Explain privacy and cybersecurity in the 21st century.
What will be an ideal response?
Answers will vary. In today's workplace, every desktop computer, laptop, or handheld device is vulnerable to attack. Intruders hacking into a computer system, malware, lost laptops, and insider threats all combine to present serious challenges to companies. In addition, apps for cell phones may also open the door to new types of threats to security and privacy. Further, as myriad social and technological platforms become increasingly blended and blurred, more and more avenues for both mild and vicious acts seem to arise. In addition to these internal and external threats to security and privacy, the government itself poses a threat, especially in view of its relationship with many top social media companies. PRISM (Planning Tool for Resource Integration, Synchronization and Management) is a program used by the National Security Agency (NSA). PRISM has been described as a data tool designed to collect and process foreign intelligence that passes through American servers. The program cannot intentionally access information about American citizens, but it can access information about them when information is collected "incidentally" as part of a sweep of information about a foreign operative. Perhaps the most frightening aspect of the PRISM program is that it has been carried out with the apparent cooperation of Microsoft, Yahoo!, Google, Facebook, Paltalk, AOL, Skype, YouTube, and Apple (but not Twitter), and it allows the NSA to collect information from e-mails, video chats, photographs, documents, and connection logs that helps the agency track foreign agents. These companies have denied giving the NSA direct access to their servers, and this appears to be the case. It does also seem, however, that these companies collaborated with the government in developing more efficient methods to share personal data of foreign users in direct response to lawful government requests. Furthermore, requested information was sent to a special, secure server to which the NSA has access and so can obtain that information. Given the information-gathering capacity of organizations such as the NSA, we must all realize that assumptions we have made in the past about what is private and what is public are no longer valid. See 14-6: HR in the Headlines
You might also like to view...
Firms whose products require ________ resources — oil, coal, platinum, zinc, silver — face substantial cost increases as depletion approaches
A) infinite B) near finite C) finite renewable D) finite nonrenewable E) perishable
A master budget is a planning document that presents expected variable and fixed overhead costs at different activity levels
Indicate whether the statement is true or false
Chapter 7 of the Bankruptcy Act is designed to do all of the following EXCEPT:
A. Provides safeguards against the withdrawal of assets by the owners of the bankrupt firm. B. Allows insolvent debtors to discharge all of their obligations and to start over unhampered by a burden of prior debt. C. Provides for an equitable distribution of the assets among the creditors. D. Details the procedures to be followed when a firm is liquidated. E. Establishes the rules of reorganization for firms with projected cash flows that eventually will be sufficient to meet debt payments.
The difference between backward scheduling and forward scheduling is which of the following?
A) Backward scheduling uses firm and planned orders; forward scheduling uses only planned orders. B) Backward scheduling uses standard times; forward scheduling uses actual lead times. C) Backward scheduling begins from the start date; forward scheduling begins with the due date. D) Backward scheduling begins from the due date; forward scheduling begins with the start date.