Potential legal and ethical implications

Assignment Help Computer Network Security
Reference no: EM132847341 , Length: word count:2000

ITC568 Cloud Privacy and Security - Charles Sturt University

Learning outcome 1: be able to examine the legal, business and privacy requirements for a cloud deployment model;

Learning outcome 2: be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud;

Assessment item 1 - Privacy and Security Ethical Assessment

This assignment is designed to get you to reflect on your personal approach and feelings on information security and privacy.

Task:

A State Government has decided to implement their own Automated Facial Recognition Authentication (AFRA) system to enhance user authentication and identification for access to various state-level services. Initially, these services are to include application for, and renewal of, vehicle, boat and firearms licences. The government has said that these services will use AFRA as a trial to assess the benefits and savings before considering a wider roll-out to other services.

The State Police Service have indicated that they would like to see a roll-out of AFRA into the streets of all major cities in the state. They believe that AFRA would enable the Police to quickly identify criminals and other "persons of interest".

You have been asked to prepare a paper that considers the possible risks, benefits and ethical implications of the proposed uses of the AFRA system.

Your report should cover the following:

1. Discuss the possible risks and benefits that could be realised from the use of the AFRA system to identify individual users who wish to apply for or renew a licence.

2. Discuss the ethical implications for an individual's privacy from their use of AFRA to apply for or renew a licence.

3. Discuss the possible risk, benefits and ethical implications of the State Police's proposed use of AFRA.

4. What do you see as the potential legal and ethical implications (particularly with regard to the Privacy Act) of introducing AFRA, firstly for user access to state services and secondly for use on the streets of major cities?

As a guide, your word limit for this assignment should be around 2,000 words. Referencing using the APA 7th edition format is required.

Attachment:- Cloud Privacy and Security.rar

Reference no: EM132847341

Questions Cloud

Awareness of management theories-practice of management : Discuss how an awareness of management theories can influence the practice of management.
Explain learning theory and complexity theory : What benefits do management theories offer when implemented by managers? Especially learning theory and complexity theory please
Make strategic offensive attacks : Describe a scenario where TWO companies chose to make strategic offensive attacks using one of the seven offensive strategic options?
List four workplace documents workers : List four workplace documents workers can read to find out more about their role and explain the purpose of each document.
Potential legal and ethical implications : Discuss the possible risks and benefits that could be realised from the use of the AFRA system to identify individual users who wish to apply for or renew
Identify the diverse needs of colleagues in the workplace : How do you use practices that acknowledge and accept differences and accurately identify the diverse needs of colleagues in the workplace?
Outline five key motives for attending a community festival : Outline five key motives for attending a community festival. Why should event managers focus on these motives, rather than the motives of the festival organiser
Discuss the customer relationship management concept : Discuss the Customer Relationship Management concept used in this case also explain how customer profit chain can be beneficial to SAMSUNG.
How do you meet people who are different from you : How do you meet people who are different from you? What are the greatest obstacles in starting a conversation with someone who is culturally different from your

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the strengths of a firewall at the network perimeter

Explain the strengths and weaknesses of a firewall at the network perimeter and a network perimeter firewall and firewalls on every end host machine.

  Threats to a company intellectual property

After looking at your network security, structure there are three specific threats that we will focus on that could have a Hugh impact on your business intellectual property and integrity.

  Identify threats to private and public organizations

Define "cyber security," and identify threats to private and public organizations. Identify the pillars of personal security that assist in personal protection.

  Why do these economic measures help

How to make economic mechanisms that help improve information security and management?

  Examine the contents of the security and privacy tabs

Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

  Find out severe distributed denial of service attack

CP5603 - Advanced E-Security - How does someone apply for a digital certificate from this company? Do they ask for a driver's licence

  What are some weaknesses of a packet filtering firewall

What information is used by a typical packet filtering firewall? What are some weaknesses of a packet filtering firewall?

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  What type of access controls are probably configured

If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?

  Discuss the challenges that incident handlers face

Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.

  Develop the issp for the organisation

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation

  What are possible consequences of buffer overflow occurring

What are the possible consequences of a buffer overflow occurring? What are two key elements that must be identified in order to implement a buffer overflow?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd