whatsapp

Connect on Whatsapp : +1 206 673 2541, Get Homework Help 24x7, 100% Confidential. Connect Now

Ethical Issues for Cybersecurity | Computer Science homework help

TechFite Case Study

Background of Company:

TechFite is traded on NASDAQ and has approximately 1,000 employees. The company’s core business involves consulting with and advising Internet organizations on promoting and monetizing their online business ventures. Most of the company operates legally and ethically with good internal financial oversight. However, its Applications Division has recently been reported in the news media for undertaking some disturbing business practices. This division consults with start-ups on launching new applications and apps online.

COMPETENCIES 2

4045.1.1 :  Compliance Legal Requirements

The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization.

4045.1.3 :  Security Awareness Training and Education (SATE)

The graduate outlines legal issues that should be included within the security awareness training and education (SATE) program of an organization.

4045.1.4 :  Ethical Issues for Cybersecurity

The graduate discusses the implications of ethical issues for specific cybersecurity actions within an organization.

INTRODUCTION

Information security professionals must understand how to apply ethical security principles and processes to their organizations. These standards should define the organization’s specific needs and demands to assure data confidentiality, integrity, and availability. An organization’s employees must be aware of the security challenges it is facing. In this task, you will analyze ethical challenges related to information security and develop a training plan for an organization, which will raise awareness of these challenges, convey strategies, and prevent unwanted developments.

SCENARIO

Review the attached “TechFite Case Study” for information on the company being investigated. You should base your responses on this scenario.

REQUIREMENTS

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

 

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

 

Tasks may  not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A.  Address ethical issues for cybersecurity by doing the following:

1.  Discuss the ethical guidelines or standards relating to information security that should apply to the case study.

a.  Justify your reasoning.

2.  Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices.

3.  Discuss what factors at TechFite led to lax ethical behavior.

B.  Describe ways to mitigate problems and build security awareness by doing the following:

1.  Describe  two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property.

2.  Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.

a.  Explain how the SATE program will be communicated to TechFite employees.

b.  Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.

C.  Prepare a summary directed to senior management ( suggested length of 1–2 paragraphs) that states TechFite’s ethical issues from Part A and the related mitigation strategies from Part B.

D.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

E.  Demonstrate professional communication in the content and presentation of your submission.

File Restrictions

File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( ) File size limit: 400 MB File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z

RUBRIC

A1:DISCUSSION OF ETHICAL GUIDELINES OR STANDARDS

COMPETENT answer

The discussion logically addresses the ethical guidelines or standards relating to information security that should apply to the case study.

A1A:JUSTIFICATION OF STANDARDS OR GUIDELINES

COMPETENT answer

The justification logically addresses the reasoning of the ethical considerations or guidelines.

A2:DESCRIPTION OF UNETHICAL BEHAVIORS

COMPETENT answer

The identification of the unethical behavior of individuals or groups is accurate.

A3:FACTORS

COMPETENT answer

The discussion of the factors at TechFite that led to lax ethical behavior is clear and logical.

B1:INFORMATION SECURITY POLICIES

COMPETENT

The description addresses 2 information security policies, specific to the case study that may have minimized the criminal activity, negligent acts, and threats to intellectual property.

B2:SATE KEY COMPONENTS

COMPETENT

The description of key components of a SATE program that could be implemented at TechFite is relevant and applicable to the case study.

B2A:SATE COMMUNICATION

COMPETENT

The explanation of how the SATE program will be communicated to TechFite employees is logical.

B2B:SATE RELEVANCE

B2B:SATE RELEVANCE

COMPETENT

The justification of the SATE program’s relevance to mitigating the undesirable behaviors at TechFite is logical.

C:CHALLENGES AND STRATEGIES SUMMARY

COMPETENT answer

A complete summary directed to senior management that states TechFite’s ethical issues and the related mitigation strategies is provided, and the summary aligns with the information provided in Parts A and B.

D: SOURCES

COMPETENT answer

The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available. Or the candidate does not use sources.

E: PROFESSIONAL COMMUNICATION

COMPETENT answer

Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.

Get FREE Essay Price Quote
Pages (550 words)
Approximate price: -