SlideShare a Scribd company logo
1 of 3
1: A company should evaluate there flow of information and
departments and based in that decide who should have access to
what information. Not every employee needs the access to
company's important documents. The less people that have
access the better. Also, another way that I have seen to prove
work is when you have more than one persons authorization
needed to access something. When a worked at a company in
order for me to access some stuff I would need my supervisor to
override for me and if he wasn't available the system required
that 2 employees used there logins including mine to be able to
access whatever I needed and they could not leave my sight
until I was done. Ethical Issues that can come in play while
doing school work and installing new system would be to not
plagiarize. You don't want to spend all this money to go to
school and learn nothing by cheating or using a security system
that is easily accessible. If its a system that you can easily get
in, a hacker would have no problem.
2:
Discuss about most relevant and significant tools that can
potentially be used to protect business records of a company?
Documents, laptops, cell phones, and storage devices such as
usb and flash drives should be secured by being locked up in an
office, safe, or cabinet. There should be a limited of employees
with access to the key and information. Paper files with
business or consumer information must be shredded and
discarded. It is better to shred the paperwork in house. A
company I had previously worked for used to hire a company to
shred their paperwork for them. Everyone would pile the
sensitive information into a large locked bin, then the
'shredders' would pick up the bins and dump the paperwork into
their trucks for shredding. On one occasion, the person picking
up the bins accidentally dropped it and the papers spilled out
and blew across the parking lot! Of course, strong passwords
are necessary to secure sensitive data as well as encrypting
information, establishing firewalls, anti virus programs, and
hiring IT personnel.
3: I can say it is very important that all business owners have a
method to protect all their records to keep all their paperwork in
a safe place. Especially nowadays, i cant speak on how
everyone else should run their business, but i can say as far as
me trying to become a business owner i will have separate
copies of everything that goes on in my business and have it
secured in a safe place, or my own personal computer, and etc.
In todays world sometimes you cant even trust your own staff so
when it comes down to certain customers files i will have them
secured so that i am the only one who can view it especially
since i plan on opening up a nursing home for the elderly. Their
information needs to be kept in a safe place so that not everyone
can view their charts.
4:
4:Do you think perceptions of American Muslims and Muslims
in general have changed since 9/11? If so, are these changes
justified? Why? If not, why do you believe they have not
changed?
5:Before World War I and II, anti-Semitism was more prevalent
than it is today. Does anti-Semitism still exist? In what forms?
6: I can agree that some of the generation I'm from and on tend
to forget other people's feelings. I was bullied severely as a
child, for example. However, I've noticed through all that that
the main reason it continued was because the adults took on a "I
didn't see it, it didn't happen." attitude. All they would of had to
do was look at the security cameras, but they failed to even do
that. (We were a super small town, by the way. Technically
classed as a village. -To clarify: this was when I lived in
Randolph, MN.-) It's sad to think that things like bullying and
prejudice is perpetuated by the older generations, but it also
makes some sense. Here's why: Things like The Red Scare. We,
as a country, were so scared that we were going to be attacked
by others in our own country that we turned on our own
neighbors. We had so much fear that even our closest friends
became enemies over night simply because of their possible
views or country of origin. The worst part is: It's happening
again. It's a different group (Muslims instead of Communists),
but it's the same fear.

More Related Content

Similar to 1 A company should evaluate there flow of information and departmen.docx

Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveDefcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveHeng Guan
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whTanaMaeskm
 
Error correction exercise identity theft cae
Error correction exercise identity theft caeError correction exercise identity theft cae
Error correction exercise identity theft caejeanphilippeguy
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Mitch Spaulding
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
False sense of security
False sense of securityFalse sense of security
False sense of securityBLeo0001
 
Decisions Based on Ethics and MoralsCurrent legal and health c
Decisions Based on Ethics and MoralsCurrent legal and health cDecisions Based on Ethics and MoralsCurrent legal and health c
Decisions Based on Ethics and MoralsCurrent legal and health cLinaCovington707
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxcelenarouzie
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital AgeTony Fish
 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OMichael Roytman
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 

Similar to 1 A company should evaluate there flow of information and departmen.docx (17)

Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To AchieveDefcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
Defcon23 Talk Classify Targets To Make Social Engineering Easier To Achieve
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
Prof transcript
Prof transcriptProf transcript
Prof transcript
 
Error correction exercise identity theft cae
Error correction exercise identity theft caeError correction exercise identity theft cae
Error correction exercise identity theft cae
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
Cat and Mouse: A Student's Guide to Evading Parents, Teachers, and Authoritat...
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
False sense of security
False sense of securityFalse sense of security
False sense of security
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Decisions Based on Ethics and MoralsCurrent legal and health c
Decisions Based on Ethics and MoralsCurrent legal and health cDecisions Based on Ethics and MoralsCurrent legal and health c
Decisions Based on Ethics and MoralsCurrent legal and health c
 
Week 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docxWeek 1 Discussion 1Corrections An Overview  Please respond .docx
Week 1 Discussion 1Corrections An Overview  Please respond .docx
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age
 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/O
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 

More from marilynnhoare

1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docxmarilynnhoare
 
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docxmarilynnhoare
 
1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docxmarilynnhoare
 
1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docxmarilynnhoare
 
1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docxmarilynnhoare
 
.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docxmarilynnhoare
 
.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docxmarilynnhoare
 
.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docxmarilynnhoare
 
.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docxmarilynnhoare
 
.three pages minimum topic Life Long Learning of Engineering i.docx
.three pages minimum topic  Life Long Learning of Engineering i.docx.three pages minimum topic  Life Long Learning of Engineering i.docx
.three pages minimum topic Life Long Learning of Engineering i.docxmarilynnhoare
 
.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docxmarilynnhoare
 
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docxmarilynnhoare
 
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docxmarilynnhoare
 
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docxmarilynnhoare
 
.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docxmarilynnhoare
 
. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docxmarilynnhoare
 
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docxmarilynnhoare
 
. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docxmarilynnhoare
 
-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docxmarilynnhoare
 
. Please describe the process you plan to use to conduct research, i.docx
. Please describe the process you plan to use to conduct research, i.docx. Please describe the process you plan to use to conduct research, i.docx
. Please describe the process you plan to use to conduct research, i.docxmarilynnhoare
 

More from marilynnhoare (20)

1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx1 of 20Male erection is an example of ______. No thought or emotio.docx
1 of 20Male erection is an example of ______. No thought or emotio.docx
 
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
1 Describe the six elements of Max Weber’s model of bureaucracy. Ex.docx
 
1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx1 Final Project I Guidelines and Rubric Overview.docx
1 Final Project I Guidelines and Rubric Overview.docx
 
1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx1 2 3 Brief Cont.docx
1 2 3 Brief Cont.docx
 
1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx1 and half page please How has deviance been redefined in modern.docx
1 and half page please How has deviance been redefined in modern.docx
 
.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx.        What factors lay behind the upscaling of Hollywood film g.docx
.        What factors lay behind the upscaling of Hollywood film g.docx
 
.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx.  The Daytona International Airport has decided Embry-Riddle is no .docx
.  The Daytona International Airport has decided Embry-Riddle is no .docx
 
.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx.You will identify a problem with PESTICIDES and you will show t.docx
.You will identify a problem with PESTICIDES and you will show t.docx
 
.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx.Write a 7-9 page paper with a References List. Your written assig.docx
.Write a 7-9 page paper with a References List. Your written assig.docx
 
.three pages minimum topic Life Long Learning of Engineering i.docx
.three pages minimum topic  Life Long Learning of Engineering i.docx.three pages minimum topic  Life Long Learning of Engineering i.docx
.three pages minimum topic Life Long Learning of Engineering i.docx
 
.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx.Question 1Figures and beliefs of Greek mythology (including de.docx
.Question 1Figures and beliefs of Greek mythology (including de.docx
 
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx.NEED THIS ON 5162015Have to type a paper about victimology3.docx
.NEED THIS ON 5162015Have to type a paper about victimology3.docx
 
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
.Family, Sex, and Gender1.Acquaintance rape is a major p.docx
 
