How can we monitor our network effectively

Assignment Help Computer Network Security
Reference no: EM133076377

Learning Activity: ACS Code of Conduct

Based on the work of Vallor & Rewak (2018, p. 17):

Vallor, S., & Rewak, W. J. (2018). An Introduction to Cybersecurity Ethics

Ethical challenges in network monitoring and user privacy:

Question 1: How can we monitor our network effectively without ourselves making unjustifiable intrusions upon users and their privacy?

Question 2: Should users of the network have their emails read, or their keystrokes logged, or their physical locations or website visits tracked? Or are these measures excessively intrusive and unjustifiable, all things considered?

Question 3: How should we monitor and control network activity on personal devices such as laptops and cell phones not owned by our organization and legitimately used for many other purposes, as opposed to devices that are the business property of the organization?

Question 4: To what extent should users of the network be made aware of our security monitoring activities?

Question 5: How does this change depending on who the users are (employees, customers, members of the general public, or clients bearing their own privacy duties to others, such as lawyers and health care professionals)?

These are some common ethical challenges in cybersecurity practices. While the challenges are expressed as questions think of them in the context of the ACS Code of Professional Conduct. Use this as a guideline for the best ethical practice. Write out your answer to at least two of these questions (ethical challenges). Justify your response by citing the principles in ACS Code of Professional Conduct.

Reference no: EM133076377

Questions Cloud

Explain the assumption of a growth rate : a. If the company requires a return of 11 percent on such undertakings, should the cemetery business be started?
Ability to control aggressive emotional reactions : a)My feelings of fear and sadness indicates that in a defensive situation I experience the more passive emotions of anxiety and hurt, you may feel deal with the
Compute the issue price on July : Thompson Corporation is planning to issue $250,000, five-year, 5 percent bonds. Compute the issue (sale) price on July 1, year 1
Calculate projected annual income shortfall : ?Anne-Marie and Yancy calculate their current living expenditures to be ?$53,000 a year. During retirement they plan to take one cruise a year that will cost ?$
How can we monitor our network effectively : How can we monitor our network effectively without ourselves making unjustifiable intrusions upon users and their privacy?
What is the gross earnings of an employee : What is the gross earnings of an employee if he worked for 46 hours in one week at P45 an hour. He is paid one and a half times regular rate for hours worked
What is the project discounted payback period : 1. In periods 0-4, a project has the following cash flows: -3,000, 1000, 1000, 2,186, 500. Its cost of capital is 10 percent. What is the project's DISCOUNTED p
Compute the net cash inflows using liquidity : Selling and Administrative Expenses P1,500,000; and Income tax of 40%. Compute the net cash inflows using liquidity and yield preference theories
Find floating-rate payment in the second year : You enter a two-year interest rate swap with annual payments and a notional principal of $100 million. At the time you enter the contract, the one-year spot rat

Reviews

Write a Review

Computer Network Security Questions & Answers

  Demonstrate the importance of ethics and integrity

Demonstrate the importance of ethics and integrity in the context of acquiring and analysing digital evidence, in contrast to traditional evidence

  Describe details regarding the impact of the attack

describe details regarding the impact of the attack to include financial losses, number of individuals affected, and effect on the reputation of organization.

  What do you know by performing cybersecurity risk assessment

CMP71001 - Cybersecurity - Southern Cross University - discuss why risk assessment is the most critical step in developing and managing cyber security

  Specify the vlan assignment

Specify the commands that you would use to set up the routers to use EIGRP. Outline the requirements to set up a VLAN and VPN access for the accountants. Specify the VLAN assignment, and incorporate a Spanning Tree protocol into your design to elimin..

  What would you do to practice the new skills and why

If you were Doug in the case above, what would you do to practice the new skills, and why? Any current topic or article related to penetration techniques.

  Describe the concept and function of electronic money

Identify potential solutions for these issues and evaluate their ability to protect both payers and receivers. You must remember this homework has to be plagiarism free thanks

  Develop a security plan for a threat detection system

Your task is to develop a Security Plan for a threat detection system employing relevant technologies. The Plan could be divided into the following sections: An overarching guideline.

  Examine file system image on virtual desktop infrastructure

Examine the file system image diskimage.dd on the Virtual Desktop Infrastructure (VDI) at Champlain to complete the Lab

  Discuss the advantages and disadvantages of star

Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type and explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model?

  Appraise network security issues and emerging technologies

Appraise network security issues and emerging technologies and Analyze emerging network technologies and their implementation

  What are the benefits or privacy issues

What are cookies and how do they work? What are the benefits/ privacy issues? Short answer (1 -2 paragraphs).

  Develop identity management and security awareness training

Develop the identity management and security awareness training plan strategy for Applied Predictive Technologies Company.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd