Performing the security review in company

Assignment Help Computer Engineering
Reference no: EM131674878

Write an review on this article references in APA format.

The Bible says, "There are six things that the Lord hates, seven that are an abomination to him: haughty eyes, a lying tongue, and hands that shed innocent blood, a heart that devises wicked plans, feet that make haste to run to evil, a false witness who breathes out lies, and one who sows discord among brothers," (Proverbs 6:16-19).

By the development manager asking you to omit the truth in your report; he/she is asking you to lie. From a business ethical standpoint, it is your "name" on the line, and a failure such as this could be considered negligence. According to Abawajv, "employee negligence or maliciousness is the main cause of many data breaches," (Abawahv, 2014).

So by not reporting the potential violations, you are leaving the website vulnerable. This means that if the security issues are not fixed an attack is likely to occur on the website. Since your company will have been noted as the one who performed the security checks prior to the website being released, your reputation will be tarnished which can be worse thatn the attack itself.

According to Byers, "Although there are obvious direct impacts which may be easily quantifiable financially other consequences may be less obvious.

For most companies the impact on reputation is probably far more significant than merely the cost of a production outage," (Byers, 2004). However, a poor reputation can affect your company in multiple ways; loss of business, rates having to be lowered, and potential employees leaving the company. As the company performing the security review I would publish my original findings. We must not compromise our values to cater to a company not performing at the level the need to be at.

The Bible says, "So whoever knows the right thing to do and fails to do it, for him it is sin," (James, 4:17). Bibliography Abawajy, J. (2014).

User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Byres, E., & Lowe, J. (2004, October).

The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Verified Expert

The present assignment was based upon the review article of importance of truth in business. In this article it is been stated that one should be truthful so that organization can grow well without lossing its reputation.

Reference no: EM131674878

Questions Cloud

Determine whether save-a-lot is liable : Stewart then punched Tammy in the face, knocking her to the floor. If Tammy sues Save-a-Lot, what legal issue must be addressed to determine whether Save-a-Lot
Various levels of the organization : What are important factors to consider when leading teams within the various levels of the organization?
How can wrong criteria accidentally or purposely skew result : All solutions are not created equal. How can the wrong criteria accidentally or purposely skew results? What can you do to ensure this does not happen?
What do you think are best ways to reward teamwork : What do you think are best ways to reward teamwork? What are your reactions to the various methods of team compensation?
Performing the security review in company : performing the security review - Although there are obvious direct impacts which may be easily quantifiable financially other consequences may be less obvious
Explain why hartman comes to the conclusion : What does she mean? How does the material we have examined in class help to explain why she comes to this conclusion?
Gain or refine during internship : What skills do you want to gain or refine during your internship?
Working with customer personal information : Consider the reason of If working with customer's personal information, and list why employers monitor employee communications.
Impact on the new employees : Create a list of at least four laws you feel are the most important to new employees. Provide a description of each law and their impact on the new employees.

Reviews

inf1674878

1/15/2018 5:11:12 AM

Whatever I can state is goodness, super decent and produced an extraordinary paper. First time I have ever utilized an administration like this and couldnt be more joyful, gracious and the most sensible costs as well.

len1674878

10/11/2017 3:06:37 AM

I have to write an review on this article references in APA format.The Bible says, "So whoever knows the right thing to do and fails to do it, for him it is sin," (James, 4:17). Bibliography Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Byres, E., & Lowe, J. (2004, October). The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Write a Review

Computer Engineering Questions & Answers

  What will u-factor be when wind velocity outside is doubled

The overall U-factor of a fixed wood-framed window with double glazing is given by the manufacturer to be U = 2.76 W/m2.K under the conditions of still air.

  Explain why 802.11b is the first popular standard

the first widely popular standard and still by far most used by IT industry today.

  Analysis of how digital media guided decision making

Digital media has changed the ways ideas, information, and arguments in society are communicated both locally and globally. Individuals and organizations frequently use digital media as a means to influence individuals and organizations.

  Define the current instruction format

What is the maximum number of I/O devices that can be interfaced to ASC, given its current instruction format?

  Compare and contrast the msmp and smp architectures

Compare and contrast the MSMP and SMP architectures in terms of: memory access, I/O resources access and instruction execution throughput.

  What fields you believe would be primary keys

Be sure to include the field type and size. Please do not jump ahead and try to create tables. now I'm just looking for a list of fields. This is somewhat vague on purpose. I want you to decide what is required in the database.

  Design and organize forensics report

When the investigation is complete and facts and findings are captured within your forensics report you should assure that the forensic report is organized in the correct manner and you are prepared for the courtroom testimony. Explain the details..

  Choose one of the network tools found in a windows 2000

Select one of the network tools found in a Windows 2000 server. Look up use of this tool. Using a creative writing narrative format write a short story explaining how you will use this tool to keep the network running successfully.

  Write down the probability statement

Often it is difficult to distinguish between the probability of an intersection of outcomes (joint probability) and the probability of a conditional outcome.

  Questionplan and implement a stringed musical instrument

questionplan and implement a stringed musical instrument class using following guidelines-a. data fields for your

  Developing the secure dmz environment

You will require developing a secure DMZ environment in order to accomplish this task. Generate a drawing of this environment utilizing the Power point, and display the following interconnected elements.

  Write a program to compute the electro-magnetic force

Write a program to compute the electro-magnetic force between 2 charged objects. Define another constant, using fixed notation, for Pi carried out to 10 decimal places.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd