Define information ethics and information security and explain why each is critical to any business. Identify two epolicies that a business could implement to ensure the protection of sensitive corporate data. Demonstrate how a business can use authentication and authorization technologies to prevent information theft.
Propose a plan to implement information security plans to ensure your critical information is safe and protected.
You may wish to use Modules 1, 2, 8, and 9, at http://tinyurl.com/yyzjvj9k, to help with planning and drafting your essay.
Your paper should include an introduction, a body, and a conclusion. Also, support your answers with the course’s readings and at least two scholarly journal articles. The article’s purpose is to support your positions, claims, and observations, in addition to your textbook.
ProQuest and EBSCOhost are great sites to find resources. Also, write in a concise and logical, using excellent grammar and style techniques. Additionally, the quality of your writing dictates grading criteria. On the other hand, if you use direct quotes from books or articles, place the words you copied (use parenthesis) and cite them in-line. Also, only use sources within the five-year range.
The quotes should be complete sentences (no more, less) and should be incorporated in your essay to illustrate your ideas. Please, cite your sources in a clickable reference list at the end. Also, do not copy without providing proper attribution (quotation marks and in-line citations). Also, write an essay format, not in bullet form, numbering, or another list format. It would be best if you use your own words. Lastly, proofread your work and run it through Grammarly for thorough confirmation.