IT Certifications, Ethical Dilemmas, and 5G Network Security Analysis
VerifiedAdded on 2020/03/16
|6
|1573
|71
Report
AI Summary
This report is divided into two main parts. Part I discusses the benefits of IT certifications, ethical dilemmas in two scenarios, and provides ethical solutions based on virtue ethics and utilitarian principles. It explores the importance of professional certifications for career advancement and client trust. The ethical dilemmas presented involve issues of academic integrity and corporate responsibility, requiring an analysis of right versus wrong. Part II focuses on security issues within 5G networks, including network access, user equipment, and mobile core security. It highlights the threats posed by malicious actors and the solutions implemented in 5G to mitigate these risks, such as end-user authentication, cross-layer fault management, and dynamic device detection. The report emphasizes the importance of 5G's security features in providing reliable services for enterprise businesses.

[Document title]
[Document subtitle]
[DATE]
Student Name
Student Number
[Document subtitle]
[DATE]
Student Name
Student Number
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Part I
Question 1
Professional IT Certifications brings about high professional standards and expertise that are well
recognized internationally. This provides a greater opportunity for IT professionals to secure jobs and
explore other opportunities especially in organizations that recognizes certifications such as Microsoft,
CCNA among others. In addition, certifications builds most of the client’s faith and confidence on
professional’s work. With IT certifications professionals are accorded high integrity and quality
professionalism in delivering quality products or services [1]. Lastly, with IT Certification, one is
regarded to be of great expertise and this attracts better pay or appreciation.
Question 2
Different institutions in Australia offers a number of software certifications that are recognizable by
ANZTB (Australia and New Zealand Testing Board). Some of these software certifications are; Software
Quality, Software Business Analyst Software Testing [2]. However, the most popular one is the ISTQB
Software testing certification. This certification is of different level and ranges from ISTQB Advanced
Test Analyst courses, Manager ISTQB Advanced Test and ISTQB Advanced Technical Test Analyst.
Question 3
Dilemma
Scenario 1:
Here ethical dilemma arises from the fact that Iriat does not know how to express herself in English and
here she is submitting a good essay that deserve a credit score but the submission is past time. Dr. Smith
therefore is faced with dilemma on whether he should award her the credit she deserve or whether to stick
to the submission regulation and penalize her. Also the fact that Iriats has for the first time write a very
good essay raises issue as to whether that assignment is her own work but instead of Dr Smith reaching
out to her and investigate, he goes ahead and receive that essay and award pass score. When Sarah B tells
Smith that Iriat took her research paper and retyped it to her and submitted it as her own, Dr Smith is in a
dilemma as tow whether he should cancel the grade already awarded to Iriat or just ignore Sarah B and
stick to previous marks. This is an integrity issue faced by Dr. Smith.
Scenario 2:
It is right to say that Mitchell H has not break any law since the emission from her factory is discharged
on the legal radius that is defined in the law. But her conscious is judging her considering the fact that the
emissions are directed to the lake and river that other people depend on for food. She is in a dilemma as
to whether she should purchase or implement the new technology in order to reduce the amount of
emission being discharge to the lakes and river which might render the fish unsafe for human
consumption or just ignore since she is acting within the law? The dilemma revolves around Mitchell
humanity aspect.
Question 1
Professional IT Certifications brings about high professional standards and expertise that are well
recognized internationally. This provides a greater opportunity for IT professionals to secure jobs and
explore other opportunities especially in organizations that recognizes certifications such as Microsoft,
CCNA among others. In addition, certifications builds most of the client’s faith and confidence on
professional’s work. With IT certifications professionals are accorded high integrity and quality
professionalism in delivering quality products or services [1]. Lastly, with IT Certification, one is
regarded to be of great expertise and this attracts better pay or appreciation.
Question 2
Different institutions in Australia offers a number of software certifications that are recognizable by
ANZTB (Australia and New Zealand Testing Board). Some of these software certifications are; Software
Quality, Software Business Analyst Software Testing [2]. However, the most popular one is the ISTQB
Software testing certification. This certification is of different level and ranges from ISTQB Advanced
Test Analyst courses, Manager ISTQB Advanced Test and ISTQB Advanced Technical Test Analyst.
Question 3
Dilemma
Scenario 1:
Here ethical dilemma arises from the fact that Iriat does not know how to express herself in English and
here she is submitting a good essay that deserve a credit score but the submission is past time. Dr. Smith
therefore is faced with dilemma on whether he should award her the credit she deserve or whether to stick
to the submission regulation and penalize her. Also the fact that Iriats has for the first time write a very
good essay raises issue as to whether that assignment is her own work but instead of Dr Smith reaching
out to her and investigate, he goes ahead and receive that essay and award pass score. When Sarah B tells
Smith that Iriat took her research paper and retyped it to her and submitted it as her own, Dr Smith is in a
dilemma as tow whether he should cancel the grade already awarded to Iriat or just ignore Sarah B and
stick to previous marks. This is an integrity issue faced by Dr. Smith.
Scenario 2:
It is right to say that Mitchell H has not break any law since the emission from her factory is discharged
on the legal radius that is defined in the law. But her conscious is judging her considering the fact that the
emissions are directed to the lake and river that other people depend on for food. She is in a dilemma as
to whether she should purchase or implement the new technology in order to reduce the amount of
emission being discharge to the lakes and river which might render the fish unsafe for human
consumption or just ignore since she is acting within the law? The dilemma revolves around Mitchell
humanity aspect.

Ethical Solutions
Scenario 1
Dr. Smith should examine the level of honesty portrayed by Iriat behavior through her action of
submitting other persons work as her own. Cheating is unethical and therefore should not be allowed as it
is immoral and defies the what is stated in the Ethics Virtue theory which examines whther an action is
morally right. According to this theory [3], one should always strive to do that which is morally upright
irrespective of the rules or situation. Therefore, Dr. Smith should preserve the integrity of education by
penalizing Irian’s behavior of copying somebody else’s work.
Scenario 2
According to utilitarian principle, ethical behavior can be judged depending on the outcome or
consequences of an outcome. From this scenario, the outcome of increased emissions to the river and lake
will deprive other peoples the privilege to eat fish or even sell fish and make a living. This therefore,
suggests that Mitchell should not consider the costs she will incur in implementing the technology to
reduce the amount of emission but rather should do that which is right to the fellow human beings by
controlling the emissions from her company irrespective of whether it’s legal.
Scenario 1
Dr. Smith should examine the level of honesty portrayed by Iriat behavior through her action of
submitting other persons work as her own. Cheating is unethical and therefore should not be allowed as it
is immoral and defies the what is stated in the Ethics Virtue theory which examines whther an action is
morally right. According to this theory [3], one should always strive to do that which is morally upright
irrespective of the rules or situation. Therefore, Dr. Smith should preserve the integrity of education by
penalizing Irian’s behavior of copying somebody else’s work.
Scenario 2
According to utilitarian principle, ethical behavior can be judged depending on the outcome or
consequences of an outcome. From this scenario, the outcome of increased emissions to the river and lake
will deprive other peoples the privilege to eat fish or even sell fish and make a living. This therefore,
suggests that Mitchell should not consider the costs she will incur in implementing the technology to
reduce the amount of emission but rather should do that which is right to the fellow human beings by
controlling the emissions from her company irrespective of whether it’s legal.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Part II
Security issues in 5G network
Introduction
5G network is mobile communication that provides data and voice communications which can be
incorporated to other technologies of internet of things (IoT) [1]. This network provides services to
vertical companies that incorporate various forms of communication and networking services. There are
various technologies that promote the capability of 5G. These technologies are Network Functions
Virtualizations, and Software Defined Network. These technologies enable 5G to server many companies
more effectively.
With the new 5G technologies, an emergence of new threats that comes into play. These threats raises
various security issues that need to be address in order to ensure that the services provided by the 5G
network is efficient and more reliable.
Background
The main aim of using 5G network is to ensure that there is high and reliable level of security across the
entire mobile network. 5G therefore is expected to provide quality solutions to the existing mobile
networks problems using other networks such as 4G, 3G and 2G. There are main areas that are targeted
by the attackers in computer networks [2]. These are network access, user equipment and mobile core
and external networks. 5G network therefore comes with solutions on how to address and manage
these security issues as discussed below.
Network equipment
Network or user equipment consists of devices such as tablets and smartphones that are 5G enabled.
These devices are mainly targeted due to their popularity in usage, use of third party programs that are
open source, having a wide connectivity variety ranging from wifi, Bluetooth, 2G, 3G and 4G network.
Using these devices an attacker can easily penetrate into a network using malwares, which hide
innocently on downloadable applications. In addition, malicious attack such as information theft,
hacking can also occur on other networks [3]. All these issues targeted to user equipment are well
addressed on 5G network. The network dynamically detect any kind of malicious actions or node and
distinguish it from other network devices. 5G carries out an experiment of the new device introduced to
the network in order to determine whether the equipment has been compromised or not.
Network Access
To prevent an authorized network access, 5G implements a strong end user authentication mechanism
that prevents intrusion to the targeted network. This is done by use of two techniques, which are
applied cryptography algorithm and credential storage. This makes it impossible for an attacker to
implement weak cryptography algorithm and access the network as it is the case with earlier
generations of network used. An end user credentials therefore ought to be placed in a much secured
and highly resistant place.
Security issues in 5G network
Introduction
5G network is mobile communication that provides data and voice communications which can be
incorporated to other technologies of internet of things (IoT) [1]. This network provides services to
vertical companies that incorporate various forms of communication and networking services. There are
various technologies that promote the capability of 5G. These technologies are Network Functions
Virtualizations, and Software Defined Network. These technologies enable 5G to server many companies
more effectively.
