IT Professional Development 300578: Ethics, Security, and Regulations
VerifiedAdded on 2022/09/10
|9
|1882
|114
Homework Assignment
AI Summary
This assignment focuses on IT Professional Development, addressing various ethical and security-related questions. It begins by outlining a step-by-step approach to ethical decision-making, emphasizing stakeholder impact and obligation analysis. The assignment then analyzes a case scenario inv...

Running head: IT PROFESSIONAL DEVELOPMENT
IT PROFESSIONAL DEVELOPMENT
Name of the Student
Name of the University
Author Note:
IT PROFESSIONAL DEVELOPMENT
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1IT PROFESSIONAL DEVELOPMENT
Question 4:
Ethical decision making is a process of selecting best decision among several alternative
decisions with respect to the ethical consideration. Followed by this concern it has been
identified that in case of any ethical decision making process it is very important to reduce the
possibilities of the unethical acts as it may impact the ethics of the decision. Along with this
concern it has been also noticed that there is huge significance present behind the approach of
decision making which indicates that the decision must bring best results to the stakeholders of
the nominated scenario. As an example a decision will be considered as bad if it brings bad result
and a decision will be considered as good if it brings good consequences.
Followed by the above discussion in order to get the best out of the decision making process it is
very essential to follow the below mentioned steps:-
Step 1: Determination of the claimed move.
Step 2: Identification of Stakeholder.
Step 3: Gather information related to the concern area.
Step 4: Identify the obligations.
Step 5: Identify the person who is responsible for the identified obligation.
Step 6: Impact of the obligations on the stakeholders.
Step 7: Which needs to be emphasized.
Step 8: What activities will be harmful for the stakeholders.
Step 9: What activities will be beneficial for the stakeholders.
Question 4:
Ethical decision making is a process of selecting best decision among several alternative
decisions with respect to the ethical consideration. Followed by this concern it has been
identified that in case of any ethical decision making process it is very important to reduce the
possibilities of the unethical acts as it may impact the ethics of the decision. Along with this
concern it has been also noticed that there is huge significance present behind the approach of
decision making which indicates that the decision must bring best results to the stakeholders of
the nominated scenario. As an example a decision will be considered as bad if it brings bad result
and a decision will be considered as good if it brings good consequences.
Followed by the above discussion in order to get the best out of the decision making process it is
very essential to follow the below mentioned steps:-
Step 1: Determination of the claimed move.
Step 2: Identification of Stakeholder.
Step 3: Gather information related to the concern area.
Step 4: Identify the obligations.
Step 5: Identify the person who is responsible for the identified obligation.
Step 6: Impact of the obligations on the stakeholders.
Step 7: Which needs to be emphasized.
Step 8: What activities will be harmful for the stakeholders.
Step 9: What activities will be beneficial for the stakeholders.

2IT PROFESSIONAL DEVELOPMENT
Step 10: Demand analysis of the stakeholder.
Step 11: How to satisfy the stakeholder.
Step 12: Determination of the alternative action.
Step 13: Determination of the best action.
Question 5:
Followed by the mentioned case scenario it has been noticed that in the mentioned case a
huge significance of ethical issues are present that may cause a major conflict. Followed by this
aspect, according to my view point the technician has done a great job by deleting the clip of
child pornography. As if the technician tells the policy about this case the policy might arrest the
technician for checking someone’s personal information and if he keep the file as it was the child
may face a major problem in future. Considering these aspects according to me the action of the
technician is good.
While analyzing the action of the technician it has been identify that, in the action of the
technician there are two sides which states that initially checking someone’s private information
is highly illegal, thus it can be stated that technician has opted for a bad move.
Along with the above consideration it has been identified that after finding the child
pornography on his client’s computer he deleted that by thinking that it may badly impact the
society as well as the child. Thus, according to my view point it is a good action done by the
technician.
If I was the same situation I would definitely delete the file from the client’s computer
however, I would like to inform the police as well since, as compare to the crime of checking
Step 10: Demand analysis of the stakeholder.
Step 11: How to satisfy the stakeholder.
Step 12: Determination of the alternative action.
Step 13: Determination of the best action.
Question 5:
Followed by the mentioned case scenario it has been noticed that in the mentioned case a
huge significance of ethical issues are present that may cause a major conflict. Followed by this
aspect, according to my view point the technician has done a great job by deleting the clip of
child pornography. As if the technician tells the policy about this case the policy might arrest the
technician for checking someone’s personal information and if he keep the file as it was the child
may face a major problem in future. Considering these aspects according to me the action of the
technician is good.
While analyzing the action of the technician it has been identify that, in the action of the
technician there are two sides which states that initially checking someone’s private information
is highly illegal, thus it can be stated that technician has opted for a bad move.
Along with the above consideration it has been identified that after finding the child
pornography on his client’s computer he deleted that by thinking that it may badly impact the
society as well as the child. Thus, according to my view point it is a good action done by the
technician.
If I was the same situation I would definitely delete the file from the client’s computer
however, I would like to inform the police as well since, as compare to the crime of checking

3IT PROFESSIONAL DEVELOPMENT
someone’s personal information the child pornography is more illegal. Thus, it can be stated that
in this situation informing the policy with evidence is highly appropriate action.
Question 6:
Followed by the above discussion it has been identified that in the area of ethics
obligation and duties are the two major elements that are highly related to the theory of ethics.
Considering this aspect, it has been identified that duty is the factor that you owe to someone
whereas obligation is nothing but an action that is imposed by me or someone. Considering this
aspect, it can be stated that the Duty and the Obligation are the key concept of ethics and these
are related to each other. Duty is what any person owes to the fellow human as the fact of the
nature and the obligation is what is imposed by the custom or the contract. These are nearly
similar however, the major differences of Duty and Obligations are:
Obligation is utilized with the respect to the contract for expressing about the party,
which the party to contract is bound for doing.
Duty is used with the respect to the relation of non-conceptual like that among the
corporation, officer or director or between the beneficiary and the trustee for expressing that,
which is occurred because of any person.
Question 7:
There are multiple forms of the malicious software in which five forms of malicious
software are:
Virus
someone’s personal information the child pornography is more illegal. Thus, it can be stated that
in this situation informing the policy with evidence is highly appropriate action.
Question 6:
Followed by the above discussion it has been identified that in the area of ethics
obligation and duties are the two major elements that are highly related to the theory of ethics.
Considering this aspect, it has been identified that duty is the factor that you owe to someone
whereas obligation is nothing but an action that is imposed by me or someone. Considering this
aspect, it can be stated that the Duty and the Obligation are the key concept of ethics and these
are related to each other. Duty is what any person owes to the fellow human as the fact of the
nature and the obligation is what is imposed by the custom or the contract. These are nearly
similar however, the major differences of Duty and Obligations are:
Obligation is utilized with the respect to the contract for expressing about the party,
which the party to contract is bound for doing.
Duty is used with the respect to the relation of non-conceptual like that among the
corporation, officer or director or between the beneficiary and the trustee for expressing that,
which is occurred because of any person.
Question 7:
There are multiple forms of the malicious software in which five forms of malicious
software are:
Virus
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4IT PROFESSIONAL DEVELOPMENT
Virus is described as the self-replicating, destructive and malicious computer program.
The virus is a parasitic content that copy itself from and to another system or another program.
Example: In the year 2009, the virus named “Conficker Virus” attack millions of
windows based computers.
Trojan horse
This destructive and malicious program is hidden within the other program. This is not
the self-replicating and this relies on the users for spreading the malware.
Example: The Japanese Government has experienced the Chinese Trojan horse attack in
July 2011.
Time bomb
This is the malicious program, which activates by the clock of the computer for obtaining
the disruption or any malicious activity.
Example: In the year 2014, the hackers have planned to implement the time bomb, which
is malicious software inside the Sony.
Logic bomb
This is malicious program, which activates when any particular criterion is met or not.
The disgruntled staffs use the logic bomb who is seeking revenge against any other staffs. This
type of attack is targeted against any system or any company.
Example: A logic bomb was set off the South Korea Cyber attack in March 20 in the year
2013.
Virus is described as the self-replicating, destructive and malicious computer program.
The virus is a parasitic content that copy itself from and to another system or another program.
Example: In the year 2009, the virus named “Conficker Virus” attack millions of
windows based computers.
Trojan horse
This destructive and malicious program is hidden within the other program. This is not
the self-replicating and this relies on the users for spreading the malware.
Example: The Japanese Government has experienced the Chinese Trojan horse attack in
July 2011.
Time bomb
This is the malicious program, which activates by the clock of the computer for obtaining
the disruption or any malicious activity.
Example: In the year 2014, the hackers have planned to implement the time bomb, which
is malicious software inside the Sony.
Logic bomb
This is malicious program, which activates when any particular criterion is met or not.
The disgruntled staffs use the logic bomb who is seeking revenge against any other staffs. This
type of attack is targeted against any system or any company.
Example: A logic bomb was set off the South Korea Cyber attack in March 20 in the year
2013.

5IT PROFESSIONAL DEVELOPMENT
Worms
This type of malicious functions is used for infiltrating the network or the system for
gaining the illegal access or passwords. The worms that are poorly designed can replicate it. This
causes the overload and causes the system crashing.
Example: A malicious worm has taken away near about 45 thousand login credentials
from the Facebook.
Question 8:
There are so many issues in the internet regulation which are advocated by Kleinsteuber.
There are mainly four types of internet regulation such as state regulation, self-regulation,
regulated self-regulation, c-regulation.
State regulation
This type of regulation is the arbitrary process under the state rule and this is centered in
the independent regulatory body. The regulatory body makes the decisions in the situation of
conflicts.
Self-regulation
In self-regulated regulation, before the actors turn to the government regulator, the actors
are urged for solving the issues among themselves. This reflect the industry choice for keeping
the government out of the affairs so that the industry become the regulator.
Regulated self-regulation
Worms
This type of malicious functions is used for infiltrating the network or the system for
gaining the illegal access or passwords. The worms that are poorly designed can replicate it. This
causes the overload and causes the system crashing.
Example: A malicious worm has taken away near about 45 thousand login credentials
from the Facebook.
Question 8:
There are so many issues in the internet regulation which are advocated by Kleinsteuber.
There are mainly four types of internet regulation such as state regulation, self-regulation,
regulated self-regulation, c-regulation.
State regulation
This type of regulation is the arbitrary process under the state rule and this is centered in
the independent regulatory body. The regulatory body makes the decisions in the situation of
conflicts.
Self-regulation
In self-regulated regulation, before the actors turn to the government regulator, the actors
are urged for solving the issues among themselves. This reflect the industry choice for keeping
the government out of the affairs so that the industry become the regulator.
Regulated self-regulation

6IT PROFESSIONAL DEVELOPMENT
In the regulated self-regulation, the self-regulation is frame worked by the government
however; the government will not be involved. This type of self-regulation was developed first in
Australia.
Co-regulation
If the private regulation and the government cooperate in the joint organization, the
regulation will be called as co-regulation. This is a type of self-regulation, which is done under
the government regulator’s shadow that means that all the sides act under the risk, which the
government can intervene if the public interests are threatened seriously.
Modern self-regulation first started in the United States of America with the association
of industry, which defined the own codes of conduct. The new field of the industry and the self-
regulation has improved in the relation to internet that is based on the practice codes. The
regulated issues are like protection of the minors and the filtering software application, public
dependency and privacy.
Question 9:
After analyzing the current technological growth it has been noticed that the new
technologies attracts several significant security threats to the privacy of the individuals.
Followed by this concern the identified threats on the privacy concern is listed below:-
Hacking- is one of the most popular cyber security threat that has the intention to get the
unauthorized access of the user data which holds a major threat into the privacy concern
of the user data.
Virus, Worm and Trojan Horses- are the types of infected programmer that holds the
capabilities to spread the infection among the targeted user information. Followed by this
In the regulated self-regulation, the self-regulation is frame worked by the government
however; the government will not be involved. This type of self-regulation was developed first in
Australia.
Co-regulation
If the private regulation and the government cooperate in the joint organization, the
regulation will be called as co-regulation. This is a type of self-regulation, which is done under
the government regulator’s shadow that means that all the sides act under the risk, which the
government can intervene if the public interests are threatened seriously.
Modern self-regulation first started in the United States of America with the association
of industry, which defined the own codes of conduct. The new field of the industry and the self-
regulation has improved in the relation to internet that is based on the practice codes. The
regulated issues are like protection of the minors and the filtering software application, public
dependency and privacy.
Question 9:
After analyzing the current technological growth it has been noticed that the new
technologies attracts several significant security threats to the privacy of the individuals.
Followed by this concern the identified threats on the privacy concern is listed below:-
Hacking- is one of the most popular cyber security threat that has the intention to get the
unauthorized access of the user data which holds a major threat into the privacy concern
of the user data.
Virus, Worm and Trojan Horses- are the types of infected programmer that holds the
capabilities to spread the infection among the targeted user information. Followed by this
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7IT PROFESSIONAL DEVELOPMENT
concern it can be stated that these identified infected programs are highly malicious that
may permanently delete the user information.
Social Engineering- is also one of the major security threat which initiates its work by
manipulating the targeted victim and then the hacker gets the access of the user data.
Currently the threats of social engineering is one of the major data threat in new
technology.
After considering the above aspect a detail mitigation strategy to address, these 3 issues
are listed below:-
In order to reduce the possibilities of hacking the user must protect their data and system
strong password.
In order to avoid the threats related to the Virus, Worm and Trojan Horses the user
must implement anti-virus to the system as well as they must avoid visiting random
website from the internet.
In order to eliminate the possibilities of social engineering it is very essential to be aware
of the possible security threats and must avoid visiting the random website in internet.
concern it can be stated that these identified infected programs are highly malicious that
may permanently delete the user information.
Social Engineering- is also one of the major security threat which initiates its work by
manipulating the targeted victim and then the hacker gets the access of the user data.
Currently the threats of social engineering is one of the major data threat in new
technology.
After considering the above aspect a detail mitigation strategy to address, these 3 issues
are listed below:-
In order to reduce the possibilities of hacking the user must protect their data and system
strong password.
In order to avoid the threats related to the Virus, Worm and Trojan Horses the user
must implement anti-virus to the system as well as they must avoid visiting random
website from the internet.
In order to eliminate the possibilities of social engineering it is very essential to be aware
of the possible security threats and must avoid visiting the random website in internet.

8IT PROFESSIONAL DEVELOPMENT
References
Dornhackl, H., Kadletz, K., Luh, R., & Tavolato, P. (2014, April). Malicious behavior patterns.
In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (pp.
384-389). IEEE.
Gisin, N., Fasel, S., Kraus, B., Zbinden, H., & Ribordy, G. (2006). