Address the vulnerability could lead to a data breach

Assignment Help Other Subject
Reference no: EM133682436

Activity

Use the ACS Code of Professional Conduct V.2.1 to formulate answers for the following 3 scenarios (150 words for each scenario, 450 words in total).

Scenario 1
- Sarah is an IT security specialist working for a large multinational corporation. Her role involves safeguarding the company's digital assets, protecting sensitive data, and ensuring compliance with cyber security regulations.

- One day, Sarah discovers a vulnerability in the company's network infrastructure that could potentially expose confidential customer information to hackers. Upon further investigation, she realizes that fixing the vulnerability would require significant time and resources. as well as temporarily disrupting critical business operations. However. failing to address the vulnerability could lead to a data breach, compromising the privacy and security of the company's customers.

- What Sarah should do? Refer to ACS code and justify your suggestion.

Your answer should be about 150 words. If you used any external resources. you must cite and reference them.

Scenario 2

Pradeep, a statistical database programmer, is trying to write a large statistical program needed by his company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Pradeep has found himself stuck on several parts of the program. His manager, not recognizing the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Pradeep remembers that a co-worker had given him source listings from his current work and from an early version of a commercial software package developed at another company.

On studying these programs, he sees two areas of code which could be directly incorporated into his own program. He uses segments of code from both his co-worker and the commercial software, but does not tell anyone or mention it in the documentation. He completes the project and turns it in a day ahead of time.

Scenario 3

John works as a data analyst for a large e-commerce company. His role involves jig customer data to improve marketing strategies and personalize user experiences on the company's website and mobile app.

While anal ig the data, John discovers that the company's data collection practices may be infringing on customer privacy. He finds that the company is collecting more data than necessary for its operations, including sensitive information such as browsing history, location data, and personal preferences, without obtaining explicit consent from users. Furthermore, there are indications that this data might be shared with third-party advertisers for targeted advertising purposes without the knowledge of the users.
- What John should do? Refer to the ACS code and justify your suggestion.
- Your answer should be about 150 words. If you used any external resources, you must cite and reference them. Answers generated by Al tools will not be acceptable.

Reference no: EM133682436

Questions Cloud

Rubber gloves in one hand and pair of gloves in other : Dalia and Evans went to the Dollar Store. Dalia was carrying groceries and Evans had a box of rubber gloves in one hand and a pair of gloves in the other.
Human resources at large medical practice : You are the director of human resources at a large medical practice. An employee who worked as a physician's assistant for your company was fired
Criminal justice policy : KSUville's criminal justice policy expert, Otto Delupe, has appointed you and your colleague to the local sentencing committee.
Between economic realities test and right to control test : Do you believe one is a more accurate indicator of whether someone is an independent contractor versus an employee? Explain.
Address the vulnerability could lead to a data breach : What Sarah should do - Address the vulnerability could lead to a data breach, compromising the privacy and security of the companys customers
Represent Gwen Eldridge in case of Eldridge v. Eldridge : We represent Gwen Eldridge in case of Eldridge v. Eldridge. The Eldridges were divorced in 2010. Mrs. Eldridge was awarded custody of their two minor children
LOAC obligations of intervening military forces : Should a humanitarian jus ad bellum justification for the use of force affect the LOAC obligations of intervening military forces?
What are difference between advocacy and scientific theories : What are the differences between advocacy and scientific theories? What are the different conceptualization of media influence?
Contrast digital evidence and non-digital evidence : Compare and contrast digital evidence and non-digital evidence. How the Plain View Doctrine and Exigent Circumstances may apply to digital evidence.

Reviews

Write a Review

Other Subject Questions & Answers

  What are the privacy requirements under HIPAA

What are the privacy requirements under HIPAA? Explain why confidentiality of health information has been a controversial public policy issue. Give a real world example. How can health information be better protected?

  Define basic concepts used in the discipline of sociology

Define the basic concepts used in the discipline of sociology and define the various methodologies for sociological research.

  Discuss the treatment options for this patient

Ms. Y is a 31-year-old woman who reported to her physician that she has recently lost weight, always seems tired, and has experienced night sweats

  Describe the tone of the essay portion of the poem

Describe the tone of the essay portion of the poem. What is the main point the narrator is trying to express

  Illustrate the steps in the decision-making process

Illustrate the steps in the decision-making process for an officer in determining whether probable cause or reasonable suspicion exists

  Draft of all items and questionnaires

you will submit a draft of all items and questionnaires that will be given to your participants in your study.

  Communication differences and strategies

Write a 2,000- to 2,450-word paper in which you consider specific types of communication, common miscommunications among genders, and effective communication strategies. Address the following questions:

  Explain why your question is an important area

Compose defense paragraph, explain why your question is an important area for Sociological research, how it will add to current knowledge

  Why will this algorithm favor io-bound processes

Suppose that a process scheduling algorithm favors those processes that have used the least processor time in the recent past. Why will this algorithm favor /IO-bound processes, but not starve CPU-bound processes

  Define the communication style in relationship

How would you define the communication style in your relationship with your parents? Your siblings? Your friends? Your significant other?

  How the organization in the video or article demonstrates

Explain how the organization in the video or article demonstrates corporate social responsibility. Explain HR's role in formulating corporate values.

  Summarize the literature supporting proposed change

Summarize the literature supporting proposed change. Identify an action plan to introduce change and potential barriers to implementing change.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd