Answered You can hire a professional tutor to get the answer.

QUESTION

Write 2 page essay on the topic EBusiness and Ethics.The growth and advancement of computer technology and several networks have encouraged an incline in the number of criminal activities propagated o

Write 2 page essay on the topic EBusiness and Ethics.

The growth and advancement of computer technology and several networks have encouraged an incline in the number of criminal activities propagated over the computers as well as risks (Jamrich and Dan Oja 28). The world is currently witnessing the development of new criminal activities that are being committed through the digital world. Therefore, there is a greater need of coming up with measures and strategies that can help curb cyber risks.

There are many system administrators and skilled enough to do the work and provide what the client need. However,&nbsp.it is hard to find the one that can do what you want with the right way and beneficial and effective for long time. The biggest problem that companies face is the security in the network. The data and information are crucial to a company that is why they need security. In these days, there are many viruses that can harm the computers and destroy the data in companies and it cost them lots of money and gives them a bad reputation. The project will provide and set up data security to the cell phones that helps to secure the data and protect it from threats and viruses (Siegel 31). Furthermore, there is need for security from the outside network. Also, the cell phones should have protection from viruses that destroy and might consequently steal data. Nowadays, every company needs to setup a security program and the only way to do it is to hire system administrators to do that with the right way. What the project intend to&nbsp.set up is the required security for the data and cell phone. Further, the data will be backed up because it is better to have backed up data in case it is lost or destroyed. Setting up security for the data and cell phone will include activating the firewalls, blocking any spyware attacks, as well as using valid malware software or anti-virus. Protection of data entails using encryption for the most sensitive files such as the financial records, tax returns, and backing up the significant

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question