With the new 5G technologies, an emergence of new threats that comes into play. These threats raises
various security issues that need to be address in order to ensure that the services provided by the 5G
network is efficient and more reliable.
Background
The main aim of using 5G network is to ensure that there is high and reliable level of security across the
entire mobile network. 5G therefore is expected to provide quality solutions to the existing mobile
networks problems using other networks such as 4G, 3G and 2G. There are main areas that are targeted
by the attackers in computer networks [2]. These are network access, user equipment and mobile core
and external networks. 5G network therefore comes with solutions on how to address and manage
these security issues as discussed below.
Network equipment
Network or user equipment consists of devices such as tablets and smartphones that are 5G enabled.
These devices are mainly targeted due to their popularity in usage, use of third party programs that are
open source, having a wide connectivity variety ranging from wifi, Bluetooth, 2G, 3G and 4G network.
Using these devices an attacker can easily penetrate into a network using malwares, which hide
innocently on downloadable applications. In addition, malicious attack such as information theft,
hacking can also occur on other networks [3]. All these issues targeted to user equipment are well
addressed on 5G network. The network dynamically detect any kind of malicious actions or node and
distinguish it from other network devices. 5G carries out an experiment of the new device introduced to
the network in order to determine whether the equipment has been compromised or not.
Network Access
To prevent an authorized network access, 5G implements a strong end user authentication mechanism
that prevents intrusion to the targeted network. This is done by use of two techniques, which are
applied cryptography algorithm and credential storage. This makes it impossible for an attacker to
implement weak cryptography algorithm and access the network as it is the case with earlier
generations of network used. An end user credentials therefore ought to be placed in a much secured
and highly resistant place.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Mobile core and external networks
This attack takes place through the use of DDoS attacks which amplifies the network signal and targets
external networks or equipment via the end user network. This occurs mostly especially, where users
use their own devices to connect onto the network commonly known as bring-your-own-device
approach. To prevent this the 5G network implement cross layer fault management, which detects any
fault occurrence, diagnose the fault and recover from it. This prevents an intruder from attacking other
IP networks from the 5G device [4] .
Conclusion
Its is therefore evident that 5G addresses major security issues that has been experienced in other
network generations more effectively thus making 5G network more reliable for enterprise business
companies. The network comes with fault tolerance and security mechanisms that prevent intruders
from conducting malicious attacks using the 5G connected devices.
References
This attack takes place through the use of DDoS attacks which amplifies the network signal and targets
external networks or equipment via the end user network. This occurs mostly especially, where users
use their own devices to connect onto the network commonly known as bring-your-own-device
approach. To prevent this the 5G network implement cross layer fault management, which detects any
fault occurrence, diagnose the fault and recover from it. This prevents an intruder from attacking other
IP networks from the 5G device [4] .
Conclusion
Its is therefore evident that 5G addresses major security issues that has been experienced in other
network generations more effectively thus making 5G network more reliable for enterprise business
companies. The network comes with fault tolerance and security mechanisms that prevent intruders
from conducting malicious attacks using the 5G connected devices.
References

[1] R. Half, "4 Reasons a Professional Certification Benefits the Entire Company," Blog, pp. 1-2, 2014.
[2] Discover, 14 November 2016. [Online]. Available: http://www.disqover.com.au/. [Accessed 29
September 2017].
[3] S. E. o. Philosophy, "Virtue Ethics," Entries, p. 1, 2016.
[4] M. Malik, "Security Challenges in Next generation 5G Mobile Networks," Information Security Buzz,
2017.
[5] M. S. Vilchez, "Security and Resilience in 5G: Current Challenges and Future Directions," 2016.
[6] M. N¨aslund, "“Protecting imsi and user privacy in 5g networks,”," Institute for Computer Sciences,
Social-Informatics and, Brussel, 2016.
[7] Metis, "Requirements and KPIS for 5G mobile and wireless system," Metis, 2013.
[8] A. P. Christopher Panza, "A SNAPSHOT OF KEY ETHICAL THEORIES," Philosophy, pp. 1-2, 2016.
[2] Discover, 14 November 2016. [Online]. Available: http://www.disqover.com.au/. [Accessed 29
September 2017].
[3] S. E. o. Philosophy, "Virtue Ethics," Entries, p. 1, 2016.
[4] M. Malik, "Security Challenges in Next generation 5G Mobile Networks," Information Security Buzz,
2017.
[5] M. S. Vilchez, "Security and Resilience in 5G: Current Challenges and Future Directions," 2016.
[6] M. N¨aslund, "“Protecting imsi and user privacy in 5g networks,”," Institute for Computer Sciences,
Social-Informatics and, Brussel, 2016.
[7] Metis, "Requirements and KPIS for 5G mobile and wireless system," Metis, 2013.
[8] A. P. Christopher Panza, "A SNAPSHOT OF KEY ETHICAL THEORIES," Philosophy, pp. 1-2, 2016.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.
