Performing the security review in company

Assignment Help Computer Engineering
Reference no: EM131674878

Write an review on this article references in APA format.

The Bible says, "There are six things that the Lord hates, seven that are an abomination to him: haughty eyes, a lying tongue, and hands that shed innocent blood, a heart that devises wicked plans, feet that make haste to run to evil, a false witness who breathes out lies, and one who sows discord among brothers," (Proverbs 6:16-19).

By the development manager asking you to omit the truth in your report; he/she is asking you to lie. From a business ethical standpoint, it is your "name" on the line, and a failure such as this could be considered negligence. According to Abawajv, "employee negligence or maliciousness is the main cause of many data breaches," (Abawahv, 2014).

So by not reporting the potential violations, you are leaving the website vulnerable. This means that if the security issues are not fixed an attack is likely to occur on the website. Since your company will have been noted as the one who performed the security checks prior to the website being released, your reputation will be tarnished which can be worse thatn the attack itself.

According to Byers, "Although there are obvious direct impacts which may be easily quantifiable financially other consequences may be less obvious.

For most companies the impact on reputation is probably far more significant than merely the cost of a production outage," (Byers, 2004). However, a poor reputation can affect your company in multiple ways; loss of business, rates having to be lowered, and potential employees leaving the company. As the company performing the security review I would publish my original findings. We must not compromise our values to cater to a company not performing at the level the need to be at.

The Bible says, "So whoever knows the right thing to do and fails to do it, for him it is sin," (James, 4:17). Bibliography Abawajy, J. (2014).

User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Byres, E., & Lowe, J. (2004, October).

The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Verified Expert

The present assignment was based upon the review article of importance of truth in business. In this article it is been stated that one should be truthful so that organization can grow well without lossing its reputation.

Reference no: EM131674878

Questions Cloud

Determine whether save-a-lot is liable : Stewart then punched Tammy in the face, knocking her to the floor. If Tammy sues Save-a-Lot, what legal issue must be addressed to determine whether Save-a-Lot
Various levels of the organization : What are important factors to consider when leading teams within the various levels of the organization?
How can wrong criteria accidentally or purposely skew result : All solutions are not created equal. How can the wrong criteria accidentally or purposely skew results? What can you do to ensure this does not happen?
What do you think are best ways to reward teamwork : What do you think are best ways to reward teamwork? What are your reactions to the various methods of team compensation?
Performing the security review in company : performing the security review - Although there are obvious direct impacts which may be easily quantifiable financially other consequences may be less obvious
Explain why hartman comes to the conclusion : What does she mean? How does the material we have examined in class help to explain why she comes to this conclusion?
Gain or refine during internship : What skills do you want to gain or refine during your internship?
Working with customer personal information : Consider the reason of If working with customer's personal information, and list why employers monitor employee communications.
Impact on the new employees : Create a list of at least four laws you feel are the most important to new employees. Provide a description of each law and their impact on the new employees.

Reviews

inf1674878

1/15/2018 5:11:12 AM

Whatever I can state is goodness, super decent and produced an extraordinary paper. First time I have ever utilized an administration like this and couldnt be more joyful, gracious and the most sensible costs as well.

len1674878

10/11/2017 3:06:37 AM

I have to write an review on this article references in APA format.The Bible says, "So whoever knows the right thing to do and fails to do it, for him it is sin," (James, 4:17). Bibliography Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Byres, E., & Lowe, J. (2004, October). The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd