Assessment Title :- Ethical issues for IT security personnel
Purpose of the assessment (with ULO Mapping)
The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:
Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen critical thinking skills by answering the assignment.
Debra Shinder writes, “In fact, many IT pros don’t even realize that their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions .” Debra poses the following ethical scenarios.
0) IT and security consultants who do work for multiple companies have even more ethical issues to deal with. If you learn things about one of your clients that might affect your other client(s), where does your loyalty lie? Should you use the information gained from Client‐A for the benefit of the other client, Client‐B?
1) Then there are money issues. The proliferation of network attacks, hacks, viruses and other threats to their IT infrastructures have caused many companies to “be afraid, be very afraid.” As a security consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services, or is it a case of “whatever the market will bear?”
2) Is it wrong for you to mark up the equipment and software that you get for the customer when you pass the cost through? What about kickbacks from equipment manufacturers? Is it wrong to accept “commissions” from them for persuading your clients to go with their products? Or what if the connection is more subtle? Is it wrong to steer your clients toward the products of companies in which you hold stock?
3) Another ethical issue involves promising more than you can deliver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client’s network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or switching to an open source operating system – which changes, coincidentally, will result in many more billable hours for you – on the premise that this is the answer to their security problems?
4) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client’s security needs shows that sensitive information will be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Should you “eat” the cost and install the extra security measures at no cost to the client? Should you refuse to do the job?
Investigate and reflect upon one of the above scenarios using Ethical Guidelines published by organisations such as: EA, ACS, ACM and IEEE.
Students with ID ending with 0 or 5, answer scenario number 0
Students with ID ending with 1 or 6, answer scenario number 1
Students with ID ending with 2 or 7, answer scenario number 2
Students with ID ending with 3 or 8, answer scenario number 3
Students with ID ending with 4 or 9, answer scenario number 4