Ethical behaviour in accordance with professional codes

Assignment Help Computer Networking
Reference no: EM131613837

Ethical issues for IT security personnel

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.
- Discuss ethical and social issues pertaining to IT systems-administration.
- Interpret professional codes of ethics developed by various industry bodies.
- Discuss ethical behaviour in accordance with professional codes.
- Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.Assignment Description

Debra Shinder writes, "In fact, many IT pros don't even realize that their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions [1]." Debra poses the following ethical scenarios.


0) IT and security consultants who do work for multiple companies have even more ethical issues to deal with. If you learn things about one of your clients that might affect your other client(s), where does your loyalty lie? Should you use the information gained from Client-A for the benefit of the other client, Client-B?

1) Then there are money issues. The proliferation of network attacks, hacks, viruses and other threats to their IT infrastructures have caused many companies to "be afraid, be very afraid." As a security consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services, or is it a case of "whatever the market will bear?"

2) Is it wrong for you to mark up the equipment and software that you get for the customer when you pass the cost through? What about kickbacks from equipment manufacturers? Is it wrong to accept "commissions" from them for persuading your clients to go with their products? Or what if the connection is more subtle? Is it wrong to steer your clients toward the products of companies in which you hold stock?

3) Another ethical issue involves promising more than you can deliver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client's network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or switching to an open source operating system - which changes, coincidentally, will result in many more billable hours for you - on the premise that this is the answer to their security problems?

4) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Should you "eat" the cost and install the extra security measures at no cost to the client? Should you refuse to do the job?

Investigate and reflect upon one of the above scenarios using Ethical Guidelines published by organisations such as: EA, ACS, ACM and IEEE.

Students with ID ending with 0 or 5, answer scenario number 0 Students with ID ending with 1 or 6, answer scenario number 1 Students with ID ending with 2 or 7, answer scenario number 2 Students with ID ending with 3 or 8, answer scenario number 3 Students with ID ending with 4 or 9, answer scenario number 4

Verified Expert

The present solution is based on concept of security system within IT professionals. The solution, is based on given instruction and ethical issues as provided by client. In total the solution comprises of more than 800 words and is framed according to given instructions. The solution is free from any form of plagiarism and is prepared in Microsoft Office. All the references are given in IEEE format.

Reference no: EM131613837

Questions Cloud

Discuss the constitution bill of right were malice : BI have been hiding information for the reason their action of getting information is illegal and the use of the Constitution Bill of Right were malice
Compute the present value of smyth industries profits : Ignoring antitrust concerns, compute the present value of Smyth Industries' profits, if it could have remained a monopoly when the interest rate was 0.08.
Compute the amount that diaz company : Shipping, FOB Shipping Point, $240, prepaid by seller, Compute the amount that Diaz Company has to pay to the seller for the goods
What role will they play in managing personnel and resources : What are the responsibilities and expertise of each manager? What role will they play in managing personnel and resources?
Ethical behaviour in accordance with professional codes : Identify potential ethical and social issues related to IT administration ethics and discuss ethical and social issues pertaining to IT systems-administration.
What databases did you explore : What databases did you explore?Based on your PICOT question, what is the database that you have selected to use?
Explain the differences between patents : Explain the differences between Patents, Copyrights, and Trademarks in terms of idea, expression, and symbol.
Discuss the levels of prevention : Create three scenarios where you would apply each of the three the levels of prevention.
What is the amount of stockholders equity : Lohman's net income for 2017 is $ 300,000. What is the amount of stockholder's equity at December 31, 2017

Reviews

inf1613837

9/19/2017 6:05:51 AM

Before starting the task please keep note of student id, expert has to select topic based on student id. Thank you so much. Really appreciating your work . Best service.

len1613837

8/25/2017 5:24:44 AM

Marking criteria: You must use the following aspects as headings for your answer. Marks are allocated as follows: Aspects Description of the section Marks Introduction Introduce the ethical issues in 3-5 sentences 10 Identification Identify at least 2 important ethical issues 20 Analyse Analyse the above identified issues 20 Evaluate/justification Evaluate the issues and write justification of your evaluation 20 Conclusion Write clear conclusion in 2-3 sentences 20 Reference style Follow APA or IEEE reference style 10 Total 100

len1613837

8/25/2017 5:24:28 AM

Analyse Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Evaluate/justific ation Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort Good effort made but not outstanding Made some effort. For example, Web searches only Very little attempt to reference. Lazy effort with inaccuracies Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1613837

8/25/2017 5:24:22 AM

Marking Rubric for Assignment-1:Total Marks 50 Grade Mark HD 80-100% DI 70-79% CR 60-69% P 50-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrat ed excellent ability to think critically but did not source reference material appropriatel y Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd