Network management in organisations

Assignment Help Computer Networking
Reference no: EM131612657 , Length: 850 Words

Assessment - Ethical issues for IT security personnel

Purpose of the assessment

The purpose of this assignment is to develop skills in research, critical analysis an academic writing of high standard. In this assignment students will:

- Identify potential ethical and social issues related to IT administration ethics.
- Discuss ethical and social issues pertaining to IT systems-administration.
- Interpret professional codes of ethics developed by various industry bodies.
- Discuss ethical behaviour in accordance with professional codes.
- Explain ethical solutions to ensure that the society benefits.

Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.

Assignment Description

Debra Shinder writes, "In fact, many IT pros don't even realize that their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions [1]." Debra poses the following ethical scenarios.

0) IT and security consultants who do work for multiple companies have even more ethical issues to deal with. If you learn things about one of your clients that might affect your other client(s), where does your loyalty lie? Should you use the information gained from Client-A for the benefit of the other client, Client-B?

1) Then there are money issues. The proliferation of network attacks, hacks, viruses and other threats to their IT infrastructures have caused many companies to "be afraid, be very afraid." As a security consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services, or is it a case of "whatever the market will bear?"

2) Is it wrong for you to mark up the equipment and software that you get for the customer when you pass the cost through? What about kickbacks from equipment manufacturers? Is it wrong to accept "commissions" from them for persuading your clients to go with their products? Or what if the connection is more subtle? Is it wrong to steer your clients toward the products of companies in which you hold stock?

3) Another ethical issue involves promising more than you can deliver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client's network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or switching to an open source operating system - which changes, coincidentally, will result in many more billable hours for you - on the premise that this is the answer to their security problems?

4) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Should you "eat" the cost and install the extra security measures at no cost to the client? Should you refuse to do the job?

Reference no: EM131612657

Questions Cloud

Prepare a three page paper on assigned environmental factor : Prepare a three page paper on the assigned environmental factor with 5 power point slides. Discuss the environmental health challenges now and in the future.
Description of the product or service : Consider the organization requiring outsourcing that you selected for your final project. For your initial post, provide the following:
Discuss the interview in an organized paper : Discuss the interview in an organized paper, supporting your analysis of the interview with the text, lectures, and appropriate other resources.
What is the long-term equilibrium population of carp in lake : Under a plan to join the lake to a nearby river, the fish will be able to leave the lake. A net loss of 10% of the carp each year is predicted.
Network management in organisations : Network Management in Organisations - develop skills in research, critical analysis an academic writing of high standard. In this assignment students
Creative environment at vibram in spite of counterfeiters : Some Virbram employees might be discouraged by counterfeiters, feeling that the innovations they worked hard to create are being stolen too quickly.
Is there a stable value of the population : On the slope field for dP/dt = 3P - 3P2 in Figure, sketch three solution curves showing different types of behavior for the population, P.
Discuss similarity and difference that rowlandson describes : Discuss one similarity and one difference that Rowlandson describes. What is her attitude toward these differences?
What are the salary ranges of these careers : What career opportunities are available for individuals who obtain a degree in criminal justice

Reviews

len1612657

8/24/2017 7:39:39 AM

Identification      Demonstrated    excellent ability to  think critically and  sourced reference  material  appropriately  Demonstrat ed  excellent  ability to  think  critically but  did not  source  reference  material  appropriatel y  Demonstrated    ability to think  critically and  sourced  reference  material  appropriately  Demonstrated    ability to think  critically and did  not source  reference  material  appropriately  Did not  demonstrate  ability to think  critically and  did not source  reference  material  appropriately  Analyse      Logic is clear and  easy to follow with  strong arguments  Consistency  logical and  convincing  Mostly  consistent  logical and  convincing  Adequate  cohesion and  conviction  Argument is  confused and  disjointed  Evaluate/justific ation        Excellent use of  creditable sources.  Accurate  referencing.   Obvious that  outstanding effort  made  Extremely  good effort  Good effort  made but not  outstanding  Made some  effort.  For  example, Web  searches only  Very little  attempt to  reference. Lazy  effort with  inaccuracies 

len1612657

8/24/2017 7:39:30 AM

Aspects Description of the section Marks Introduction Introduce the ethical issues in 3-5 sentences 10 Identification Identify at least 2 important ethical issues 20 Analyse Analyse the above identified issues 20 Evaluate/justification Evaluate the issues and write justification of your evaluation 20 Conclusion Write clear conclusion in 2-3 sentences 20 Reference style Follow APA or IEEE reference style 10 Total 100 Marking Rubric for Assignment-1:Total Marks 50    Grade  Mark  HD  80-100%  DI 70-79%  CR 60-69%  P 50-59%  Fail  <50%   Excellent Very Good Good Satisfactory Unsatisfactory Introduction      All topics are  pertinent and  covered in depth.   Ability to think  critically and  source material is  demonstrated  Topics are  relevant and  soundly  analysed.  Generally  relevant and  analysed.  Some relevance  and briefly  presented.  This is not  relevant to the  assignment  topic. 

len1612657

8/24/2017 7:39:12 AM

Marking criteria: You must use the following aspects as headings for your answer. Marks are allocated as follows: You must use the following aspects as headings for your answer. Marks are allocated as follows:

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd