back to topRead the following case study and then proceed as per the instructions given below to prepare your report.
Case Study
Rogue Services advertised its web hosting services as “cheap, guaranteed uptime, no matter what.” While some of Rogue’s clients were independent web-based retailers, the majority were focused on malware and spam. Several botnets used Rogue’s reliability guarantees to protect their command-and-control servers from take-down attempts. Spam and other fraudulent services leveraged Rogue for continuous delivery. Corrupted advertisements often linked to code hosted on Rogue to exploit browser vulnerabilities to infect machines with ransomware.
Despite repeated requests from major ISPs and international organizations, Rogue refused to intervene with these services, citing their “no matter what” pledge to their customers. Furthermore, international pressure from other governments failed to induce national-level intervention, as Rogue was based in a country whose laws did not adequately proscribe such hosting activities.
Ultimately, Rogue was forcibly taken offline through a coordinated effort from multiple security vendors working with several government organizations. This effort consisted of a targeted worm that spread through Rogue’s network. This denial-of-service attack successfully took Rogue’s machines offline, destroying much of the data stored with the ISP in the process. All of Rogue’s clients were affected. No other ISPs reported any impact from the worm, as it included mechanisms to limit its spread. As a result of this action, spam and botnet traffic immediately dropped significantly. In addition, new infections of several forms of ransomware ceased.
Source: Using the Code, Malware Disruption, ACM Ethics. The Official Site of the Association for Computing Machinery's Committee on Professional Ethics, 2020
Instructions:
- Analyse the actions of Rogue’s clients and multiple security vendors from the perspective of the Australian Computer Society (ACS) Code of Ethics.
- Make a recommendation on the basis of your analysis providing reasons for this recommendation.
- Include a Reference list at the end of your work using the correct APA referencing style. You must includeat least seven (7) quality academic references. Please note that these references arein addition tothose provided to you through this subject (for example, you still may reference the Reynolds textbook, the Interact subject lecture notes etc BUT these references cannot be used as one of your seven quality academic references from different sources). All items included in the Reference List must be cited within the body of the report.The word limit is 1500 words ± 5%.
Note:Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicate in brackets the word count of your assignment excluding those items mentioned above.
Please use the template provided in the subject Interact site for your report.
Turnitin only submission
This assignment must be submitted through Turnitin.
It is recommended thatyour name,student IDandpage numberare included in theheader or footerof every page of the assignment.
Further details about submission in Turnitin are provided in On-line submission.
RATIONALE
back to topThis assessment task will assess the following learning outcome/s:
- be able to identify ethical issues related to ICT.
- be able to assess the implications of ethical problems.
- be able to critically evaluate solutions to ethical problems.
- be able to argue consistently and rationally about the moral issues raised by the adoption and use of ICT.
- be able to analyse ethical problems from the point of view of ICT professionals using the Australian Computer Society (ACS) Code of Ethics.