Volume 20 No 9 (2022)
 Download PDF
A study on the vulnerability principle as the panacea for monitoring security policy of computer
Gyanvi Verma, Dr. Manish Varshney
Abstract
Although information security policies have been adopted, many industries still experience the negative effects of non-compliance. These harms include unauthorized exposure of private customer information, trade secret leaks, and different cyber attacks. Such injury can have a huge effect. Monitoring the adherence of information security policies, also known as use policies, has been used as a way to improve security policy adherence in order to prevent this. Enhancing security policy compliance to stop harm is one of the key goals of usage policy monitoring. Ironically, usage policy monitoring might have negative effects. While defenders of use policy tilt to deontological ethics to argue against the monitoring of security policy, utilitarianism ethicists contend that use policy monitoring is improving security policy compliance. According to deontological ethics, monitoring security policies intrudes on employees' privacy and has a negative impact on their ability to execute their jobs. There had not been any apparent solution to this discourse. To determine the extent of security policy monitoring, a poll was undertaken. Therefore, the vulnerability principle was investigated as the magic bullet for improving the monitoring of usage policy to satisfy all involved parties.
Keywords
Information security; vulnerability concept; ethics; security policy monitoring
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.