1 Unit BISY1001/ISY1000/ISY100 Assessment Discussion Forum Type Individual Assessment Number Three Assessment Name Weighting Forum 15% Alignment with Unit and Course Unit Learning Outcomes Graduate...

1 answer below »
please follow the instructions provided on the file and i will attach the necessary document to complete the assignment too


1 Unit BISY1001/ISY1000/ISY100 Assessment Discussion Forum Type Individual Assessment Number Three Assessment Name Weighting Forum 15% Alignment with Unit and Course Unit Learning Outcomes Graduate Attributes Assessed ULO 1: Describe and discuss the principles of ethical practice as they pertain to the information technology and business sectors ULO 2: Demonstrate comprehension of professional IT dilemmas such as privacy, computer crime, systems reliability, intellectual property, copyright, the impact of technology on the society. ULO 3: Demonstrate and understanding of basic problem solving and decision-making skills. ULO 4: Identify and discuss the regulatory obligations relating to an IT environment. ULO 5: Describe issues surrounding professional codes of ethics, file sharing, infringement of intellectual property, security risk assessment, internet crime, identity theft, etc GA 1: Communication GA 2: Critical Thinking GA 3: Ethical Behaviour GA 4: Collaboration GA 5: Flexibility Due Date/Time Week 5 (Session 9), Friday, 5pm (AEDT) Assessment Description Students are required to contribute to the topic proposed by the lecturer. Detailed Assignment Requirements Discussion topic: 800 words You are the IT manager of a small business. The owner called you late on Friday night to inform you that s/he just received an anonymous call demanding payment of $10,000 or the company’s customer database will be encrypted and made inaccessible by a logic bomb that has been planted in the firm’s billing system. Drawing on your knowledge of actions that must be taken in the event of a successful security intrusion (see Session 3), how would you handle this situation? 2 Special consideration Students whose ability to submit or attend an assessment item is affected by sickness, misadventure or other circumstances beyond their control, may be eligible for special consideration. No consideration is given when the condition or event is unrelated to the student's performance in a component of the assessment, or when it is considered not to be serious. Students applying for special consideration must submit the form within 3 days of the due date of the assessment item or exam. The form can be obtained from the AIH website (https://aih.nsw.edu.au/current- students/student-forms/) or on-campus at Reception. The request form must be submitted to Student Services. Supporting evidence should be attached. For further information please refer to the Student Assessment Policy and associated Procedure available on (https://aih.nsw.edu.au/about-us/policies-procedures/). Please refer to the AIH Academic Misconduct Policy: https://aih.nsw.edu.au/wp- content/uploads/2017/11/StudentAcademic-Misconduct-Policy.pdf DO NOT COPY AND PASTE FROM THE INTERNET OR COPY OTHER STUDENTS’ WORK! https://aih.nsw.edu.au/current-students/student-forms/ https://aih.nsw.edu.au/current-students/student-forms/ https://aih.nsw.edu.au/about-us/policies-procedures/ https://aih.nsw.edu.au/wp-content/uploads/2017/11/StudentAcademic-Misconduct-Policy.pdf https://aih.nsw.edu.au/wp-content/uploads/2017/11/StudentAcademic-Misconduct-Policy.pdf Rubric for Report (15 marks) Requirements Total High Distinction Distinction Credit Pass Pass Fail Depth and Breadth of Coverage 10 marks A convincing and well-defined argument based on the given scenario, that reflects an appropriate response to a cyberattack. A well-defined argument based on the given scenario, that reflects an appropriate response to a cyberattack. An argument based on the given scenario, that reflects an appropriate response to a cyberattack. A limited argument based on the given scenario, that reflects an appropriate response to a cyberattack. An argument that is neither coherent nor based on the given scenario, and does not reflect an appropriate response to a cyberattack. Structure, Language and Conventions & Report Format 5 marks All aspects of the report conform to a high academic / professional standard. Most aspects of the report conform to a high academic / professional standard. Most aspects of the report conform to an acceptable academic / professional standard. The report displays basic structure. The report is not of an academic / professional standard.
Answered 2 days AfterJun 06, 2022

Answer To: 1 Unit BISY1001/ISY1000/ISY100 Assessment Discussion Forum Type Individual Assessment Number Three...

Shubham answered on Jun 08 2022
91 Votes
BUSINESS ETHICS
Table of Contents
Introduction to case    3
Ethical Issues    3
Challenges    3
Conclusion    4
Recommendation    4
References    6
Introduction to case
An IT intrusion has been reported where an anonymous
call has been made to CEO demanding $10,000. The hacker also threat not to inform police and arrange the ransom amount as soon as possible to avoid leaking of customer database in public. He also threatened that the company will loose the access to the database as he has planted a logic bomb in the billing system of the firm. This is a serious concern because being an IT company it is required to work in depth of the reasoning behind intrusion and find out who are the real culprits. Besides that the ethical concerns have also been raised.
Ethical Issues
Privacy: It is difficult for IT department and company to keep up with the protection and trustworthiness of information (Susanto et.al, 2021). Unexpected revelation to improper individuals and game plans to protect the precision of data furthermore comes in the security issue. Therefore, creating strict rules to maintain the privacy and integrity of employees and customer information is top most priority.
Accessibility: Accessibility rights has transformed into a significant need issue for the IT and the web with the remarkable movement in development. Online business and Electronic portion structures advancement on the web elevated this issue for the organization. Network on the web can't be made secure from unapproved access. Failure to implement the interruption identification framework needs to be worked out (Oluoha et.al, 2021).
Disturbing actions: Destructive exercises in the PC ethics implies the mischief or antagonistic outcomes to the IT like loss of huge information, loss of property, loss of ownership, demolition of property and irksome tremendous impacts. This rule of moral direct limits any untouchables from the use of information advancement in way which prompts any adversity to any of the clients, agents, supervisors and the general populace.
Liability: The software owner’s liability need to be decided...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here