This website uses cookies to ensure you have the best experience. Learn more

Virtual Work, Security, And Privacy Iaas 600 Research Paper

1009 words - 5 pages

Confidentiality
Our textbook informs us that another virtual work concern that is continually recurring is ensuring work product confidentiality from remote work locations such as the home. Our authors notify us that the aforementioned can also produce liability implications and make us aware of the fact that virtual workers will most likely posses organization's trade secrets and customer data that is commonly stored on mobile devices and or laptop computers which can be stolen or lost easily. The textbook supports the previous statement by referencing the two unsecured AvMed Health Plans Inc. laptops that were stolen in 2010 and for which contained approximately two hundred and eight thousand customer’s health information and social security numbers (Workman, Phelps, & Gathegi, 2013, p. 44).
Julie Tappero, the author of the article The Risks & Liabilities of Telecommuting identifies the following telecommuting security risks. She first asserts that when workers perform job functions outside of the organizational facilities, a major concern is technologic based security risks and that the highest priority of the organization should be its network security, data integrity, and privacy protections. She further dictates that organizations must, in all cases, have drafted, instituted, and enforce an acceptable use policy that is detailed and includes company data, computers, and online media, regardless of where the organizations employee's work from. However, if the organization has virtual works, this acceptable use policy becomes even more imperative.
• The acceptable use policy must be updated when new technology is implemented or procedures regarding the used of the technology changes and or annually. Employee's must be required to sign the policy
• Equipment issued by the organization should be provided to telecommuters to perform work with as opposed to allowing them to use their personal equipment.
• Ensure that an IT professional verifies that equipment is secured using anti-virus, firewalls, lockouts for failed long-ons, and other applicable security settings as well as verifying that the networks of remote employees are correctly secured.
• Insure that websites that are blocked on the computers in the organization's facilities are also blocked on the machines that telecommuters use as well
• Administrator privileges should not be granted to telecommuters on the work computers as doing such would allow the installation of malware or non work related software. All installations, changes, and updates should be provided remotely by the IT staff only
Tappero further recommends that if laptops are provided to employees by the organization, policy needs to clearly define that the use of organizational equipment within unsecured environments is strictly forbidden. Examples of such unsecured environments would include, however, is not limited to locations such as coffee shops and other such public locations hosting unsecured wireless...

Find Another Essay On Virtual Work, Security, and Privacy IAAS 600 Research Paper

E-commerce: Security and Privacy Essay

2129 words - 9 pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through

Privacy and Security Issues in Data Mining

2342 words - 10 pages to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits

Wireless Security and Privacy Protocols Part 1

2617 words - 11 pages descriptions of the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today, whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G

Security and Privacy in Social Media

1797 words - 8 pages Security and Privacy in Social Media Technology has advanced tremendously over the past decade, and appears to be advancing at a rapid pace each and every day. The social media is growing just as rapidly. Social media is an interaction between individuals that want to exchange information, photographs, and ideas in different types of networks. Social media users include people of all ages. These people have various experiences, have different

Privacy and Security Issues on Facebook

2038 words - 8 pages Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named

Security And Privacy On The Internet

1470 words - 6 pages " technology. The idea of the technology is providing "open" to the sender of information to encrypt it for the recipient who has a secure key to decrypt it, so no one who has a secure key will be able to decrypt such information. In this paper I have tried to present most convenient and accessible ways for protecting personal security and privacy while using Internet. As I have mentioned before, there are plenty of measures which could be most

Threats to Internet Privacy and Security

950 words - 4 pages The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Privacy and Security in Social Networking Sites

1918 words - 8 pages In today’s society, privacy, security, and convenience has turned into a paradoxical issue dealing with the information age (Barnes, 2006…). In fact, one of the primary driving instruments are the usage - and rise – of social networking sites such as: Facebook, Myspace, and Twitter. Having said that - and considering these networks gather considerable amounts of information about its users, the idea of securing your information is momentous

Finding the Balance Between Privacy and Security

1535 words - 6 pages struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point. While FISA, in reality, did not do much, it did set a precedent for later acts. Its wording was built on over decades, slowly evolving it into something eective. As time went on, technology expanded even more. With the creation of the Internet, and other technological

Wireless Security and Privacy Protocols Part 2

1540 words - 7 pages and effortlessly. The next topic should not have to be discussed in detail has it has been previously mentioned above and that is enabling encryption but since it is reported that some 60-70% of wireless networks established have no security enabled (CWSP: Certified Wireless Security Chapter 6) it goes without saying that enabling security will limit your footprint to an attacker. As previously discussed we went over the three encryption

Similar Essays

Virtual Work, Security, And Privacy Iaas 600 Research Paper

1215 words - 5 pages obtaining personal communications / files and if the employee's expectation of privacy is reasonable as well as if the employee owns the hardware systems and whether or not it is used for work functions (Bussing, 2011). References Burbidge, B. (2013, March 20). Safety risks when employees work for a virtual company. Retrieved February 8, 2014, from GenesisHR Solutions website: http://genesishrsolutions.com/safety-risks-when-employees-work-for-a

Iaas 600 Information Security Planning Final Exam

1886 words - 8 pages can be used in network security, beyond those described in this chapter. “A layered defense system takes into account security, both in terms of breadth and depth. More specifically, the core systems are designed to protect the most fundamental and yet basic computing, whereas outer layers strive to filter the most prolific and common attacks” (Workman, Phelps, & Gathegi, 2013, p. 315). Other layers that be used in network security include

Internet Privacy A Detailed Research Paper About Internet Security And Its Loop Holes...A Computer Sceinece Engineering Course Essay With Work Cited Pages

674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

Internet Privacy And Security Essay

1113 words - 5 pages personal information with the world via social network sites, blogs, and in online communities.” Unfortunately, people should expect that social media is not private and should not share anything they consider private on these shared networks, as they are exactly that, shared. When I started this research paper, I argued that there was a difference between Privacy and Security when it comes to the internet. I now realize that they are different, but