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx.Assignment 1 Careers in AccountingAccounting is the study of h.docx
.Assignment 1 Careers in AccountingAccounting is the study of h.docx
 
.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx.Arrogance and ignorance may be called the twin causes of the Am.docx
.Arrogance and ignorance may be called the twin causes of the Am.docx
 
. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx. Why are energy transformation important for an ecosystems stabili.docx
. Why are energy transformation important for an ecosystems stabili.docx
 
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
... Social Media PaperWrite 700- to 1,050-word paper and addre.docx
 
. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx. Briefly discuss why 1 theory is more convincing than the others..docx
. Briefly discuss why 1 theory is more convincing than the others..docx
 
-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx-          1 Describe Taoism. What are its origins and main b.docx
-          1 Describe Taoism. What are its origins and main b.docx
 
. Please describe the process you plan to use to conduct research, i.docx
. Please describe the process you plan to use to conduct research, i.docx. Please describe the process you plan to use to conduct research, i.docx
. Please describe the process you plan to use to conduct research, i.docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

1 A company should evaluate there flow of information and departmen.docx

  • 1. 1: A company should evaluate there flow of information and departments and based in that decide who should have access to what information. Not every employee needs the access to company's important documents. The less people that have access the better. Also, another way that I have seen to prove work is when you have more than one persons authorization needed to access something. When a worked at a company in order for me to access some stuff I would need my supervisor to override for me and if he wasn't available the system required that 2 employees used there logins including mine to be able to access whatever I needed and they could not leave my sight until I was done. Ethical Issues that can come in play while doing school work and installing new system would be to not plagiarize. You don't want to spend all this money to go to school and learn nothing by cheating or using a security system that is easily accessible. If its a system that you can easily get in, a hacker would have no problem. 2: Discuss about most relevant and significant tools that can potentially be used to protect business records of a company? Documents, laptops, cell phones, and storage devices such as usb and flash drives should be secured by being locked up in an office, safe, or cabinet. There should be a limited of employees with access to the key and information. Paper files with business or consumer information must be shredded and discarded. It is better to shred the paperwork in house. A company I had previously worked for used to hire a company to shred their paperwork for them. Everyone would pile the sensitive information into a large locked bin, then the 'shredders' would pick up the bins and dump the paperwork into their trucks for shredding. On one occasion, the person picking up the bins accidentally dropped it and the papers spilled out
  • 2. and blew across the parking lot! Of course, strong passwords are necessary to secure sensitive data as well as encrypting information, establishing firewalls, anti virus programs, and hiring IT personnel. 3: I can say it is very important that all business owners have a method to protect all their records to keep all their paperwork in a safe place. Especially nowadays, i cant speak on how everyone else should run their business, but i can say as far as me trying to become a business owner i will have separate copies of everything that goes on in my business and have it secured in a safe place, or my own personal computer, and etc. In todays world sometimes you cant even trust your own staff so when it comes down to certain customers files i will have them secured so that i am the only one who can view it especially since i plan on opening up a nursing home for the elderly. Their information needs to be kept in a safe place so that not everyone can view their charts. 4: 4:Do you think perceptions of American Muslims and Muslims in general have changed since 9/11? If so, are these changes justified? Why? If not, why do you believe they have not changed? 5:Before World War I and II, anti-Semitism was more prevalent than it is today. Does anti-Semitism still exist? In what forms? 6: I can agree that some of the generation I'm from and on tend to forget other people's feelings. I was bullied severely as a child, for example. However, I've noticed through all that that the main reason it continued was because the adults took on a "I didn't see it, it didn't happen." attitude. All they would of had to do was look at the security cameras, but they failed to even do that. (We were a super small town, by the way. Technically
  • 3. classed as a village. -To clarify: this was when I lived in Randolph, MN.-) It's sad to think that things like bullying and prejudice is perpetuated by the older generations, but it also makes some sense. Here's why: Things like The Red Scare. We, as a country, were so scared that we were going to be attacked by others in our own country that we turned on our own neighbors. We had so much fear that even our closest friends became enemies over night simply because of their possible views or country of origin. The worst part is: It's happening again. It's a different group (Muslims instead of Communists), but it's the same fear.