There are several ethical issues that arise in information security. The security is one of most issue of concern for every business organization. Ethics is a term which is used to distinguish between right or wrong things. Ethical issues in computer security includes cybercrimes, computer hacking and information warfare. In an Internet world, many banking organizations are attacked by attackers and millions of credit card details stolen every day. Cybercrimes such as credit card fraud cases, accessing someone’s account, stealing user credentials from social networking sites and sharing copyright information illegally. There are several Information Technology laws such as intellectual property laws, privacy laws and computer ...view middle of the document...
These security professionals assure safety and reliability. In order to resolve these ethical issues a proper security plan has to be made and implemented in which every member of organization has to aware about all security issues and ethical issues. Security professionals should analyze network traffic every second and intrusion detection system should be implemented. It has been stated by Information Systems Security Association (ISSA) that all security codes has to be practiced by each member of an organization. Privacy Protection act protects various organizations from secret information to be shared over Internet by any unknown person or an organization without owner’s permission. Such as an example these privacy laws are enforced against child pornography images that are shared over internet. Information and cyber security policies have to be practiced.
. P, B. (2007). Ethical Aspects of Information Security and Privacy. Retrieved from http://www.utwente.nl/gw/wijsb/organization/brey/Publicaties_Brey/Brey_2007_Information_Security.pdf.
. ugasser (2007). obtaining a better understanding of the information society and law’s role in it.. Retrieved from http://blogs.law.harvard.edu/ugasser/category/e-compliance/.
. Grama, J. L., & CISSP, J. D. (2009). Legal, Regulations, Compliance, and Investigations. Retrieved from https://www.purdue.edu/securepurdue/docs/training/LegalRegulationsComplianceInvestigations.pdf.
. National Cyber Security Policy -2013. (2013). Retrieved from http://deity.gov.in/sites/upload_files/dit/files/National_cyber_security_policy-2013(1).pdf.