Performing the security review - although there are obvious


Write an review on this article references in APA format.

The Bible says, "There are six things that the Lord hates, seven that are an abomination to him: haughty eyes, a lying tongue, and hands that shed innocent blood, a heart that devises wicked plans, feet that make haste to run to evil, a false witness who breathes out lies, and one who sows discord among brothers," (Proverbs 6:16-19).

By the development manager asking you to omit the truth in your report; he/she is asking you to lie. From a business ethical standpoint, it is your "name" on the line, and a failure such as this could be considered negligence. According to Abawajv, "employee negligence or maliciousness is the main cause of many data breaches," (Abawahv, 2014).

So by not reporting the potential violations, you are leaving the website vulnerable. This means that if the security issues are not fixed an attack is likely to occur on the website. Since your company will have been noted as the one who performed the security checks prior to the website being released, your reputation will be tarnished which can be worse thatn the attack itself.

According to Byers, "Although there are obvious direct impacts which may be easily quantifiable financially other consequences may be less obvious.

For most companies the impact on reputation is probably far more significant than merely the cost of a production outage," (Byers, 2004). However, a poor reputation can affect your company in multiple ways; loss of business, rates having to be lowered, and potential employees leaving the company. As the company performing the security review I would publish my original findings. We must not compromise our values to cater to a company not performing at the level the need to be at.

The Bible says, "So whoever knows the right thing to do and fails to do it, for him it is sin," (James, 4:17). Bibliography Abawajy, J. (2014).

User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Byres, E., & Lowe, J. (2004, October).

The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Performing the security review - although there are obvious
Reference No:- TGS02470408

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)