1. Research the practice of key logging. Describe what it is, and explain why so
ID: 3703529 • Letter: 1
Question
1. Research the practice of key logging. Describe what it is, and explain why some people defend the practice and while others do not. Finally, give your own opinion and defend it 2. With identity theft becoming widespread, many organizations have moved to secure the social security numbers of their customers, suppliers, and employees Imagine that you are the system administrator for a college campus where the students' Social Security numbers are used as the key field to access student records. Describe the steps you would follow to change the system. Make sure your solution also removes the student SSN on transcripts, course registration forms, student-accessible data screens, ID cards, health center records, and other record-keeping systems. Finally, identify which individuals on campus would retain access to the SSN and explain whyExplanation / Answer
Answer1:
Key-logging is one of the practices with both pros and cons depending on who you talk to. While the origanization and administrators claim they want to secure their systems and terminals and have control over what the users are using their systems and nodes for, the same cannot be said about what the users themselves think about key logging.
Key logging basically means keeping a track of what is being typed by the users on their nodes or terminals or systems. It could be their emails, or chat transcripts, any internet browsing activity or even banking transactions. The system and network administrators exercise their power (or one can also say abuse their powers) to install key loggers on the pretext that they want to know and catch the users from performing any illegal acitivy on their systems like harassing others, infiringing copyrights, accessing illegal websites. It is done as a parental control to catch and warn or even terminate their user contracts and agreements should there be any such instances.
On the other hand, it is easy to capture user passwords, IDs, SSNs, credit-card numbers, security keys, communication messages, and it encompassed almost anything that is typed using the keyboard. Most of these records are analyzed using some filters or scripts, and sometime also manually. It is dangerous to have this level to access to be granted to anyone in the organization until there is 100% trust. As the information is usually kept stored for historial reasons, any access to this data even several months or years in the future can compromise user security, privacy and even financial life.
Answer2:
The main thing that we need to do is create MAPPING beteween student SSNs and the Student Roll Numbers or Registration Numbers. Once the student has registered with his/her SSN, they are granted a unique ID which can be a roll or registration number. This unique number acts as a handle to featch any user information from a secure database. This secure database internally can have the user address details, their SSN, past history, course subscriptions etc. However, any transcripts or other reports, just use the Roll numbers to identify the student uniquely.
The access to this secure database is not required by anyone except for the secure accounts teams or the staff that require the personal history for some reason. All the college and school staff can have a point-of-contact should they require such student personal or secure information with proper reasoning as well as log entry that an access request was made by someone.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.