logo

IMAT5262 Research, Ethics & Professionalism in Computing

   

Added on  2021-05-27

25 Pages3691 Words112 Views
MSc Information Systems ManagementPxxxxxxxx De Montfort UniversityDO NOT INCLUDE YOUR NAME AS THE WORK WILL BE ANONYMOUSLY MARKEDAssignment - Project ProposalEthics of Cyber SecurityIMAT5262 Research, Ethics & Professionalism in Computing

P Number: PxxxxxxxxIMAT5262 Research, Ethics & Professionalism in ComputingAbstractThe modern times are characterized by the presence of computers and other digital devices.All around us we see the digital devices that have engulfed us. No office, no house or novehicle can be spotted that does not make use of the technology. It has made our life veryeasy, and something that would take months and weeks are solved in matter of hours withhelp of these digital devices. One can hardly imagine an activity that would not involve thecomputer and other digital equipment being used in them. Their usage is further more visiblein the organizational structures, both on managerial front, educational and governmental levelKey WordsEthics, cyber security, computer security, computer networks, privacy.1

P Number: PxxxxxxxxIMAT5262 Research, Ethics & Professionalism in ComputingTable of Contents1.Background................................................................................................................................32.Research questions.................................................................................................................33.Literature Review......................................................................................................................34.Methodology Review................................................................................................................75.Conclusion.................................................................................................................................86.References...............................................................................................................................107.APPENDICES...........................................................................................................................12Appendix (i): Project Plan.............................................................................................................12Appendix (ii): Ethical Review Form..............................................................................................0Appendix (iii): Consent Form.........................................................................................................5Appendix (iv): Pilot study...............................................................................................................72

P Number: PxxxxxxxxIMAT5262 Research, Ethics & Professionalism in Computing1.BackgroundCyber world is just like the society of human being. While over 3 billion people from acrossthe world are on board on the digital interface, it does require patrolling and controlling of theentire traffic. Just like the society would need law and order, police control and patrol, in thesame way a medium that has over 3 billion users would require a scheme which would ensuresafe usage of internet and computers(Alves & Morris, 2018). With all kinds of operationssubject to the usage of online resources, it is highly imperative to create a zone that isshielded with secure browsing of computers and the world of internet.2.Research questionsUnderstanding what the cyber security concept means, what challenges are faced by it, whatare the agents and elements that contribute towards it and finally, the remedial actions thatcan be suggested towards counteracting and mitigating the impact of overall cyber securitythreats. In other words cyber security pertains to all the elements both that work in its favorand those that work against it. It is the overall study of the scenario with aim to bring aboutthe most and best out of the situation.3.Literature ReviewMcAfee that has been in the business of cyber security and cyber protection for a long while,took an initiative and conducted a thorough study on a massive scale to understand theoverall scenario of cyber security, the possible threats, the factors that contribute towards thecyber security, the factors that act against it and those reasons due to which the cyber securityremains a constant loophole and menace on all levels which ranges from individual level tomassive level on organizational front as well as international level(Andress & Winterfeld,2014).3

P Number: PxxxxxxxxIMAT5262 Research, Ethics & Professionalism in ComputingThe study took into account number of factors, and it was an extensive research in this fieldwhich involved questionnaires, surveys and interviews from various stakeholders in the fieldof computing. The studies aimed at addressing the core issues and problems that are faced inthe field of cyber security and computing(Lucas, 2017).The study took into account the opinions and observations of over 200 renown companiesand big wigs from the field of computing and technology and sought their opinion about theoverall standing and position and their understanding of the concept of the cybervulnerabilities and threats that are faced in different segments (Blakemore & Awan, 2016).Lars Nicander an expert in the field of cyber security has opinioned that the threats areexistent just because of lack of protection. Although he explains this in the view point ofgovernmental and nationwide security that suffers from threats in form of cyber war fare(Samuels & Rohsenow, 2015).The speed with which the attacks are being carried out has risen by extremely higherproportions in recent years compared to the yester years. H.P (Hewlett Packard) a pioneer inthe field of digital devices and computers that has long affiliation with these devicesconducted a survey in 2011 to find out the reasons and the possible impacts of the securityvulnerabilities(Stallings, 2017). According to the report the recent times have seen moreattacks directed towards the organizations and computer enterprises of large scale. Theseinclude the service providers like Google Inc, Microsoft’s Msn, Sony , H.P’s own websiteand many other interfaces. The report findings state that new means of attacks have beenlaunched in recent times which are totally new in their nature and type and have taken theusers of computer both on individual level and on organizational level by total surprise(Burgess, 2012).4

P Number: PxxxxxxxxIMAT5262 Research, Ethics & Professionalism in ComputingH.P report focuses on the basic point and that is of understanding the impact, the possiblerepercussions that are attached to the attack and the real motives that may be based on theattack on a certain area. Knowing the potential target areas, the objectives behind it, knowingwhich areas could cost the respective organization more are few of the factors that need to betaken into account in order to devise a better strategy towards cyber security enhancement(Glisson & Choo, 2017).H.P has adopted a special software and data base for this purpose in the name of Open SourceVulnerability Database (O.S.V.D), which takes into account various factors related to thecyber security, the trends, the target areas and many other areas and based on it, it helpscreating reports that further enable creating strategies towards reducing any threats that mayexist in the computer world of communications. OSVD generated a ten year report based onthe target zones and the areas that have been brought into attention by the hackers(Guitton,2017).The report tries to investigate and unearth the methods that are adopted towards securityinfiltration and the report states that new methods have been adopted which are a totalsurprise to the members of the field. It’s just like saying that the thieves have adopted newmethods of robbing the property and valuables(Gupta, 2013).H.P in its report for the year 2011 expresses deep concern over the growing rate of threats invarious forms yet it recommends the remedial actions towards it in form of prioritizing thelevel of work along with the functions and content those need more security relative to theother elements and functions which may require relatively less security(Vacca, 2014).The overall report aims to find out the inclination of the hackers and other spammers as to inwhat way do they target the sites and sources. Based on the findings it is being underscored5

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IMAT5262: Research, Ethics & Professionalism in Computing
|29
|4575
|98

IMAT5262 Research, Ethics & Professionalism in Computing : Assignment
|28
|4390
|18

IMAT5262 : Research, Ethics & Professionalism in Computing
|25
|4532
|88

The greater part of the current security
|28
|6341
|11

Impact of Codes of Ethics on Professional Responsibilities
|25
|5103
|259

Exploring the Role of Ethics in Shaping Professional Responsibilities of ICT Professionals
|25
|5122
|448