back to top Read the following case study and then proceed as per the instructions given below to prepare your report. Case Study Rogue Services advertised its web hosting services as “cheap,...

1 answer below »

back to top

Read the following case study and then proceed as per the instructions given below to prepare your report.


Case Study


Rogue Services advertised its web hosting services as “cheap, guaranteed uptime, no matter what.” While some of Rogue’s clients were independent web-based retailers, the majority were focused on malware and spam. Several botnets used Rogue’s reliability guarantees to protect their command-and-control servers from take-down attempts. Spam and other fraudulent services leveraged Rogue for continuous delivery. Corrupted advertisements often linked to code hosted on Rogue to exploit browser vulnerabilities to infect machines with ransomware.


Despite repeated requests from major ISPs and international organizations, Rogue refused to intervene with these services, citing their “no matter what” pledge to their customers. Furthermore, international pressure from other governments failed to induce national-level intervention, as Rogue was based in a country whose laws did not adequately proscribe such hosting activities.


Ultimately, Rogue was forcibly taken offline through a coordinated effort from multiple security vendors working with several government organizations. This effort consisted of a targeted worm that spread through Rogue’s network. This denial-of-service attack successfully took Rogue’s machines offline, destroying much of the data stored with the ISP in the process. All of Rogue’s clients were affected. No other ISPs reported any impact from the worm, as it included mechanisms to limit its spread. As a result of this action, spam and botnet traffic immediately dropped significantly. In addition, new infections of several forms of ransomware ceased.


Source: Using the Code, Malware Disruption, ACM Ethics. The Official Site of the Association for Computing Machinery's Committee on Professional Ethics, 2020




Instructions:



  • Analyse the actions of Rogue’s clients and multiple security vendors from the perspective of the Australian Computer Society (ACS) Code of Ethics.




  • Make a recommendation on the basis of your analysis providing reasons for this recommendation.




  • Include a Reference list at the end of your work using the correct APA referencing style. You must includeat least seven (7) quality academic references. Please note that these references arein addition tothose provided to you through this subject (for example, you still may reference the Reynolds textbook, the Interact subject lecture notes etc BUT these references cannot be used as one of your seven quality academic references from different sources). All items included in the Reference List must be cited within the body of the report.The word limit is 1500 words ± 5%.



    Note:Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicate in brackets the word count of your assignment excluding those items mentioned above.



Please use the template provided in the subject Interact site for your report.






Turnitin only submission






This assignment must be submitted through Turnitin.






It is recommended thatyour name,student IDandpage numberare included in theheader or footerof every page of the assignment.


Further details about submission in Turnitin are provided in On-line submission.


RATIONALE

back to top

This assessment task will assess the following learning outcome/s:



  • be able to identify ethical issues related to ICT.

  • be able to assess the implications of ethical problems.

  • be able to critically evaluate solutions to ethical problems.

  • be able to argue consistently and rationally about the moral issues raised by the adoption and use of ICT.

  • be able to analyse ethical problems from the point of view of ICT professionals using the Australian Computer Society (ACS) Code of Ethics.



Answered 19 days AfterMar 22, 2021

Answer To: back to top Read the following case study and then proceed as per the instructions given below to...

Deepti answered on Mar 30 2021
136 Votes
Contents
Background    1
Conflicts    1
Primacy of Public Interest    1
The Enhancement of Quality of Life    1
Honesty    2
Competence    2
Professional Development    2
Professionalism    2
Analysis of Vendors’ Action    2
Recommendations    2
References    4
Background
From the perspective of ACS, the clients of Rogue services should
· Place interests of publi
c above their business or sectional interest.
· Strive to improve the quality of life of all those impacted by their work.
· Honestly represent their skills, services and knowledge.
· Work competently
· Enhance their own as well as others’ development
· Enhance the integrity of ACS society.
The main actions of the botnet that used the target web hosting service Rogue to leverage fraudulent services and spam are
· Rogue Services’ botnet clients used its reliability guarantees to exploit browser vulnerabilities to infect target devices with ransomware.
· Rogues’ clients who hosted fraudulent services leveraged the web hosting services to avail continuous delivery.
Conflicts
According to Australian Code of Ethics, the actions of the botnet mentioned above show conflict between the values. While using the fifth code of ethics which states ‘Professional development’ i.e., enhancing their own professional development of fraudulent and malicious services, the actions conflict with all the other ACS values like primacy of public interest, Enhancement of quality of life, honesty and professionalism. The conflicts are discussed in detail below.
Primacy of Public Interest
While safeguarding the interests of immediate stakeholders which includes hackers and cyber attackers using Rogues services’ for malicious interests, these interests are conflicting with the duty and loyalty that Rogue services owe to the public. The activities of Rogue’s clients are adversely impacting the work of ISPs and international organizations associated with Rogue. The actions of the botnets are causing potential conflicts between professional activity and legal public requirements. The actions are conflicting in preserving security, integrity, continuity and utility of ICT, jeopardizing the intellectual property of others using continuous delivery feature of Rogue and facilitating the infection of malware by exploiting browser vulnerabilities. The actions further damage the confidentiality and privacy of information of others.
The Enhancement of Quality of Life
The actions of botnets include infecting malware committing fraudulent activities and introducing spam. This recognizes the role of ICT to mar the quality of ethical businesses and life of people at large and attack the safety and health of the victims. The actions strongly disregard the perception of the affected parties which includes major ISPs and organizations located internationally. The actions increase the adverse feelings of the affected parties by multifold and diminish their control. This forced the security vendors to work against the code of ethics and forcibly take Rogue offline using denial of service attack by coordinating with government organizations.
Honesty
Botnets have vehemently breached public trust in the profession of web hosting services and exploited Rogue’s service to offer guaranteed uptime to all its clients irrespective of the ethics followed by them. They lack honesty and integrity in their professional actions. They mislead the service provider Rogue to the suitability of their malicious...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here