Configure the network in a less secure manner

Assignment Help Computer Networking
Reference no: EM131601884

Assessment - Ethical issues for IT security personnel

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.
- Discuss ethical and social issues pertaining to IT systems-administration.
- Interpret professional codes of ethics developed by various industry bodies.
- Discuss ethical behaviour in accordance with professional codes.
- Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.Assignment Description

Debra Shinder writes, "In fact, many IT pros don't even realize that their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions [1]." Debra poses the following ethical scenarios.

0) IT and security consultants who do work for multiple companies have even more ethical issues to deal with. If you learn things about one of your clients that might affect your other client(s), where does your loyalty lie? Should you use the information gained from Client-A for the benefit of the other client, Client-B?

1) Then there are money issues. The proliferation of network attacks, hacks, viruses and other threats to their IT infrastructures have caused many companies to "be afraid, be very afraid." As a security consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services, or is it a case of "whatever the market will bear?"

2) Is it wrong for you to mark up the equipment and software that you get for the customer when you pass the cost through? What about kickbacks from equipment manufacturers? Is it wrong to accept "commissions" from them for persuading your clients to go with their products? Or what if the connection is more subtle? Is it wrong to steer your clients toward the products of companies in which you hold stock?

3) Another ethical issue involves promising more than you can deliver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client's network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or switching to an open source operating system - which changes, coincidentally, will result in many more billable hours for you - on the premise that this is the answer to their security problems?

4) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Should you "eat" the cost and install the extra security measures at no cost to the client? Should you refuse to do the job?

Investigate and reflect upon one of the above scenarios using Ethical Guidelines published by organisations such as: EA, ACS, ACM and IEEE.

Students with ID ending with 0 or 5, answer scenario number 0

Students with ID ending with 1 or 6, answer scenario number 1

Students with ID ending with 2 or 7, answer scenario number 2

Students with ID ending with 3 or 8, answer scenario number 3

Students with ID ending with 4 or 9, answer scenario number 4

Verified Expert

It infrastructure organization facing the ethical issues. So many organizations are afraid in hackers, attacks and threats. The security professionals identified the two ethical issues are Hacking and cyber terrorism. These are ethical issues are analysed and evaluated.

Reference no: EM131601884

Questions Cloud

Explain random walk and price patterns : Explain random walk and price patterns. Identify the foundations of technical analysis.
Cost-based and value-based pricing methodologies : Given the differentiation between Cost-based and Value-based pricing methodologies,
Discuss your opinion regarding why managed care organization : discuss your opinion regarding why managed care organizations did or did not have the intended effect
Review the case of the manufacturing plant : A manufacturing plant has reached full capacity. The company must build a second plant-either small or large at a nearby location.
Configure the network in a less secure manner : MN501 - The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard.
Writing an article for time magazine australia : Imagine that you work for Time Magazine Australia, and that the managing editor, Randall Lane, has asked you to write a story.
What is likely to be the price of the stock : This year, its earnings increased by 20 percent. If the P/E ratio remains constant, what is likely to be the price of the Stock?
How much of accounting department costs will be allocated : The costs will be allocated based on the number of employees using the direct method. How much of the accounting department costs will be allocated
What takes to be an effective leader : What takes to be an effective leader? What are some leadership must have abilities?

Reviews

inf1601884

9/26/2017 4:27:38 AM

I liked the topic you chosen in my assignment. Thanks for great efforts. I would like to get make my assignment from u in future. My friends are also going to approach you soon for their tasks. Thanks

len1601884

8/16/2017 2:07:45 AM

Analyse Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Evaluate/justific ation Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Good effort made but not outstanding Made some effort. For example, Web searches only Very little attempt to reference. Lazy effort with inaccuracies Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed

len1601884

8/16/2017 2:07:35 AM

Marking Rubric for Assignment-1:Total Marks 50 Grade Mark HD 80-100% DI 70-79% CR 60-69% P 50-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrat ed excellent ability to think critically but did not source reference material appropriatel y Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately

len1601884

8/16/2017 2:07:23 AM

You must use the following aspects as headings for your answer. Marks are allocated as follows: Aspects Description of the section Marks Introduction Introduce the ethical issues in 3-5 sentences 10 Identification Identify at least 2 important ethical issues 20 Analyse Analyse the above identified issues 20 Evaluate/justification Evaluate the issues and write justification of your evaluation 20 Conclusion Write clear conclusion in 2-3 sentences 20 Reference style Follow APA or IEEE reference style 10 Total 100

len1601884

8/16/2017 2:07:07 AM

• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len1601884

8/16/2017 2:06:55 AM

Hi , i have attached the file in which there is full information regarding the assignment. i hope to hear from you soon. The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will: • Identify potential ethical and social issues related to IT administration ethics. • Discuss ethical and social issues pertaining to IT systems-administration. • Interpret professional codes of ethics developed by various industry bodies. • Discuss ethical behaviour in accordance with professional codes. • Explain ethical solutions to ensure that the society benefits. Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd