Cyber Security

Read Complete Research Material



Cyber Security

Cyber Security

QUESTION 1

Part A

BYOD is a privilege, not a right. The use of technology to access material is not a need or a right but a privilege. Workplace having BYOD policy requires intense level of security so that the entire system and the associated confidentiality remain private and secured at all levels. Different organizations are dealing in different projects and jobs that require privacy even among the employees of the same organization. All the matters are not open to everyone and should not be openly available at all. Therefore, a number of security measures are required to be followed for minimizing or eliminating the existence of cyber threats at workplace.

Fundamentally, the employees should avoid the sharing of their passwords among their co-workers, irrespective of the nature of sharing. Otherwise, the organization may declare an individual responsible for particular activities of data theft. Moreover, people should ensure it that they log their accounts out just after they have finished their work for avoiding the cyber threats.

Under the BYOD, all the necessary information needs to be encrypted, together with staying cautious pertaining to the sensitivity of data. All employees are required to remain sensitive towards the image of their organization and its competitiveness in the market. Once the information gets attacked, the organization is in severe danger pertaining to its position in the market. Besides, certain policies are also must for ensuring the preparedness against cyber threats (Tehan, 2013).

Part B

BYOD requires intimate implication of policies for avoiding the possible threats. Considering the issues faced by the policy makers, it becomes necessary to analyze the overall impacts. Policy makers do not only face the issues of attribution, but there are a number of ethical dilemmas on the way of policies and their implication. Policy makers are obliged to consider these ethical aspects that restrict them to deploy the necessary steps of betterment. This cyber war carries consideration of ethics associated with this non-ideal world. Nothing goes in accordance with the desired aspects, but moral justification is necessary for implementing the policies (Von Solms et.al, 2005).

An ethical consideration is necessary to discriminate the management of advanced information system under BYOD associated with the cyber security and the people involved in it. It restricts the policy makers in terms of an inappropriate nature of distinction among the military, terrorist or criminal acts. These aspects should be clearly defined so that better level of policy can be incorporated in the system. The entire scenario creates war conditions as it is a matter of security that cannot be underestimated based on the aspects of ethical dilemmas. Therefore, the government and other responsible agencies should eliminate these dilemmas for eradicating the war condition.

Part C

Companies of all sizes are witnessing a transformation in the types of devices that begin to be used in the work environment, driven by their own employees. It is expected that consumers driving change in the company introduce more changes in the next ten years than any other ...
Related Ads