logo

Ethics Assignment- Australia's Struggle with Encryption

8 Pages1874 Words93 Views
   

Added on  2020-03-16

Ethics Assignment- Australia's Struggle with Encryption

   Added on 2020-03-16

ShareRelated Documents
Running head: AUSTRALIA’S STRUGGLE WITH ENCRYPTIONAUSTRALIA’S STRUGGLE WITH ENCRYPTIONName of the StudentName of the UniversityAuthor Note
Ethics Assignment- Australia's Struggle with Encryption_1
TOPICS IN IT ETHICS2Table of ContentsWhat is going on?.......................................................................................................................3What are the facts?.....................................................................................................................3What are the issues?...................................................................................................................3Who is affected?.........................................................................................................................4Ethics Analysis:..........................................................................................................................4What are the ethical issues and implications?............................................................................4What can be done about it?........................................................................................................5What options are there?..............................................................................................................5Which option is best option and why?.......................................................................................6References..................................................................................................................................7
Ethics Assignment- Australia's Struggle with Encryption_2
TOPICS IN IT ETHICS3What is going on?The process of encryption can be considered very much vital in the aspect of security.Australia is struggling with the concept of encryption due to the factor that the criminals aretaking advantage of the concept for their purpose. The process as stated being security relatedwhich is beneficial on the other hand it can be stated that it could be sometimes play adominating role for the hackers (Garg et al., 2016). What are the facts? The main facts can be related to the concept of encryption. The application, whichinvolve encryption, may be altered in many ways. This make the access for the concernedauthority when needed very much easy and hassle free. The key which re generated by anapplication would be restricted this would help the government to check for all thepossibilities when needed. The government of the United States, which imposed this type ofregulations for a period in the year 1990,’s (Hoang, 2014). These ones had the computingresources in excess amount for any of the entity concept. In a context it can be stated that itis, no longer the same case with is noted. These rules themselves are causing problem relatedto the security due to the factor that some of the applications can be tricked to insecure modeof encryption, which is traceable today. What are the issues?The main issue, which is faced, is that the Australian government wants to read theencrypted message in one go. It can be stated in this context is that the means of achievingthis concept is unclear. The access of the encrypted message can be considered very muchvital in the field of investigation as it can be considered as vital information for the purposeof proper investigation. If the message cannot be accessed due to the implementation of theprocess of encryption, it can be drawback for the investigation team. In order to justify the
Ethics Assignment- Australia's Struggle with Encryption_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Ethics: Analyzing the Ethical Implications of Application Accessing Data Without Users' Consent
|7
|1643
|344

Desklib Privacy, Copyright and Ethics Policies
|11
|2260
|475

Database Design and Implementation of Employee Database
|5
|590
|431

[PDF] Ethics and Information Technology
|7
|1367
|144

ACCT6001: Accounting Information Systems
|5
|600
|96

Does Surveillance Law Provide Security or Threaten Privacy?
|8
|1935
|23