Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

1 Unit BISY1001/ISY1000/ISY100 Assessment Discussion Forum Type Individual Assessment Number Three Assessment Name Weighting Forum 15% Alignment with Unit and Course Unit Learning Outcomes Graduate...

1 answer below »

1

Unit BISY1001/ISY1000/ISY100
Assessment
Discussion Forum
Type Individual
Assessment Number Three
Assessment Name
Weighting
Forum
15%
Alignment with Unit
and Course
Unit Learning Outcomes Graduate Attributes Assessed
ULO 1: Describe and discuss the
principles of ethical practice as they
pertain to the information technology
and business sectors

ULO 2: Demonstrate
comprehension of professional IT
dilemmas such as privacy,
computer crime, systems reliability,
intellectual property, copyright, the
impact of technology on the society.

ULO 3: Demonstrate and
understanding of basic problem
solving and decision-making skills.

ULO 4: Identify and discuss the
egulatory obligations relating to
an IT environment.

ULO 5: Describe issues su
ounding
professional codes of ethics, file
sharing, infringement of intellectual
property, security risk assessment,
internet crime, identity theft, etc
GA 1: Communication
GA 2: Critical Thinking
GA 3: Ethical Behaviour
GA 4: Collaboration
GA 5: Flexibility
Due Date/Time

Week 5 (Session 9), Friday, 5pm
(AEDT)
Assessment
Description

Students are required to contribute to the topic proposed by the lecturer.
Detailed
Assignment
Requirements
Discussion topic: 800 words
You are the IT manager of a small business. The owner called you late on Friday
night to inform you that s/he just received an anonymous call demanding
payment of $10,000 or the company’s customer database will be encrypted and
made inaccessible by a logic bomb that has been planted in the firm’s billing
system. Drawing on your knowledge of actions that must be taken in the event of
a successful security intrusion (see Session 3), how would you handle this
situation?


2

Special
consideration
Students whose ability to submit or attend an assessment item is affected by sickness,
misadventure or other circumstances beyond their control, may be eligible for special
consideration. No consideration is given when the condition or event is unrelated to the
student's performance in a component of the assessment, or when it is considered not
to be serious.

Students applying for special consideration must submit the form within 3 days of the
due date of the assessment item or exam.
The form can be obtained from the AIH website (https:
aih.nsw.edu.au/cu
ent-
students/student-forms/) or on-campus at Reception.

The request form must be submitted to Student Services. Supporting evidence should
e attached. For further information please refer to the Student Assessment Policy and
associated Procedure available on
(https:
aih.nsw.edu.au/about-us/policies-procedures/).

Please refer to the AIH Academic Misconduct Policy: https:
aih.nsw.edu.au/wp-
content/uploads/2017/11/StudentAcademic-Misconduct-Policy.pdf
DO NOT COPY AND PASTE FROM THE INTERNET OR COPY OTHER STUDENTS’
WORK!
https:
aih.nsw.edu.au/cu
ent-students/student-forms
https:
aih.nsw.edu.au/cu
ent-students/student-forms
https:
aih.nsw.edu.au/about-us/policies-procedures
https:
aih.nsw.edu.au/wp-content/uploads/2017/11/StudentAcademic-Misconduct-Policy.pdf
https:
aih.nsw.edu.au/wp-content/uploads/2017/11/StudentAcademic-Misconduct-Policy.pdf
Ru
ic for Report (15 marks)


Requirements Total High Distinction Distinction Credit Pass Pass Fail
Depth and Breadth of
Coverage
10
marks
A convincing and
well-defined
argument based on
the given scenario,
that reflects an
appropriate response
to a cyberattack.
A well-defined
argument based on
the given scenario,
that reflects an
appropriate
esponse to a
cyberattack.
An argument based
on the given
scenario, that reflects
an appropriate
esponse to a
cyberattack.
A limited argument
ased on the
given scenario,
that reflects an
appropriate
esponse to a
cyberattack.
An argument that is
neither coherent nor
ased on the given
scenario, and does
not reflect an
appropriate
esponse to a
cyberattack.
Structure, Language and
Conventions & Report
Format
5
marks
All aspects of the
eport conform to
a high academic /
professional
standard.

Most aspects of
the report
conform to a high
academic /
professional
standard.

Most aspects of the
eport conform to
an acceptable
academic /
professional
standard.

The report
displays basic
structure.

The report is not
of an academic /
professional
standard.













Answered 2 days After Jun 06, 2022

Solution

Shubham answered on Jun 08 2022
91 Votes
BUSINESS ETHICS
Table of Contents
Introduction to case    3
Ethical Issues    3
Challenges    3
Conclusion    4
Recommendation    4
References    6
Introduction to case
An IT intrusion has been reported where an anonymous call has been made to CEO demanding $10,000. The hacker also threat not to inform police and a
ange the ransom amount as soon as possible to avoid leaking of customer database in public. He also threatened that the company will loose the access to the database as he has planted a logic bomb in the billing system of the firm. This is a serious concern because being an IT company it is required to work in depth of the reasoning behind intrusion and find out who are the real culprits. Besides that the ethical concerns have also been raised.
Ethical Issues
Privacy: It is difficult for IT department and company to keep up with the protection and trustworthiness of information (Susanto et.al, 2021). Unexpected revelation to improper individuals and game plans to protect the precision of data furthermore comes in the security issue. Therefore, creating strict rules to maintain the privacy and integrity of employees and customer information is top most priority.
Accessibility: Accessibility rights has transformed into a significant need issue for the IT and the web with the remarkable movement in development. Online business and Electronic portion structures advancement on the web elevated this issue for the organization. Network on the web can't be made secure from unapproved access. Failure to implement the inte
uption identification framework needs to be worked out (Oluoha et.al, 2021).
Distu
ing actions: Destructive exercises in the PC ethics implies the mischief or antagonistic outcomes to the IT like loss of huge information, loss of property, loss of ownership, demolition of property and irksome tremendous impacts. This rule of moral direct limits any untouchables from the use of information advancement in way which prompts any adversity to any of the clients, agents, supervisors and the general populace.
Liability: The software owner’s liability need to be decided...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here