Solution for the IT security banking and ethics
There are several solutions for the Islamic banking, IT security and ethics in where their practices should not contradict with the teaching of al-Quran but at the same time implement the technology to improve banking service to the society. Below are the solutions that might be suitable for the banking services to implement Islamic ethics in the business and their security perspectives.
What you should do and don’t during practices ethics and security in banking:
Do not use Other People's Computer Resources without Authorization.
Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing.
Shalt Not Interfere With Other People's Computer
…show more content…
DO NOT give out your password to anyone.
DO back-up your data on disks, USB Storage or CDs regularly.
Be accountable for your IT assets and data
Use good judgement to protect your data
Protect your laptop during the trip
Ensure sensitive information on the computer screen is not visible to others
Protect your user ID and password
Avoid using the same password at multiple Web sites.
Never use the password you’ve picked for your email account at any online site: If you do, and an e-commerce site you are registered at gets hacked, there’s a good chance someone will be reading your email soon.
Literature review
There are several issues related to the IT security, banking, and the ethics while handling the IT computing related. IT has brought a huge change to the humanity state whether in term of how the information being stored, the security of how the information being protected and how the ethics while handling the information. One of the major problems with traditional storage networks is that IT managements have to either under- or over-estimate the organization’s needs, leaving either gaps or too much storage while cloud storage involves storing your data in an off-site data centre run and maintained by a third-party cloud provider. The major benefit of cloud storage over traditional storage is the capability to access your data anyplace in the world.
This paper explores the definition and history of cloud computing. Cloud computing began in the 1950’s with a theory known as time sharing. This allowed for the sharing of computers so that consumers could get the benefits without the costly expenses that came with it (Pullen, 2015). Over the years this concept has evolved into the current definition of cloud computing, which is basically using the Internet for computing resources and applications so that they do not need to do it in-house (Hoffer, George, Valacich, 2014). Each different organizational culture (SF: Collaboration, ST: Control, NF: Cultivation, and NT: Competence) has different beliefs and practices that make it more or less likely to adopt new practices such as cloud computing (Atler, Shaw, 2003). They must weigh pros such as flexibility, the ability to work from anywhere, as well as the environmentally friendly aspect which are listed on Salesforce.com. Disadvantages also need to be taken into consideration and the biggest of these is security issues (Ganore, 2014).
This case gives us a fundamental understanding of the concept of cloud computing and presents the advantages and issues of this IT infrastructure. This case gives a clear vision of the company’s current situation. Three main questions to consider
Cloud computing has set a trend in the information technology arena that has sparked the interest of all who utilize the internet on purpose and unsuspectingly. Initially, the primary purpose of cloud computing was to provide a centralized data bank that organizations could use for quick data access. Its use has been quickly adapted, however, beyond business use to become the first option for personal use. The advantages and disadvantages of implementing such a shift from business to personal are varied, yet, statistically, according to the CISCO Global Cloud Index: Forecast and Methodology, 2014-2019 White Paper, its public use is on the rise. The report notes that “by 2019, 56 percent of the cloud workloads will be in public cloud data centers, up from 30 percent in 2014 and by 2019, 44 percent of the cloud workloads will be in private cloud data centers, down from 70 percent in 2014”. Though disadvantages with regard to data security is prominent, users have deemed that its implementation will still promote greater benefits than loss.
When a business started, the related data has been generated. Along with the development of the business, the data becomes larger and accumulates day by day. The accumulated data can be transferred to meaningful information for the managers’ decision makings. Storing and protecting the data is essential to the development of the enterprise business. Today, almost all enterprises use computer storage to store their data instead of the hard copy papers. In the past, hard copy papers stored the data for the enterprise, but it existed too many potential risks, such as data loss, data stolen, data destroy, or cannot sharing with others. In 1990s, more companies started to use computer hard drive to store their business data; this change impacted the later development of the storage strategies. Along with the technology development and the data becomes bigger and bigger, big data problems appear. How can enterprise store such large data and manage such large data effectively? Currently there are several classic storage strategies to help enterprise solve their data storage problems, such as spinning media, flash, and cloud. The enterprise also can select onsite or offsite option as their considerations based on their business environment. Security issues are popular discussion topics as well in this paper.
Cloud because of its wide range of applications it allows users to store data their data remotely in the cloud and enjoy the on-demand high quality cloud applications and reveal burden from the local storage, cost and maintenance. In this according to the user’s perspective, including both individuals (private) and enterprises like companies appealing the cloud benefits by storing data remotely into the cloud in a flexible on-demand manner and relief of the burden of storage management along with this he/she can also enjoy the universal data access which dependent geographical locations and avoidance of the capital expenditure, software, hardware and personnel management and maintenances and so on.
