WGU C841 IHP4 Task 2: Ethics and Cybersecurity in
Information Security | Actual verified study
complete Solutions | A+ Graded | 2026 Updates |
100% correct
Legal Issues in Information Security
C841
Cody Jowers
IHP4 Task 2: Ethics and Cybersecurity
IHP4 Task 2: Ethics and Cybersecurity
A1/A1a. Ethical Guidelines Related to Information Security
An ethical guideline that I believe TechFite should adopt is from the Information Systems
Security Association (ISSA). One of ISSA’s guidelines states “Maintain appropriate confidentiality of
proprietary or otherwise sensitive information encountered in the course of professional activities.” This
guideline would have kept all TechFite’s clients sensitive information separated from current, previous,
and future clients information. TechFite failed to keep client’s information separated which led to
multiple client’s proprietary information being exposed to other companies.
The second ethical guideline that TechFite should adopt would be from GIAC. The ethical
guideline states “Not to engage in or be a party to unethical or unlawful acts that negatively affect the
community, my professional reputation, or the information security discipline.” Carl Jaspers participated
in moving money into TechFite using three fake companies and a bank that was not associated with
TechFite. Carl Jaspers illegal money laundering scheme effected not only his reputation but also the
company’s reputation.
A2. Unethical Practices
Sarah Miller the senior analyst of the BI unit in the TechFite case study participated in an
unethical act for using a tool called Metasploit to illegally scan networks of other companies, in order to
intercept other companies’ electronic information. A member of Sarah Miller’s team Jack Hudson took
direction from Miller in gathering intelligence through trash surveillance making Sarah Miller and her
team are all actors in this unethical practice.