Question

PLease answer in deatl about this cyber secuirty question. Privacy goes hand in hand with security,...

PLease answer in deatl about this cyber secuirty question.

Privacy goes hand in hand with security, but many of the activities of information security analysts seem to be an invasion of privacy. Discuss how employers can justify the use of tools such as Encase by Guidance Software.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Privacy and security, while deals with the same branch of Computer Science i.e. Information Security, they are seen as complement to each other in various aspects.

By Privacy, we mean that how one's private data, can't be accessed by any other person or organization, without their permission. Now this private data can be anything like private photos, or emails, or bank statements or anything, which is meant only for that particular person.

Now, by Security, we mean, how immune or guarded, our data, or our connection with the network is. Security assures the user, that the environment is safeguarded from any sort of external attack or unauthorized access of any sort. Now, security is also of different types, like Network Security, Data Security, Hardware Security and so on.

Privacy and Security are complementry of each other, i.e., a perfect balance of both is needed, to get good security with personal privacy. For having a secured environment, there is a need to scan each and every data stored, packet flowing through the network, both in and out. But, at the same time, to get the access of that private data like photos, videos, audio etc. So, to have security, al the data, emails, text messages, all will have to be scanned and checked, which is direct breach of one's privacy.

So, in a nutshell, privacy and security are opposite sides of a seesaw.

Let us now discuss the breach of privacy of employees, by employers, in the name of security. EnCase by Guidance Software is a security oriented software, which aims at complete protection and security.It mainly used in companies, for security purposed. But, in recent times, it has been alleged that it compromises with privacy of the data of users, in order to provide robust security, It is even known as "spy software" or "virtual tracker". Some of the features of this software include recovering deleted data from hard drive, tracking browsing history of users, have access to private emails. All of this directly shows the level of privacy that software like this work at.

So, in a broader aspect, privacy is minimized a lot, for the employees, and is like a 24/7 surveillance, of their activities. But, from an employer's point of view, it helps in securing their systems, their workplace and ensuring that there's no suspicious or illegal activity happening, from within the company. Many times, data like this is needed, in case of any mishap in the company, or any fraudelent cases like bribery or corruption in the organization. It's data like these, that help in the investigation and finding the culprit.

Hence, while privacy is important, in the working environment, security measures and tools like EnCase are also important to some extent, given that the employees are well informed, before hand, about them.

Add a comment
Know the answer?
Add Answer to:
PLease answer in deatl about this cyber secuirty question. Privacy goes hand in hand with security,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE...

    ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC "MALICIOUS SOFTWARE" ch=6 it a softwar part / maluarepart. 1 what is the Difference between the T virus & a warm.. Ang Virus - A urus need a host Software latch on to. wearm Awarm is a stand alone, a cuorm can do damage without latdlung any host software. e to on to

  • Cyber Security and Crime Ciampa (2012) discusses training techniques in Chapter 14. Why is it important...

    Cyber Security and Crime Ciampa (2012) discusses training techniques in Chapter 14. Why is it important to train employees about security defenses? Does training employees increase or decrease security for an organization? Explain. There is not a right or wrong answer to this question. Use your critical thinking skills to examine how training employees can impact the overall security of an organization.

  • Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other...

    Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...

  • Paul Gray mentioned he was concerned about the security of his clients and their own management...

    Paul Gray mentioned he was concerned about the security of his clients and their own management of passwords and accounts. Improper password management can lead to cases of fraud and misuse of the system. One such type fraud is that victims' account passwords can be stolen and their share trading accounts can be misused for making unauthorized transactions that result in the victims making losses. This crime can be executed by the suspect installing key loggers in public computers, such...

  • LinkedIn: Employees’ Privacy vs. Employer’s Reputation With the growing use of social media, employers need to...

    LinkedIn: Employees’ Privacy vs. Employer’s Reputation With the growing use of social media, employers need to determine how much they should monitor their employees’ use of social media. An employee may post something that is confidential to the employer or harm the reputation of the employer. If not monitored, and stopped, long term damage can be done to the employer. On the other hand, without probable cause, an employer can be seen as overacting and invading the employee’s personal privacy...

  • MBA 5005 law home help required please help me answer questions 83 thru 86 83. Which...

    MBA 5005 law home help required please help me answer questions 83 thru 86 83. Which of the following is true regarding assault? a. Assault is an intentional, nonconsensual act that gives rise to the apprehension that a harmful or offensive contact is imminent. offensive contact is imminent. harmful or offensive contact is imminent. b. Assault is an intentional, nonconsensual act that gives rise to the fear that a harmful or e. Assault is a negligent, nonconsensual act that gives...

  • How would you combat security and privacy challenges of the Internet of Things (as an intelligent...

    How would you combat security and privacy challenges of the Internet of Things (as an intelligent system)? Body should include: Introduction Discussion Methodology Experiment Conclusion A good report must answer the standard questions about any research project. The following format is suggested and including the information I asked above: Abstract: WHAT did you do, WHY was it important, WHAT were your high level results? Problem Statement: WHAT is the problem you attempted to solve? Prior Work: HOW have others approached...

  • (PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD...

    (PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD OR WHITE BOARD) Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for...

  • QUESTION 1 (20) Systems development includes every resource and every step that goes into producing an...

    QUESTION 1 (20) Systems development includes every resource and every step that goes into producing an information system that solves a problem or helps the organisation take advantage of new opportunities. CyberTech has appointed you to head their software development project. Your task is to create a report highlighting the phases of the software development process as an attempt to inform management of the activities involved in developing software. Your report should clearly explain the steps or phases in the...

  • Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...

    Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Q: Write (300-700 words) about privacy and security concerns in the Telehealth program and how these possible threats can be compromised for better healthcare services?

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT