Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Week 4 Discussion question1

Week 4 Discussion question1

Q Please refer to Chapter 4's Closing Case 1 (Five Ways Hackers Can Get into Your Business, pg. 173) and answer any ONE of the questions below in your initial thread before Wednesday. Then, before the end of Sunday, make the remaining THREE response posts (interact with at least TWO different classmates by either asking probing question(s), agreeing with their answers, or offering alternative points of view). Either way, your replies must be substantive and through-provoking to earn full credit for your participation. Questions: 1. Define information ethics and information security, and explain whether they are important to help prevent hackers from gaining access to an organization. 2. Identify two epolicies that a business could implement to ensure the protection of sensitive corporate data from hackers. 3. Demonstrate how a business can use authentication and authorization technologies to prevent hackers from gaining access to organizational systems. 4. Analyze how a business can use prevention and resistance technologies to safeguard its employees from hackers and viruses. 5. Explain why hackers want to gain access to organizational data. 6. Evaluate additional ways hackers can gain access to organizational data.

View Related Questions

Solution Preview

In this week’s discussion, we are told to read the case study on the topic that states Five ways hackers can get into your business. I chose question 1 which is to define information ethics and information security (Tatum, n.d.). We are also told to explain whether the information security will help in preventing hackers from gaining access to an organization (Tatum, n.d.). Information ethics can be defined as the term that can be used to describe the study