Every day, we use computer software to perform everyday tasks. These can range from sending e-mail, balancing your checkbook, web browsing, shopping and much more. Most people don't stop to think about the security of the software that we use on a daily basis. Users are more concerned about getting their work done, and security is little more than an afterthought.
Security is a very important and often overlooked aspect of software development. Security is used to authenticate users, manage access to resources, and to ensure that data hasn't been compromised.
Recent events such as the Sasser, SQL Server, Blaster and Nimda worms have been devastating throughout the world. They've cost companies and everyday people billions of dollars worth of wasted time, money and productivity. In some cases, data gets corrupted, modified or deleted. Businesses are unable to function normally, which can result in heavy financial losses.
Some of these worms are still taking over computers to this day, long after patches have been readily available to fix the problem. Security professionals have been telling computer users to patch their systems and keep them up to date, but it their words aren't being listened to in spite of their warnings. Why is this scenario constantly being repeated? Who's responsible for ensuring that software we use is secure?
I feel that software companies and software engineers are ethically responsible for making sure that their software is secure. We're becoming more dependent on computer software, which makes us more vulnerable to virus attacks from a security bug in a widely used piece of software. They must be able to ensure that our software is more secu...
... middle of paper ...
...3] Peter Mell and Miles C. Tracy, "Procedures for Handling Security Patches", National Institute of Standards and Technology, August 2002
SANS Institute - Computer security web site, with information about computer security training
SANS Institute Reading Room - Articles on a variety of security topics
Security Focus - Web site with news and analysis of security issues
The Register - Web site with IT-related news
Software Engineering Institute, Carnegie Mellon University
National Institute for Science and Technology
The CERT® Coordination Center - A reporting center for Internet security
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- In a situation where a software engineer is asked to design a system with inherent security vulnerabilities, many ethical issues involving several stakeholders are encountered. Diane Jones is the owner of a software development company that has been contracted to engineer a database management system for the personnel office of a medium-sized toy manufacturing company. Management members of the toy manufacturer involved with Diane in the design of the system include the CEO, the director of computing, and the director of personnel.... [tags: Business Ethics]
839 words (2.4 pages)
- As relates to the Issue of Information Security programs, the Department of Health and Human Sciences has formulated various different policies aimed at governing information handling and security as concerns all the departments’ resources. Common in the list of policies are the Policy on Information and Technology security for Remote Access which was established to ensure the information and technology departments resources are appropriately protected during the authorization of remote accessibility to the automated information and system of the department of human and health services.... [tags: Information security, Security, Confidentiality]
1094 words (3.1 pages)
- The importance of cyber security is at an all-time high. The United States Infrastructure is outdated to the point if a cyber-attack did happen to the nation’s power infrastructure, the nation will have trouble in fixing the damage infrastructure. Many nations and companies are spending millions to billions to restructure their systems to reduce the chance of being hacked. As more things are connect to the internet, the higher of chance of those things being control by individuals that want to cause damage to those systems.... [tags: Computer security, Security, Nuclear power]
775 words (2.2 pages)
- Introduction This paper will present to the Northcentral University Information Technology Supervisor research in the form of a report that will assist with determining the controls required to implement to ensure that data are secure for the university. This paper will summarize the security breaches of the Target Store Corporation over the previous year and make recommendations in the form of information technology security best practices to strengthen the University’s infrastructure. Summarize Major Security Breaches The Target Corporation was exploited in December 2013 and then again in 2015.... [tags: Computer security, Information security]
801 words (2.3 pages)
- Sometime last year, a software package came available that allows employers to monitor their workers’ Internet usage. It contains a database of about 45,000 web sites that are categorized as productive, neutral, and rates operators based on their browsing. It identifies the most frequent users and the most popular sites, and it’s called Little Brother. There are also programs to search emails and programs to block objectionable websites, beyond installing monitoring software. Your employer can simply go into your hard drive, check your cache to see where you’ve been on the net, and I read your e-mail.... [tags: employees, computer, email]
667 words (1.9 pages)
- Introduction Common criterial for information technology security evaluation, which is called Common Criteria (CC) is an international standard for computer information security which explicitly specify the security needs of computer users. These standards govern different factors related to computer security like the process of information security specification, implementation and evaluation. These criterion act as a guide for all information security experts therefore they should turn to it when they have to make a decision about setting up an IT security system (Denning, 1999), it could be the hardware or the software parts.... [tags: Information security, Computer security, Security]
1446 words (4.1 pages)
- The ethics of work and success: The meaning of work to individuals has important influences on their behavior in organizations. They derive their basic values and beliefs about work from society at large, the family, their educational experiences, and many other sources. The Puritans, who were Calvinists by religious faith, brought what is known as the work ethic to the United States. The work ethic, sometimes called the Protestant Ethic because of its origin in religion, holds that labor is good in itself and good for the person’s soul; the person helps both himself and others by the act of working.... [tags: Ethics]
1288 words (3.7 pages)
- Article 1 Information Technology Ethics IT Professional is a publication (Keith W. Miller 2009), it is such like book publication, it also has copyright problem, plagiarism problem, and many problems like book publication, so, to be the Professionals, they must act like the book authors to solve these problems. In aspects of IT, the side of ethical problems are including advice on how professionals can recognize, analyze, and make judgments on challenging questions about right, wrong, and computing.... [tags: IT Ethics]
733 words (2.1 pages)
- The organization I work for is a Multi national corporation, for now we are a business unit of a publically traded company. This assignment came at a unique time as we the business unit I work in was just purchased by a private equity firm based in England. Our corporate headquarters is based in California and we have offices in South America, Europe and Asia. We are a unique organization as most of us work from home offices and rarely set foot in our offices, but visit our customer’s offices quite often.... [tags: Ethics, Business]
2077 words (5.9 pages)
- Computer Ethics A Ten Commandments of Computer Ethics (see Appendix A) was first presented by Dr. Ramon C. Barquin's in his paper for the Computer Ethics Institute of the Brookings Institution entitled, "In Pursuit of a 'Ten Commandments' for Computer Ethics" in May of 1992. Computer ethics is about principles related to behavior and decisions made by computer professionals and users, including software engineers, operators, managers, policy makers, as well as educators and students. This means all these people involved should be supported with some "policies for ethical conduct" i.e.... [tags: Ethics Morals Morality]
1355 words (3.9 pages)