Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

MELBOURNE School of Information Technology and Engineering SITE) Assessment Deta

ID: 3868012 • Letter: M

Question

MELBOURNE School of Information Technology and Engineering SITE) Assessment Details and Submission Guidelines Unit Code MN501 Unit Title Network Management in Organisations Term-2, 2017 Term, Year Assessment Assignment-1 Type Assessment Title Ethical issues for IT security personnel Purpose of the The purpose of this assignment is to develop skills in research, critical analysis and assessment academic writing of high standard. In this assignment students will (with ULO Mapping) .Identify potential ethical and social issues related to IT administration ethics. .Discuss ethical and social issues pertaining to IT systems-administration Interpret professional codes of ethics developed by various industry bodies. . Discuss ethical behaviour in accordance with professional codes . Explain ethical solutions to ensure that the society benefits Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment. 10% Weight Total Marks100 Word limit Due Date 500 1000 Week-7 Thursday 5.00 PM. All work must be submitted on Moodle by the due date along with a completed Submission Guidelines Assignment Cover Page The assignment must be in MS Word format, 1.5 spacing. 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings Reference sources must be cited in the text of the report, and listed a r at the end in a reference list using IEEE referencing style ppropriately . If an extension of time to submit work is required, a Special Consideration Melbourne on Level 6 or in Sydney on Level 7. You must submit this application Extension must be submitted directly to the School's Administration Officer, in three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu au/about mit/institute.oublications/policies srosedures and .Academic Misconduct is a serious offence. Depending on the seriousness of the Misconduct s can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at http://www.mit.edu.au/about Academic-Misto the Academic Integrity Section in your Unit Description. For further information, please refer to Prepared by:. Asoc. Prof, Nalin Shards Moderated by: Dr, Imran Jokhio Jay, 2017

Explanation / Answer


Ethical Issues Introduction
* Secondary data vary in terms of the amount of identifying information in it. If the data has no identifying information or is completely devoid of such information or is appropriately coded so that the researcher does not have access to the codes, then it does not require a full review by the ethical board, then board just needs to confirm that the data is actually anonymous and company shouldnt charge for it.
* Installation of new applications and technologies are good when the old ones are not delivering and there is full assurance of zero risk for the new one, security is becoming a threat using the old technology. If no then it is just waste of funds of the organization.
* Opting to change the network securities and firewalls for own moneytary gain without looking at the company perspective.Things like this also breaches the trust and there is also a threat if the open source securities are not suitable as per the demands.

Identification and analyse of Issues
* Misleading organization for change for own gain financially.
- This is a total breach of conduct and trust with the organization who is opting for need and persuade them to go for total makeover at thier own cost for self benefit.This may result in loss of security if things do not fall in place. Even mislead of the organization may later be a concern if they file a suit or legal notice that concluded bt their audit.
* Manipulation of data and changing stable securities.
-There are also issues related to what the information you gather. Securities related to spying or hacking information should not be taken for granted for own financial gain as it may lead to leak of the information in public forum which may lead to loss of the organization. So even when you are opting for change in security of network or firewalls one must be checked that it doesnot breaches the security.

Evaluation and Justification
* Misleading organization for change for own gain financially.
- Thnigs that must be required should need to be charged.
* Manipulation of data and changing stable securities.
- Installation should be done if genuinely it is required or old technologies need to be updated only.Things must be configured in that way only.

Conclusion-
* The money issues.
- The proliferation of network attacks, hacks, viruses and other threats to their IT infrastructures have caused many companies to "be afraid, be very afraid." As a security consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services.
* Another ethical issue involves promising more than you can deliver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client's network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or switching to an open source operating system – which changes, coincidentally, will result in many more billable hours for you but the trust and goodwill be at stake.

As per my opinion IEEE style is good as it follows the international recomended abbreviations known to all hence helps everyone to undersatnd easily.

The general form for citing technical articles published in conference proceedings is to list the author/s and title of
the paper, followed by the name (and location, if given) of the conference publication in italics using these standard
abbreviations.