Intrusion management tools and related ethical issues
Intrusion Management Tools and Related Ethical Issues
Information technology is an area, which faces numerous ethical challenges in our society today (Debatin, 2011). People in this information age rely on IT systems to store personal data, but it is not always a guarantee that the information is secure and private (The Center for Ethical, 2016). Cyber security issue is one of the ethical concern today as people’s data, company data, federal security data get hacked every day, questioning the issue on morals in the society today.
Information technology personnel have developed network-based (NIDS), for instance; “security Union” and host based (HIDS) which include “OSSEC” intrusion detection systems that can be able to monitor and detect any malicious activity within the system (Top Five Free Enterprise Network Intrusion-Detection Tools, 2016). These tools are effective, but the issue of ethics has long been a debate on how these tools guarantee the safety of individual’s data
1. What are the ethical concerns associated with intrusion management tools? - the question seeks to find out the ethical concerns that related to intrusion tools that are used in cyber security management including its reliability and applicability in the day to day activities in information management.
2. What are the ethical and societal impacts of intrusion of people’s information? – The question seeks to find out how individuals are affected once they learn that their information has been hacked or rather someone has continued access to the information of that individual. The significance of the question is that it seeks to find out the consequences of intrusion to an individual either physically, emotionally or spiritually.
3. How effective are the intrusion management tools in protecting people from cyber intrusion? The question seeks to find out and understand the efficiency of these tools including its durability, sustainability, policies that govern it, the user benefits and the cost of maintaining the software to the organization and an individual.
References
Debatin, B. (2011). Ethics, privacy, and self-restraint in social networking. InPrivacy online (pp. 47-60). Springer Berlin Heidelberg.
The Center For Ethical Practice | “Protecting Confidentiality Rights: The Need for an Ethical Practice Model”. (2016). Centerforethicalpractice.org. Retrieved, from http://www.centerforethicalpractice.org/publications/articles-mary- alice-fisher/protecting-confidentiality- rights/
Top five free enterprise network intrusion-detection tools. (2016). SearchSecurity. Retrieved 12 July 2016, from http://searchsecurity.techtarget.com/tip/Top-five-free-enterprise-network-intrusion-detection-tools