Tuesday, 6 May 2014

WGU MMT2 IT Strategic SolutionTask 3



WGU MMT2 IT Strategic SolutionTask 3 - Highly Rated Work



IF You Want To Purchase A+ Work Then Click The Link Below  , Instant Download

If You Face Any Problem E- Mail Us At  JohnMate1122@gmail.com








Task 3

Introduction:


Read the attached “AEnergy Company Case Study” before completing this task.


Scenario:

AEnergy Company has some security policies established. However, there have been some incidents that have created doubt about the effectiveness of the protections offered by the current policies. For example, an employee’s laptop computer was recently stolen at the airport while the employee was traveling on company business.

Management has asked you to analyze the company systems and update the policies as necessary so the company is protected from potential threats from both external parties and internal users of the company technology.

Task:
 
A.  Evaluate the effectiveness of AEnergyCompany’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergyEmployer Security Policy,” and “AEnergyAccounting Security Policy”) in regard to ethical issues.
1. Discuss two potential unethical uses of the company technology and/or data by internal users.

Answer: Security policies are deployed and provisioned on the core network resources to provide an additional layer of security. AEnergyEmployer Security Policy is highly effective compared to its other policies. After review of this policy, it shows that the company is using enterprise level security precautions to protect highly sensitive data and access to designated system. In my opinion, even though the employer security policy is effective, it can be considered unethical to review employees’ personal email which is sent from the work email system. However, to maintain the enterprise level security system, this review system cannot be unethical from the employer perspective but it is unethical from the employees perspective as email is entitles as “personal” so that it is not reviewed by the security staff as per policy of the company. Another potential unethical uses of the company technology/data by internal users is as client or corporate information (e.g., payroll, HR, etc.) that may be considered potentially damaging if revealed which is only accessed by the specific groups such as company management and security staffs.  Confidential data includes Social Security numbers, contact information, tax forms, accounting data, security procedures, and other personal data. If any person of the company management or security staff uses this information to harm its customer and corporate client then it is unethical uses of company technology/data by the internal user. As per company private policy, employees can only share information of its clients and customers within the internal department not outside the company.


No comments:

Post a Comment