Imagine massive server failures that not only lead to complete data loss, but also a financial crisis for customers. This is the problem that Lloyds Banking Group faced when servers failed and left thousands of customers without access to their accounts according to Clarke (2014). In order to protect firm data, firm reputation, and especially customer trust and loyalty, Bank of America needs to assure proper precautions are taken to securely store all data.
The evidence gathered in this research reveal that soon after iCloud was presented by Steve Jobs to the users, several experts of computing companies and Institute of Technologies have investigated the cloud service and tested its operational options, security and vulnerability. Their independent research reports have the common idea: cloud storage is not a safe service yet. Many of its options should be improved. iCloud is not advisable service to use as it stores all private information online from the devices even they are locked. The process of information backup occurs in a way users do not notice. The fact that three years later after the introduction of iCloud the service has been hacked means that even the best experts cannot control cloud storage and users cannot have an expectation of privacy with regard to cloud storage.
The evolution of technology has significantly influenced companies' ethical standards and guidelines. These companies use technological advancements in order to ensure that the confidential information that they have regarding clients or their activity is not made public to interested parties. In order to reach this objective, companies use IT programs like firewalls, programs that are protected by passwords, security policies, and others.
On December 19, 2013, the field of information technology security was forever changed when Target publicly acknowledged that hackers have breached their system and personal information of about 70 million customers were stolen. This was an unprecedented event because before the breach many companies did not take IT security as seriously as they should. As the dust settled, the world witnessed what can happen when a company have a vulnerable security system. As impressive as this data breach look from a security perspective, the enormous attack wasn’t very ingenious. A few days before the Thanksgiving, a malware was installed in the target’s security and payment system designed to steal customers information from 1797 target stores in America. However, target could have easily prevent this attack they were more proactive about their security.
As a future information security professional, you must understand the scope of an organization’s legal and ethical responsibilities. The information security professional plays an important role in an organization’s approach to managing liability for privacy and security risks. In the modern litigious societies of the world, sometimes laws are enforced in civil courts, where large damages can be awarded to plaintiffs who bring suits against organizations. Sometimes these damages are punitive assessed as a deterrent. To minimize liability and reduce risks from electronic and physical threats, and to reduce all losses from legal action, information security practitioners must thoroughly understand the current legal environment, stay current with laws and regulations, and watch for new and emerging issues. By educating the management and employees of an organization on their legal and ethical obligations and the proper use of information technology and information security, security professionals can help keep an organization focused on its primary objectives. In the first part of this chapter, you learn about the legislation and regulations that affect the management of information in an organization. In the second part, you learn about the ethical issues related to information security, and about several professional organizations with established codes of ethics. Use this chapter as both a reference to the legal aspects of information security and as an aide
Each broad PC class teaches the OSI and in addition DoD arranging models, and we find that everything begins at the base, with the physical level. In like way, concerning IT security, physical security is the foundation for our general strategy. Regardless, a couple of affiliations, redirected by the more intricate features of programming based security things, may disregard the hugeness of ensuring that the framework and its parts have been guaranteed at the physical level.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Cloud computing is a topic of which much is assumed. The average person recognizes the term “cloud computing” as having to do with their storage from their iPad or iPhone on the online storage area which syncs their Apple devices to their computer. This common cloud is called the iCloud. That is where common knowledge ends about this topic. However, upon further exploration, a deeper understanding is gained with greater explanation, and it is realized that cloud computing is something that is used all of the time on many levels of everyday technology. While the terminology remains cryptic to the mind of most people, the concepts behind the practical uses of cloud computing become quite clear. It is relatable and understandable. Upon this revelation, the iCloud is recognized as the tip of the preverbal iceberg when speaking about cloud computing. It is important to discuss and further understand the many types of cloud computing as well as the various applications to life through technology. This affects how information is stored online, computers are protected, information is secured, emails are processed, and many other factors that are taken for granted in the world of technology. Cloud computing is a general term used to describe how information is stored, utilized, and accessed over the internet. There is no cloud, but the word cloud gives the connotation of an abstract place which is known to exist but is too vast to touch or contain (Griffith,
Cloud storage is a solution for consumers and businesses alike. However, opponents expressed concerns about
Cloud-based storage is a model of data storage in which the digital data is stored in logical pools. The physical storage would span multiple servers and locations. The physical environment is typically owned and managed by a hosting company. The Cloud-based storage will compute power, storage, and other resources by gaining access to a suite of elastic IT infrastructure services, as the business demands. With minimal cost and effort, the application can be moved to the cloud. Cloud-based storage help reduces capital expenses, minimize support and administrative costs, retain the performance, security, and have reliability requirements.