Relevance of Ethics in the Age of Technology

Unprecedented in its speed and scope, scientific and technological progress is one of the most obvious realities of the modern time. Technology enormously increases the productivity of social labor, expanding the scale of production. It has achieved incomparable results in mastering the forces of nature. Moreover, technology has become the basis of the complex mechanism of the modern development. A country that fails to provide a sufficiently high rate of scientific and technological progress and incorporate its results in various areas of public life is condemned to be a underdeveloped and dependent state with a subordinate position in the world. In the recent past, it was common to praise the scientific and technological progress wildly as the sole source of the overall progress of the humankind. It is the view of the scientism, especially the natural sciences, as a superior and absolute social value. However, the rapid development of science Continue reading

Uses and Risks of Personal Data in Big Corporations

Big Data has taken a huge role in art in creating today’s Technological Revolution. It is a phrase coined to describe the exponential volume of data we currently hold. Data is collected from a number of sources including cell phones, applications, databases, servers, etc. In return, it can then be used to find trends, patterns, and connections specifically related to how humans behave along with their interactions. This information includes likes, dislikes, preferences, and search and buyer history and is not limited to personal data such as birthdate, social security number, home address, and much more. Corporations across the globe have found new ways to use this data in everyday business functions. The collection of Big Data can be used to a company’s advantage in marketing, finance, and Government. Despite the fact that in a few situations Big Data can be hard to control, it can possibly enable organizations to Continue reading

An Introduction to Computer Forensics

Forensic auditing deals with an extensive range of analytical work that is performed by expert accountants. This line of work typically involves an examination of the financial affairs of a company and is frequently connected with scrutinizing fraudulent activity. Forensic auditing consists of the entire investigation process, including having the investigator serve as an expert witness in a trial. Forensic accountants are even qualified to look into situations that are not fraud-related. These might include the settling of fiscal issues of a business or disputes between insurance claims. The forensic investigation encompasses the necessary steps taken to collect evidence in a suspected fraud case. The forensic audit is comparable to a financial audit, where a planning stage, an evidence gathering phase, a review procedure, and a client report, are implemented. The auditor uses a variety of audit techniques to recognize and assemble evidence. The auditor may want to find proof Continue reading

Email Security Best Practices to Keep Your Business Safe

The most pervasive means of communication today for businesses and private citizens, Electronic mail or Email, was not designed with security in mind. Today, Email application is built into almost all smart devices from phones to computers to gaming and sensor devices. however, the Email message that this device send and receive is transmitted in plain text format in almost all cases. with ever-increasing cybercrime, sending plain text message that can potentially contain sensitive data is a risky undertaking. This weakness in security in Email systems, has made Email the primary attack vector for criminals. Cybercriminals use Email as simplest and cheapest method to ship their malicious payload to targets. The three core principles when it comes to information security, Confidentiality, Integrity and Availability (CIA) holds true in Email security as well. However, there is one other principle to consider in Email security, Non-repudiation meaning that the sender of the Continue reading

Cybersecurity – Best Practices to Protect Business Organizations

In any organization, there are set duties, assignments and responsibilities to accomplish department goals, targeted objectives, and outcomes. Employees at every level within a business organization should take their responsibilities about Cybersecurity very seriously and be part of the organization Cybersecurity focus. Every department under the business structure should know what their part within the organization cybersecurity program. Every one, though matter what department they belong to should work as a team to meet and exceed the organization cybersecurity goals. Having a great cybersecurity program is the responsibility of management and it should be a part of every facet in all sectors of the business. In every organization with an IT department, the IT department is the regulator of the business cybersecurity program. They create the policy, in accordance with the business goals, mission, and objectives. They build, implement and monitor the organization cybersecurity program against the business set goals. Continue reading

Classification of Security Threats in Information Systems

As use of internet and related telecommunications technologies and systems has become pervasive, use of these networks now creates a new vulnerability for organizations or companies. These networks can be infiltrated or subverted a number of ways. As a result, organizations or companies will faced threats that affect and vulnerable to information system security. Threats to information system can come from a variety of places inside and external to an organizations or companies. In order to secure system and information, each company or organization should analyze the types of threats that will be faced and how the threats affect information system security. Examples of threats such as unauthorized access (hacker and cracker), computer viruses, theft, sabotage, vandalism and accidents. Unauthorized Access (Hacker and Cracker): One of the most common security risks in relation to computerized information systems is the danger of unauthorized access to confidential data. The main concern comes Continue reading