Question 1
Accessing personal information has been rampant today due to the advancement in technology. Hackers have been able to access the different information and at times commit financial frauds. To prevent personal information of the customers, the organizations, must control their electronic devises (Blyth, Michael 95). The use of passwords can be very essential since it requires authorized access. The passwords should only be known to only one person or a few people in the organization who can assist in identifying what went wrong and who could have leaked information to the fraudsters.
In some organizations, the electronic machines are never stored in a safe room. Computer safety must be the key objective in any organization (Engebretson, Pat 134). When thieves happen to steal the computers, they can readily access all the information. Not all organizations have protection measures put in place to stop the world’s best hackers. Therefore, the need to inform and educate them on the need of high protecting measures.
Question 2
If a hacker is caught by law, he should be sent to jail and heavily fined to serve as a lesson to the rest and the potential hackers. It is a form of deterrent and it discouraging criminals from doing so (ordan, Tim. 320). However, when in jail he can be transformed to be one of the best information technology personnel. Everyone is human and man is to error. The changing of his perception of committing crimes can be changed to use his knowledge to impact positively on the people. Once the term is over, the transformed being get be promised employment from the leading IT organizations. It is because some of them result to crime as a way of earning a living to sustain themselves. They should be encouraged to impact positively to the organizations
Work cited
Blyth, Michael. Risk and Security Management: Protecting People and Sites Worldwide. Hoboken, N.J: John Wiley & Sons, 2008. Internet resource.
Engebretson, Pat. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Amsterdam: Syngress, an imprint of Elsevier, 2013. Internet resource.
Gal, Cecilia S, Paul B. Kantor, and Michael Lesk. Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, Isips 2008, New Brunswick, Nj, Usa, May 12, 2008, Revised Selected Papers. Berlin: Springer, 2009. Print.
ordan, Tim. Hacking: Digital Media and Technological Determinism. Cambridge, UK: Polity Press, 2008. Print.
.