation. Sol.pdf
Find the general solution of the given differential equation. Sol.pdf
 
Disorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdfDisorders characterized by abnormal replication of cells that leads .pdf
Disorders characterized by abnormal replication of cells that leads .pdf
 
Differentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdfDifferentiate between functions and formulas. Provide two examples o.pdf
Differentiate between functions and formulas. Provide two examples o.pdf
 
Could someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdfCould someone please solve this assignment using matlabSolution.pdf
Could someone please solve this assignment using matlabSolution.pdf
 
Consider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdfConsider the many protein functions. Identify the protein function by.pdf
Consider the many protein functions. Identify the protein function by.pdf
 
a) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdfa) Briefly describe three key differences between the genomes of pro.pdf
a) Briefly describe three key differences between the genomes of pro.pdf
 
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdfA.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
 
1. inside source IP address and port number 172.16.1.2020translat.pdf
1. inside source IP address and port number 172.16.1.2020translat.pdf1. inside source IP address and port number 172.16.1.2020translat.pdf
1. inside source IP address and port number 172.16.1.2020translat.pdf
 
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
 
6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdf6. Which of the following epithelia andor cell surface modifications.pdf
6. Which of the following epithelia andor cell surface modifications.pdf
 
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
 
1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf1.    Europeans view Americans as people similar in ideas and cultur.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf
 
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf(TRUE  FALSE) The use of swap rates rather than treasury rates as a.pdf
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
 
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdfCan a single magnetic pole (either a north pole or a south pole) be i.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
 
Write a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdfWrite a recursive function in java named fib that will accept one in.pdf
Write a recursive function in java named fib that will accept one in.pdf
 
Why are culture media sterilized before they are used Do you think .pdf
Why are culture media sterilized before they are used  Do you think .pdfWhy are culture media sterilized before they are used  Do you think .pdf
Why are culture media sterilized before they are used Do you think .pdf
 
What recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdfWhat recent and past actions have Canada and the US taken to counter.pdf
What recent and past actions have Canada and the US taken to counter.pdf
 
What are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdfWhat are the protocols in data transfer between CAD systems Which o.pdf
What are the protocols in data transfer between CAD systems Which o.pdf
 

Recently uploaded

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfKartik Tiwari
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfElizabeth Walsh
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxRugvedSathawane
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MysoreMuleSoftMeetup
 

Recently uploaded (20)

Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 

1- An information security manager routinely monitored Web Surfing a.pdf

  • 1. 1- An information security manager routinely monitored Web Surfing among her company's employees. She discovered that many employees were visiting the "sinful six" web sites (Note: The "sinful six" are web sites with material related to pornography, gambling, hate, illegal activities, tastelessness and violence.) She then prepared a list of the employees and their surfing histories and gave the list to management. Some managers punished their employees. Some employees, in turn, objected to the monitoring claiming that they should have a right to privacy.With this in mind, please answer the following two questions: a- Is monitoring of web surfing by managers ethical, (it is legal to do this)? -- Support your answer. b- Is employee web surfing on the "sinful six" ethical? Support your answers. 2-Discuss the idea that an information system by itself can rarely provide a sustainable competitive advantage. Justify your position. 3- Discuss why the Sarbanes-Oxley Act is having an impact on information security. Support your answer. 4- How are the network applications of communication and collaboration related? Do communication tools also support collaboration? Give Examples. (NOTE: there are two questions that need to be answered in your response. I will be looking to see if both questions are answered accordingly) 5- Explain why master data management is so important in companies that have multiple data sources. Solution Ans 1. a) Yes, monitoring of web surfing is ethical and an important duty of both network administrator and Information Security managers too. Any unethical use of the system can be detected only by scrutinizing the system. Though in the given scenario, some employees think it to be intrusion of their privacy but using organizational resources for their own private uses, and that too surfing pornographic sites, in office hours is completely unethical both professionally and morally. As the company must have female employees too and surfing pornography in front of them has high probability of causing embarrassment to them. Company has provided the computer and internet connection for official works only but using them for own personal use is at all not acceptable. Hence it is the employees’ duty to use office provided computer and internet connection for office works only and not to stray into one of the “sinful six” websites.
  • 2. b) No, it is not ethical on part of the employee to surf sites like “sinful six”. Firstly, the organization must definitely have female employees and surfing pornographic sites will definitely cause embarrassment to them. Secondly, the computer and internet resources provided by the company are for official purpose only. Wasting company resources and time on visiting sites related to pornography, gambling is not ethical for employees. Thirdly, several companies have clearly stated policies on refraining use of official IT resources on visiting sites especially related to pornography or gambling. Hence visiting “sinful six” site is also breaching the company policy. Fourthly, most of the pornographic or gambling sites contain viruses, and visiting those sites may in all probability resulted into company IT resources being infected. Fifthly, hackers to steal information from other computer resources mostly use the pornographic or gambling sites. So visiting such sites also make your organization resources highly prone to hacking attacks and may result into stealing of confidential information. Ans.2 The importance of information systems (IS) as a strategic resource capable of gaining sustainable competitive advantage is gradually weakening. In actuality, organizations are using IS as more of a technological tool for faster processing rather than using it for strategical purposes. A company can gain competitive advantage only if it does the things that its competitors can't do or have. In fact, scarcity of a resource makes it as a source of sustainable competitive advantage and not its easy availability. And now a days IS is so commonplace that each and every organization (both a organization and its competitors) is using it for more and more technological purposes that its potential as a source of sustainable competitive advantage has lessened. Ans. 3 Sarbanes-Oxley Act (SOX) is an important legislation created by the U.S. Congress at the time when the industry was witnessing high profile accounting scandals at firms such as Enron and WorldCom. When drafted the core objective of the SOX is not on Information Security but to restore investor confidence and to improve corporate governance and, most importantly, to establish financial transparency. However, with due passage of time and with compliance efforts have been introduced, organizations started realizing that without a certain level of assurance regarding IT security controls, compliance is not possible. Each organization that is affected by SOX has a certain level of dependence on IT to process and store the data that is the basis of financial reports. The Act requires these organizations to implement the IT security controls to maintain the confidentiality, integrity, and accuracy of the data. Specific attention should be given to secure the corporate network, prevent unauthorized access to systems and data, and ensure data integrity and availability in the event of a disaster or other failures. In addition, any application that deals with critical financial reporting data should
  • 3. have validation controls such as edit and limit checks built-in to minimize the chances of data inaccuracy. A properly designed IT security control structure that is operating effectively is important to SOX compliance.