Reference no: EM132311938
Assignment
Note: This is a research-writing course. You need to develop each requirement in full paragraphs, not sentences. I need to see proof of understanding of each requirement. Some questions have multiple parts. Answer each within the same numbered question.
1. Fully explain each of the following: What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you been unable to use a site by experiencing a DoS attack or downloaded spyware or a Trojan horse? Have you fallen for a phishing scheme? What do you do to secure your information on the Internet?
2. How many passwords do you use? Why?
3. What are the pros and cons of symmetric versus asymmetric encryption algorithms? What issues must be considered when deciding what kind of encryption to use?
4. Imagine a networked embedded system attached to your air conditioning system. This system permits the power company to raise the thermostat, or cycle the system on and off when energy demands are high. If every household had such a device, what might be the ramifications of a cyber-attack?
5. Do you believe that "hackers" who do things like expose the identity of rapists are White hats or Black hats? Regardless of the law, do you feel they are being ethical? Are they being moral? Is it right for them to be sentenced to a longer jail term than the individuals they uncovered?
6. Use the ethical tools from the chapter to discuss the ramifications of electronic medical records. Suppose that there was a nationwide database of electronic medical records, with strong security to try to prevent unauthorized access. What would be the benefits and costs of such a system? Apply the "paramedic method" to analyze this subject.
7. Compare the different ethical approaches discussed in the chapter. How are they similar and how different? How might you choose the best approach for a given situation?
8. What efforts, if any, do you make to preserve your privacy online? Do you share images, videos, and postings publically, or do you limit access? Why have you made the decisions that you have about personal information online? What might you change in the future?
9. Discuss the propagation of fake news. What are some methods of combating it?
Note: Use this list as a completion checklist!
1. Submit the assignment in one Word document, size 12 point, font Arial, double space.
2. Comply with the number of pages listed.
3. Don't ZIP or PDF files. They will not be accepted!
4. Include a cover sheet and a reference page. The cover sheet is to include: your name, assignment number, course number, and the date.
5. Do Not include the assignment questions.
6. Number each answer to correspond to the answered question(s).
7. Include "all" references used to include the textbook on the last page of the assignment document.
8. DO NOT "Copy and Paste". Work that is not your own work constitutes plagiarism. You may quote sources but you must reference them properly and correctly. I need to evaluate your work, not others. Read the Academic Honesty & Plagiarism College policy. Your file will be checked by SafeAsign for traces of plagiarism.
9. Use correct grammar, spelling, and punctuation.
10. Submit each assignment via the Assignment Submission link one-time only.
11. DO NOT attach assignments to an email - they will not be graded!
12. Write, write and write. This is a writing course and you need to prove that you understood each requirement.
13. I will grade your assignment based on the above-listed requirements, and return them with comments. Don't lose points by not following the list of requirements.