Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Activity 1 TASK A : Discuss the following questions, identifying possible reason

ID: 3706182 • Letter: A

Question

Activity 1

TASK A:

Discuss the following questions, identifying possible reasons and motives for the users at both sides of the spectrum:

Discuss why users try to break into other user's computers and information systems

Discuss why users create viruses.

Discuss who owns electronic mail systems, and why they do

TASK B:

Answer the question posed in the Panama Papers Vignette - Was it wrong to hack and leak the Panama Papers?

What technology issues led to the security breach in the Panama Papers case. What is the possible business impact of this security breach for the law firm and its customers? What should the law firm do in the future to avoid similar incidents?

TASK C:

Discuss whether you believe the following are privacy issues:

Receiving an email from a friend which was forwarded from your friend's colleague, who had forwarded it to 12 other email addresses, where ALL of the email addresses are visible.

Using the technology of Caller ID to either screen callers or have persons know that you are calling.

The use of RFID (Radio Frequency Identification) Technology in products. You may first need to conduct basic research on RFID

TASK D:

Refer to the Vignette Apple vs. the FBI. Divide the group in two. One side will argue the case for FBI the other side will argue the case for Apple. Make one original post, ask one question and respond to one question. Was it right/wrong to break the iPhone, and what are the security and privacy issues?

TASK E:

What is the difference between a business continuity plan and a disaster recovery plan?

Explanation / Answer

Discuss why users try to break into other user's computers and information systems

Answer:

When someone hacks a computer or networksystem, it's typically for main reasons:

Hacking for fun

Some hackers make attempts on computers, servers or network systems just for the personal gratification. Others may feel that they need to prove something to their peers or friends, and hack something only for the challenge.

Hacking to steal

Another reason to hack a system is to steal information or money. A large portion of hacking attempts fall into this category. Banks and large companies are common targets for hacking jobs, but sometimes smaller companies or even a specific person's computer are targeted, as well.

Hacking to disrupt

There are also some hackers, including hacking groups; that target a company to disrupt business, create chaos and just be a nuisance. These groups often be trying to make a statement with their hacking, demonstrate security inadequacies, or to show general disapproval for the business itself. Examples of hacking groups that made headlines are Anonymous and LulzSec

To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses. What damage can a hacker do? This depends upon what backdoor program are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!

Discuss why users create viruses.

Answer:

There are three primary reasons why they create them:

Making money

Lots of viruses, malware, and spyware found on computers do not harm the computer all that much, other than slow it down. This malware is designed to capture information about the computer user and send it to the person or company responsible for making the malware. The information they collect is then used to target advertisements to your computer that you may be interested in viewing. These ads come in the form of e-mails and pop-ups on your computer.

If enough computers get infected, they can earn money from all the ads displayed. The more ads they send out, the more chances they have of getting people to buy something or visit the advertiser. Sometimes, all it takes is one virus or malware program to generate hundreds, or even thousands, of ads on your computer.

Stealing account information

Online games and virtual goods have real life value attached to them and malware is created to steal online account information associated with online games. Using this type of malware, a person could gain access to a victim's account and steal their virtual goods and currency. They could even sell their ill-gotten virtual goods to other players for real money.

Causing problems and trouble

On the other side of the spectrum, there are those people that create viruses and malware because they can. They enjoy causing trouble, seeing computer users get annoyed and have to fix their computer. Some malware can crash an entire network system and cause system outages for large companies, like banks or production companies.

What is the difference between a business continuity plan and a disaster recovery plan?

Answer:

business continuity plan:

A business continuity plan (BCP) is a plan to help ensure that business processes can continue during a time of emergency or disaster. Such emergencies or disasters might include a fire or any other case where business is not able to occur under normal conditions. Businesses need to look at all such potential threats and devise BCPs to ensure continued operations should the threat become a reality.

A business continuity plan involves the following:

disaster recovery plan:

A Disaster Recovery Plan (DRP) is a business plan that describes how work can be resumed quickly and effectively after a disaster. Disaster recovery planning is just part of business continuity planning and applied to aspects of an organization that rely on an IT infrastructure to function.

The overall idea is to develop a plan that will allow the IT department to recover enough data and system functionality to allow a business or organization to operate - even possibly at a minimal level.

The creation of a DRP begins with a DRP proposal to achieve upper level management support. Then a business impact analysis (BIA) is needed to determine which business functions are the most critical and the requirements to get the IT components of those functions operational again after a disaster, either on-site or off-site.

Differences:

The disaster recovery plan is created to ensure a business and more specifically their technology department can recover quickly and efficiently. Prior to developing data recovery plan, it is critical that a risk assessment and business impact analysis is carried out. These two prior phases will clearly highlight where a potentially disastrous event may occur, and establish important factors such as the time frame and recovery order in which the business needs to re-establish their systems quickly.

Business Continuity Plan

The term Business Continuity Planning (BCP) is best described as the processes and procedures that are carried out by an organization to ensure that essential business functions continue to operate during and after a disaster. By having a BCP, organizations seek to protect their mission critical services and give themselves their best chance of survival. This type of planning enables them to re-establish services to a fully functional level as quickly and smoothly as possible. Business continuity plan generally cover most or all of an organization’s critical business processes and operation

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote