Describe key ethical concerns raised by carol actions

Assignment Help Computer Engineering
Reference no: EM131202755 , Length: word count:2000

Research Report Assignment -

Task 1 - Research and write a critical analysis of the following SAP System Security Parameters

Task 1.1: Discuss what is a transaction code and its main purpose in the SAP R/3 System. Research the following related SAP Transaction Codes SM19 and SM20 and explain how you would use these two related SAP Transaction codes to under- take a security audit of an organisation's SAP R/3 System (About 500 words)

Task 1.2.1: Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users. (About 500 words)

Task 1.2.2: As it is not possible to delete the SAP* user account describe two suggested controls to secure this account from misuse. (About 250 words)

Task 2 - Ethical Behaviour for an Information Security Professional

Review the Wikipedia Link for Professional Ethics (https://en.wikipedia.org/wiki/Professional_ethics) and ACS Code of Professional Practice and provided with the Assignment 3 and consider the following two case studies as an Information Security Professional:

Task 2.1: Security hole in Distributed Record Management System used by Company X and Company Y - Summary of case 

Company X has just signed a business agreement with Company Y, which entitles both of them to access each other clients' records. Faisal, a software programmer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company's database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated.

Several weeks later and during a normal test on the software developed, Faisal discovered a serious 'security hole' in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in Company Y's database system could not be trusted as the security hole posed a threat even on Company X's database system. Faisal told his manager about the problem and explained its significance. The manager's response was, "That's not our problem; let's just be sure that our software functions properly." Faisal is not sure what to do. Refusing to work on the project means disobeying his manager's orders. Continuing to work on the project, means disobeying one of God's commands, which requires him to be truthful and sincere in his dealings.

Task 2.1.1: Identify and describe the key ethical concerns raised in this case study? (About 250 words)

Task 2.1.2: Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Faisal in a recent distributed Records Management system project (About 250 words).

Task 2.2: Carol  Fraudulent Member of ACS Branch Summary of case 

Carol is a popular person who has worked hard in the ICT industry. She is currently a team leader of a group of software developers in a large company providing outsourced services to the Federal government. She is a Member of the ACS and decides to contribute to her profession by playing an active role in the local branch of the Society, and is elected Treasurer. Carol has some financial problems, and forges signatures on cheques to embezzle $5,000 from the branch's reserves to pay for medical treatment for her child. When she is inevitably found out she returns the money, and her membership of the ACS is terminated, but she continues in her job. Several members of her team are also ACS members. How should they treat their team leader?

Task 2.2.1: Identify and describe key ethical concerns raised by Carol's actions outlined in this case study?  (About 250 words)

Task 2.2.2: Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to deal with key ethical concerns raised by Carol's actions in this case study (About 250 words)

Task 3 - Research the following advanced network attack type - the Advanced Persistent Attack 

Research the concept of an advanced network attack known as an Advanced Persistent Attack (https://www.symantec.com/theme.jsp?themeid=apt-infographic-1). Explain what is meant by the concept of an Advanced Persistent Attack and describe the steps, resources and activities that would need to be under-taken by a hacker to mount such as attack on an organisation and the possible consequences for an organisation if compromised by an Advanced Persistent Attack (About 500 words).

Attachment:- Assignment.rar

Reference no: EM131202755

Questions Cloud

Two stakeholder are aspca and chinas yulin dog meat festival : Analyze two stakeholders with seemingly incompatible goals regarding the issue or topic - provide background on the stakeholders .
Calculate the maximum number of pixels per frame : If there are 16 shades of gray per pixel, 500 pixels per line, 525 lines per frame, and 30 frames per second in a TV set, calculate the maximum number of pixels per frame and calculate the maximum information rate in Mbits per second in the TV dis..
Evaluate freds net capital gain for the current year : HI6028 Taxation, Theory, Practice & Law - Calculate Freds net capital gain for the current year. Assume he also has a net capital loss from last year of $10,000 arising from the sale of shares.
What strategies would you employ for this activity : Describe one mentoring activity you might complete with a mentor that would help you to acclimate to your new advance practice role. Should this activity be structured or unstructured?
Describe key ethical concerns raised by carol actions : CIS52005 Research Report Assignment. Identify and describe key ethical concerns raised by Carol's actions outlined in this case study? Identify and describe how specific values of ACS Code of Professional Practice would provide guidance on how to de..
What action can nurses do to shape the future of nursing : Identify the definition of the concept/circumstance studied in the research article. Identify the setting in which the concept/circumstance was studied. Describe the study findings related to the concept/circumstance.
Answer the questions from case poverty in america : Does the existence of poverty imply that our socioeconomic system is unjust? - Does the concentration of poverty in certain groups make it more unjust than it would be otherwise?
What positive aspects of current u.s. health care system : What are the positive aspects of the current U.S. health care system? Negative aspects? Use APA form and style. The essay should be between 700 and 1000 words (not including the reference list). This assignment should go in your portfolio.
Discuss how the group uses social influence : As you watched the news story, you may wonder why that person would conform to the strict requests made by the group, cult, or gang. For example, a cult in 1997 called Heavena?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the different kinds of storage devices

Discuss the different kinds of storage devices that you have used or that are available in the market.

  What type of optimum solution would the model yield

For the diet model, what type of optimum solution would the model yield if the feed mix should not exceed 800 lb a day?

  Pros and cons of chen and crow''s feet notations

What are the pros and cons of Chen and Crow's feet notations.

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  What are the boundary conditions for this system

E19: Numerical Methods for Engineering Applications Spring 2016 - HOMEWORK 12. Based upon the code, what are the boundary conditions for this system? What temperature are we assuming (either implicitly or explicitly) lies along the border of the pl..

  Describe what a relational database is and why relational

you are the trainer for a major technology firm. one of the problems your firm has is hiring new technologists who have

  Include how the information is laid out and what security

write a 2- to 3-page paper describing your companys intranet.include how the information is laid out and what security

  Computer architectureinput devicesnbspwrite a two to three

computer architectureinput devicesnbspwrite a two to three 2 page paper in which youcompare how the gestures data is

  How do results of parsing the following two sentences differ

Create a table named Inventory using the instructions and create a one-to-many relationship between SALES_REP and INVENTORY.

  What is the difference between a policy and a procedure

What is the difference between a policy and a procedure. How do regulations affect network policies

  How do we integrate privacy and security into cps design

How do we design CPS to be safe, secure, and resilient in a variety of unanticipated and rapidly evolving environments and disturbances? How do we integrate privacy and security into CPS design?

  Find the 2''s complement of a binary number

Make a circuit which gives the absolute value of a 4-bit binary number. Use four full adders, four multiplexers, and four inverters.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd