Ethical issues for it security personnel

Assignment Help Computer Networking
Reference no: EM131479727

Assessment - Ethical issues for IT security personnel

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.

- Discuss ethical and social issues pertaining to IT systems'-` administration.

- Interpret professional codes of ethics developed by various industry bodies.

- Discuss ethical behaviour in accordance with professional codes.

- Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.Assignment Description

Debra Shinder writes, "IT security personnel often have access to confidential data and knowledge about individuals' and companies' networks and systems that give them a great deal of power. That power can be abused, either deliberately or inadvertently."

Investigate, reflect upon and answer the following questions using Ethical Guidelines published by organisations such as: EA, ACS, ACM and IEEE.

1) Should you read the private e-mails of your network users just because you can? Is it OK to read employees' e-mail as a security measure to ensure that sensitive company information isn't being disclosed? Is it OK to read employees' e-mail to ensure that company rules (for instance, against personal use of the e-mail system) aren't being violated? If you do read employees' e-mail, should you disclose that policy to them? Before or after the fact?

2) Is it OK to monitor the Web sites visited by your network users? Should you routinely keep logs of visited sites? Is it negligent to not monitor such Internet usage, to prevent the possibility of pornography in the workplace that could create a hostile work environment?

3) Is it OK to place key loggers on machines on the network to capture everything the user types? What about screen capture programs so you can see everything that's displayed? Should users be informed that they're being watched in this way?

4) Is it OK to read the documents and look at the graphics files that are stored on users' computers or in their directories on the file server?

5) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner?

Reference no: EM131479727

Questions Cloud

Identify an operational activity within your organization : Identify an operational activity within your organization, or an organization with which you are familiar.
About the internal analysis of an organization : Describe what you think about the internal analysis of an organization.
Paper about psychological empowerment : Write a 6 page paper about psychological empowerment (empowerment in general) and how it is relevant to the workplace.
What happens to the us trade pattern three years after nafta : Suppose that before NAFTA, the United States had a 20% tariff on imported semiconductors. Which country supplied the U.S. market? Is it the lowest-cost producer
Ethical issues for it security personnel : What about screen capture programs so you can see everything thats displayed? Should users be informed that theyre being watched in this way
What approaches to resolving this conflict are appropriate : You work part-time at the customer service desk at a home improvement store in your suburban town. What approaches to resolving this conflict are appropriate?
A weapon of mass destruction : Response plans should address these components. Health response requires cooperation with all state and local health agencies including private health care.
Paper about psychological empowerment : Write a 6 page paper about psychological empowerment (empowerment in general) and how it is relevant to the workplace.
Write a cpp program to implement a queue using linked lists : Write a C++ program to implement a queue using linked lists. The program should provide the following functionality: Print the number of elements in the queue.

Reviews

len1479727

5/1/2017 2:11:54 AM

Grade Mark HD 80-100% Excellent Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Analyse Logic is clear and easy to follow with strong arguments Evaluate/justific ation Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Conclusion Logic is clear and easy to follow with strong arguments Reference style Clear styles with excellent source of references.

len1479727

5/1/2017 2:11:47 AM

Introduction Introduce the ethical issues in 2-3 sentences 1 Identification Identify 2 important issues 2 Analyse Analyse above identified issues 2 Evaluate/justification Evaluate the issues and write justification of your evaluation 2 Conclusion Write clear conclusion in 1-2 sentences 2 Reference style Follow IEEE reference style 1

len1479727

5/1/2017 2:11:38 AM

please make the diagram on netsim software and use the IEEE reference style and in assignment 1 make the assignment as a question answer format including that detail that are given in format in which marks are given to each question.• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd