Monday, December 9, 2019

Network Management in Organization Chief Security Officer

Question: Discuss about theNetwork Management in Organizationfor Chief Security Officer. Answer: Considering ethical issues, what several IT specialists confront mainly includes confidentiality hiccups. Being the Chief Security Officer (CSO), I will consider paying heed to scrutinize private mails sent by the employees from organizations systems. I can do this as I have the entire responsibility for the organization's security and securing organizational network and server is one of the prime duties of mine. Ergo, professionally it is okay to check employees email as a security drill to make sure that the organizations data isn't being leaked or breached [6]. As the companys CSO, I have the authority of developing or editing company mail usage policies. Employees pan-organization will also be informed about such developments through me and my team (if available). The reason for taking such actions is to protect valued, confidential and business data from potential hacks through employee mails. This can tarnish organizations market status and also can affect its employees from top to bottom. Another widely considered issue is there which is not answered clearly. Whether the organizations CSO should examine the websites accessed by the employees? As I am fulfilling this role in my present organization, I agree with the fact that CSOs should check records in a routinely manner of accessed and more specifically most frequently accessed websites. Another relevant issue is, whether the company can afford such negligence of not scrutinizing these Websites. This work culture can exploit the work environment of the organization intimidating that eventually will affect its employees and client service [3]. Speaking from the ethical point of view, I being the organizations CSO have the right to inspect what employees carry out with their respective allocated PC systems. I also have the authority that allows me to access the maximum part of the employee, confidential and business data kept on the organizations server [1]. According to my point of view, using an application called Key loggers to find out every bit of data being written by the employees on PC systems. Generally, these are of two types: hardware and software. Key loggers based on hardware, are small gadgets that are attached in between the keyboard and the organizations PC USB port. On the other hand, Key loggers based on software can be used for sending the employees typed keywords to another system under my supervision located in a distant position. Alike Key loggers, I will also suggest to use auto screenshot tools to check what employees are looking at using organizational PC systems. This way I will have the capability of observing which sites are visited by employees as well as words they are typing or even the graphic items they are looking at. I can also check what is kept in their Recycle bin folder and whether they have accessed any game [5]. Like other policies, Company Internet usage policy should also be conveyed pan-organization and they also need to be informed about the consequences of violating these policies. If I am working as a CSO in a small or mid-scale organization that has a handful of PCs and I am supposed to find out which websites employees are visiting more often, I can do it without asking my company without buying any premium software. I can do the same by checking the history under Internet Explorers Internet options menu. Copies of these websites as well as images that employees' download gets stored here so that they can access these right away. Additionally, I know the ways to make this process more complex (for employees) mainly on PCs run on Windows XP OS through the User Restrictions Tool in Microsoft's free Shared PC Toolkit to deny employees access to the Internet Options under Tools menu. This is the place from where employees can delete the History as well as all the Temporary Internet Files [2]. As I have the sole responsibility of protecting and securing my companys possessions, I will never go ahead with any talks with such client. I, being the CSO cannot afford compromising my companys security in any way. For one client who thinks in such way, I will never let go other valuable clients of my organization. Furthermore, I will never put my organizations employees job at jeopardy just by taking any decision like this [4]. Reference List [1]S. Brinkmann, "In Encyclopedia of Critical Psychology", Springer New York, pp. 1008-1010, 2014. [2]G. Pozgar, Legal and ethical issues for health professionals, 1st ed. Jones Bartlett Publishers., 2014. [3]G. Corey, M. Corey, C. Corey and C. Callanan, Issues and ethics in the helping professions with 2014 ACA codes, 1st ed. Nelson Education, 2014. [4]A. Keenet, A. Smart, M. Richards, R. Harrison and M. Carillo, "Human rights and social work codes of ethics: an international analysis.", Social Welfare and Human Rights, vol. 2, no. 2, pp. 1-16, 2014. [5]R. Baker, Codes of conduct, 1st ed. Springer Netherlands, 2014, pp. 551-579. [6]M. Campillo, J. Saez and M. Sanchez, "Ethics and Education", Situational ethics and the professionalization of social education, vol. 9, no. 1, pp. 3-15, 2014.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.