Information Systems .Assign
Information Systems .Assign
Information Security
Rutendo Gandi
16 -October- 2024
Introduction
(a) Evaluate the ethical considerations surrounding information security. (3 Marks)
1. The three ethical considerations surrounding information security , the first one is
confidentiality which ensures that important or sensitive information is not accessed by
unauthorized candidates.
● An example can be Health data stored by hospitals must remain confidential
under laws. Even in companies they ensure user roles are accessed based
information people accessing information depending on their role in the company.
● The ethical implication is that breaching data or accessing confidential data
erodes trust and also may result in someone being hacked.
2. The second one is Integrity which aims for data to remain accurate and unaltered.
● In Financial systems it must be ensured that there is transaction accuracy, a small
error can lead the business to the wrong decision. Altered data will make it hard to
predict accurate sales or performance in a business.
● The ethical implication about this is that altered or incorrect information can lead
to unfair decisions or harm.
(b) Discuss the balance between security measures and user privacy. (3 Marks)
1. Security Measures include steps or ways that are taken by the user to secure their
personal information, it can include surveillance , encryption , passwords to protect
systems and users.
1
● An example can be an organization that can track employee emails to prevent
phishing attacks.
2. User Privacy this gives the user the right to control personal information and avoid
unwarranted surveillance.
● Employees may feel it's not safe , or uncomftable if their emails are monitored.
3. Balanced privacy is crucial for individuals to safeguard their personal information and
data , while security often requires access to private information , which can create a
conflict with the right to privacy .To manage the relationship between security and privacy
better , a collaborative effort between policy makers , technology companies and users is
necessary .
https://www.diplomacy.edu/blog/how-can-we-balance-security-and-privacy-in-the-digital-
world/
(c) Analyze potential consequences of information security breaches for individuals and
society. (4 Marks)
https://www.gdpr-advisor.com/balancing-security-and-user-convenience-in-gdpr-compliant-cyber
security-policies/
1. For individuals
● Financial Loss : Breaches can result in stolen credit card data and information and
bank accounts can be hacked. An example can be a user bank account details
leaked during a breach at an online retailer.
● Reputation Damage : leaked personal information can result in character
defamation and reputation damage. A true based story of a girl who shared
personal pictures , she faced cyber-bullying and stigma to the point of taking her
life.
2
2. For Society
● Economic Impact : large scale breaches can disrupt business operations causing
financial losses and high rate of unemployment.
● Ransomware attacks on hospital systems delay treatment and can cause societal
panic. Healthcare has become one of the most targeted sectors for ransomware
attacks, which have increased by over 300% since 2015. This quarter of 2024 was
the third in which healthcare appeared on the list of the top 10 most affected
industries.
● Moreover, healthcare organizations keep massive sensitive data, including
medical histories and financial information, which makes them extremely valuable
for hackers.
● Ransomware Hits Healthcare Hard in 2024: Life-Saving Systems Targeted as
Hackers Ramp up Attacks
(a) Discuss the ethical tensions between the protection provided by surveillance and the
potential infringement on individual privacy rights. (5 Marks)
3
2. Infringement on Privacy Rights:
Constant Monitoring:
3. Ethical Tensions :
● Institutions must weigh the benefits of security against the discomfort and potential harm
to individuals' privacy.
Real-life Example: Airports use surveillance extensively but ensure areas like restrooms remain
private.