2019-01-25T09:41:51+00:00 Assignments

Code of Ethics If you were writing a code of ethics, what would be the most important practices to include in your company’s acceptable use policy, Internet use policy, or acceptable conduct policy? Question2

This paper concentrates on the primary theme of Code of Ethics If you were writing a code of ethics, what would be the most important practices to include in your company’s acceptable use policy, Internet use policy, or acceptable conduct policy? Question2 in which you have to explain and evaluate its intricate aspects in detail. In addition to this, this paper has been reviewed and purchased by most of the students hence; it has been rated 4.8 points on the scale of 5 points. Besides, the price of this paper starts from £ 40. For more details and full access to the paper, please refer to the site.

Assess ethical dilemmas that occur in organizations in the context of cybersecurity

Course Objective: Assess ethical dilemmas that occur in organizations in the context of cyber security and develop constructive resolutions based upon application of ethical theories, principles, and models.

The class discusses cyber ethics from both an employee’s and customer’s perspective. The readings below are included for direction/context purposes for those not familiar with the concepts and can be found on the Internet.

Question1.

Code of Ethics
If you were writing a code of ethics, what would be the most important practices to include in your company’s acceptable use policy, Internet use policy, or acceptable conduct policy?
Question2

Effect of Cultural Values
Identify examples of how cultural values affect moral legitimacy and cyber ethics norms. How can cultural values, traditions, religion, the desire for higher economic status, or poor local law enforcement possibly affect the ability to regulate copyright piracy or other illicit activity globally?
Background (available on the Web by title):
1. IP Commission Report on the Theft of American Intellectual Property [2013 – see esp. sections on China]
2. Cyber Espionage and the Theft of U.S. Intellectual Property and Technology [2013 – video / transcripts of Congressional hearing]

Question 3

Cyber Vigilantism and Pro-Active Defense
Cyber Vigilantism is a term that describes what may occur when an organization decides to hack back, or employ another company to launch a cyberattack against a suspected hacker that has disrupted their assets.  When this is done by an organization, it may be actions taken for revenge or to protect important assets against future cyberattacks by using a “Pro-Active Defense”.
Is this practice currently illegal, and what could be some possible consequences if an organization engages in cyber vigilantism?
What are other possible options for a “Pro-Active Defense”?
Background (available on the Web by title):
1. Hacking Back: Digital Revenge is Sweet but Risky [2013]
2. Should the U.S. Allow Companies to ‘Hack Back’ Against Foreign Cyber Spies? [2013]
3. Hacking Back is a Bad Idea after a Cyber Attack, DOJ Official Says [2013]
4. The text of the CFAA outlines penalties.

Question 4

Meta-Data, Big Data modified
Meta-Data and Big Data — The scale and scope of the analysis of “big data” creates new concerns about ethics.
What is Meta-Data, and how is this different or similar to traditional concepts of data? Read the “Big Data” article by Mayer-Schonberger/Cukier and discuss the positive and negative aspects and the possible ethical implications of mining big data by the government and by private industry. Give your own examples.
Background (available on the Web by title):
1. NSA’s Intell Gathering Puts Spotlight on Metadata [2013 – definition discussed]
2. How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did [2012]
3. How Companies Learn Your Secrets [2012]
4. Using Metadata to Find Paul Revere [2013 – linked scholarly preprint is also interesting. Healy teaches Sociology and Ethics at Duke]

 

Question 5

STUXNET and the new Cyber Weapons
Cyber activities can be transnational, and the changing environment is blurring the traditional distinctions between crime, espionage, terrorism and warfare.
What are cyber weapons?  Can they be used for crime, espionage, terrorism and warfare?
Explain possible consequences for Internet cybersecurity once we enter a Global Cyber Arms Race.
How likely is it that the United States will be attacked by a threat actor employing a modified version of the STUXNET cyber weapon some day?
Background (available on the Web by title):
1. Stuxnet Infected Chevron’s IT Network [2012 – possibly unintended consequences]
2. Stuxnet Cyberattack by US a ‘Destabilizing and Dangerous’ Course of Action, says Security Expert Bruce Schneier[2012]
3. The Real Story of Stuxnet [2013 – from IEEE]
4. U.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say [2012]

 

NOTE: please all answer should be in APA format and no plagiarism and a minimum of 250 words per answer and minimum of 2 references to each answer. Please you must site your reference in your work (in text citation) all questions should be answered separately meaning each answer to each question should stand alone. Do not answer the question like an essay



0% Plagiarism Guaranteed & Custom Written, Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

Order Now

STILL NOT CONVINCED?

We've produced some samples of what you can expect from our Academic Writing Service - these are created by our writers to show you the kind of high-quality work you'll receive. Take a look for yourself!

View Our Samples

corona virus stop
FLAT 25% OFF ON EVERY ORDER.Use "FLAT25" as your promo code during checkout