Topic 3: Networks, Security, And Privacy

What is the importance of system security within the organization where you currently work or at an organization within your field of study? What are the legal and ethical implications the organization could face for failing to protect systems and information? Identify and explain three strategies the organization could implement to protect its systems and information against threats. In replies to peers, consider whether the three identified strategies are the best defense against threats. Justify your response.


What is your perception of the current threats presented by social media or Internet sites that you frequent? How can you protect your personal information to minimize these threats? In replies to peers, provide additional ways to protect personal information on social channels and the Internet through providing examples found in your own research or by citing the topic Resources.


The purpose of this assignment is to explore legal and ethical issues related to networks, privacy, and security, as well as to research specific types of privacy and security threats and the measures that employee users should take to maintain privacy and security within an organization.

Assume you are part of the IT security team in your organization. Research one common employee IT privacy and security issues and ways that employee users can protect themselves and the business from privacy and security breaches and risks. Some common risks to business include:

  • Lack of password management
  • Electronic storage and transfer of information
  • Privilege abuse by employees
  • Use of unapproved hardware and software
  • Data mishandling
  • Equipment misuse (including hardware and systems)
  • Knowledge misuse
  • Unapproved workarounds
  • Securing company data and information on personal employee devices (e.g., cell phones, tablets)
  • Collaboration with third-party service providers
  • Social engineering
  • Phishing attacks

Summarize your research findings and educate employees about the identified IT privacy and security issues.

Create a PowerPoint presentation with a minimum of six slides that addresses the following:

  1. Define the employee privacy/security issue and explain why it could be a risk for an organization.
  2. Provide a specific workplace scenario to illustrate the employee privacy/security issue.
  3. Discuss the legal and ethical implications the privacy/security issue presents for the employee, the company, and the customer.
  4. Describe the negative impact the employee privacy/security issue could present to the organization in terms of its overall effect on accounting, finance, marketing, management, economics, and general business operations.
  5. Discuss the ways that employee users can protect themselves and the business from these types of privacy and security breaches and risks.
  6. Discuss specific policies, strategies, and techniques that could be employed by the organization and the employee to minimize the identified employee privacy/security issue.
  7. Discuss how to educate employees about the identified IT privacy and security risks.
  8. Include speaker notes at the bottom of each slide.

Submit the Microsoft PowerPoint presentation file only. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

Refer to the resource, “Creating Effective PowerPoint Presentations,” located in the Student Success Center, for additional guidance on completing this assignment in the appropriate style.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance. .

Calculate the price of your order

Simple Order Process

Fill in the Order Form

Share all the assignment information. Including the instructions, provided reading materials, grading rubric, number of pages, the required formatting, deadline, and your academic level. Provide any information and announcements shared by the professor. Choose your preferred writer if you have one.

Get Your Order Assigned

Once we receive your order form, we will select the best writer from our pool of experts to fit your assignment.

Share More Data if Needed

You will receive a confirmation email when a writer has been assigned your task. The writer may contact you if they need any additional information or clarifications regarding your task

Let Our Essay Writer Do Their Job

Once you entrust us with your academic task, our skilled writers embark on creating your paper entirely from the ground up. Through rigorous research and unwavering commitment to your guidelines, our experts meticulously craft every aspect of your paper. Our process ensures that your essay is not only original but also aligned with your specific requirements, making certain that the final piece surpasses your expectations.

Quality Checks and Proofreading

Upon the completion of your paper, it undergoes a meticulous review by our dedicated Quality and Proofreading department. This crucial step ensures not only the originality of the content but also its alignment with the highest academic standards. Our seasoned experts conduct thorough checks, meticulously examining every facet of your paper, including grammar, structure, coherence, and proper citation. This comprehensive review process guarantees that the final product you receive not only meets our stringent quality benchmarks but also reflects your dedication to academic excellence.

Review and Download the Final Draft

If you find that any part of the paper does not meet the initial instructions, send it back to us with your feedback, and we will make the necessary adjustments.