logo

Ethical Issues in Cybersecurity: A Case Study of ASIC v. RI Advice

   

Added on  2023-06-18

6 Pages1407 Words352 Views
Ethics

Contents
INTRODUCTION...........................................................................................................................3
TASK...............................................................................................................................................3
Cyber security..............................................................................................................................3
Case..............................................................................................................................................3
How case relates to ethics (ACM) its principles which explains the ethical issues....................4
Ethical issues in case in detail.....................................................................................................5
How to communicate about ethical issues in relevant and useful way........................................5
CONCLUSION................................................................................................................................5
REFERENCES................................................................................................................................6

INTRODUCTION
The information technology mainly provides basis for study and also extends to such
practices which incorporate the information technologies. It refers to as the contemporary
technology which is to be assessed and includes cloud computing, layer communication,
electronic discovery, electronic outsourcing and many others. The artificial intelligence has seen
the massive growth in this decade but it is subject to ethics which mainly ensures that the
artificial intelligence of an entity or company maintains the human dignity and does not involve
in something which can cause harm to the people (Kirkpatrick and Weikle, 2018). This PPT shall
cover about the ethical issues which pertains in the cybersecurity by referring to a case.
TASK
Cyber security
The cybercrimes and security has been the most serious challenges which is being faced
by the people in today’s era with the significant implication for each sector of modern global
economy. The organizations, individuals as well as nation states uses the breach of computer
networks in order to commit the crimes such as data theft, insider trading, phishing and many
others. Hacking is also on the top nowadays wherein the unauthorised third party takes access to
the computer networks of the company, individual or the nation state. Cyber security can be
referred to as a practice of defending the computers, mobile devices, servers, networks,
electronic systems and the data from the malicious attacks.
Case
In the case of ASIC v. RI Advice, ASIC have announced that it will commence the
proceedings in Federal court against RI Advice, the licence holder of Australian Financial
Services which mainly focused on the retirement advice but failed to have the adequate cyber
security system. It was alleged by ASIC that the company was subject to the brute force attack
wherein the malicious user gained the remote access successfully to the Frontier’s service and
have spent more than 155 hours being logged in. As a result, the hacker was able to access the
sensitive information of client which included the identification documents (Neeman and
Shaffstall, 2018). ASIC have alleged that this has been the result of failure of RI to implement
such system, resources and polices which are appropriate reasonably to manage the risk in
relation to cyber security as well as cyber resilience. The company alleged that there was no

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Issues in Cyber Security: A Case Study of ASIC v. RI Advice
|11
|594
|200

Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224

Cyber Security Assignment 2022
|12
|2845
|22

How to Recognize and Avoid Cybercrime in Australia
|10
|2834
|65

Cyber Security Article 2022
|5
|1172
|24

Introduction to Cyber Security
|14
|3209
|388