Organization confidential information

Assignment Help Basic Computer Science
Reference no: EM131252265

Employees can compromise an organization's confidential information, deliberately or inadvertently, through their network and Internet usage. Such concerns prompt companies to introduce security monitoring of their employees. However, they have to consider its legal and ethical aspects before deciding to track and monitor employee activities.

In addition to concerns about employees in general, IT administrators have greater access than other employees to various systems, including security log servers, Active Directory management tools, e-mail servers, and storage systems. While they need that privilege to do their jobs effectively, they can also misuse it. For this Discussion, in addition to your assigned reading, conduct some research through the Walden Library and the Internet on monitoring IT usage of employees.

Briefly describe the main ethical and legal issues that organizations face in relation to security monitoring of network and Internet usage of employees. Provide your opinion about whether or not an organization should have different security monitoring policies for employees of different types and roles. Justify your opinion. In addition, explain how auditing and logging management procedures can help monitoring network and Internet usage of employees. Describe the concerns the auditing and logging management procedures would need to address in order to monitor all employees, including those with administrative access.

Reference no: EM131252265

Questions Cloud

Impact of environmental changes on organization financial : Suppose that an organization did not use processes that were designed and built to be agile, particularly when it comes to IS / IT technologies. Predict the impact of environmental changes on an organization financially, socially, and in terms of ..
Terms of the dns performance : 1. What is the difference between recursive queries and iterative queries of DNS servers, in terms of the DNS performance (discuss this in terms of the number of messages needed and the corresponding delay)?
Programming exercise-reverse the command line : Write a C program that will print out each command line argument on a separate line. However,you should print them out in reverse order. That is, the last command line argument is printedfirst. Do not have an off-by-one error. Make sure that your ..
How many positive divisors does n have : In how many ways can the elements of [n] be permuted so that the sum of every two consecutive elements in the permutation is odd?
Organization confidential information : Employees can compromise an organization's confidential information, deliberately or inadvertently, through their network and Internet usage. Such concerns prompt companies to introduce security monitoring of their employees. However, they have to..
Compute the nash equilibrium of the game : ind firm i's best-response function as a function of Q-i . Graph this function -  Compute the Nash equilibrium of this game. Report the equilibrium quantities, price, and total output.
Determine the value of pn : • Determine P1, P2, and P3.• Determine the value of Pn, i.e., express Pn in terms of numbers that we have seen inclass. Justify your answer.Hint: Derive a recurrence relation. What are the possible values for the last element an in an awesome perm..
Find the nash equilibrium of the market game : Find the Nash equilibrium of this market game. - Is the notion of a best response well defined for every belief that a firm could hold? Explain.
Program you must expose the data member : To expose a data member to a program you must expose the data member to which section of the class?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Relations from a database in a large retail chain

Question: Consider the following normalized relations from a database in a large retail chain:

  Active source routing protocol for mobile networks

We can define an ad-hoc mobile network as a collection of many mobile nodes that are randomly and dynamically located in a different .One of the features is the inter connections in between these nodes are capable of changing during a particular t..

  Create an html5 document that contains an unordered list

Create an HTML5 document that contains an unordered list with links to the following examples headings, email, images as hyperlink these are from textbook, special characters, tables, HTML5 forms, and internal links to be included.

  Program that will accept a real number

Create a program that will accept a real number from the user and then display its whole and fractional parts. (For example, if the input is 5.32, the outputs should be the integer value

  Write a program that tracks an investment

Write a program that tracks an investment for 1 person based on the input of an interest rate.The initial balance should be $2,000. The interest should be added to the balance and output in table format as shown in the supplied sample.

  Why many consumers view the dmca as overly protective

Briefly describe the provisions of the Digital Millennium Copyright Act. Explain why many consumers view the DMCA as overly protective.

  Circular path and capable of terminating

If I am currently located at any node (let's call it A) and I want to find another specific node (let's call it B), what kind of algorithm would be most efficient in finding node B without getting stuck in a circular path and capable of terminatin..

  Component of the creating a scene view

Clipping algorithms are an important component of the creating a scene view. Explain why clipping is necessary. Choose an example of a boundary and a line and show how the endpoints of the clipped line can be calculated.

  Draw the hierarchy chart for this program

Design the output for this program; create either sample output or a print chart.

  Explain what n represents in your program

Make some assumption about how long it would take to execute one of the operations that you are counting. Determine how large n would have to be so that the time required would exceed a million years. Is there a more efficient algorithm that will ..

  Organization managing public information

An organization managing public information on its web server.A university maintaining student records which includes personal as well as grade information.Flight control systems; see the following article for potential threats:Using examples of r..

  Identify and briefly describe the two primary

Identify and briefly describe the two primary      approaches to developing signatures for network Based IDS tools. Is one      technique preferred over the other? Explain why.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd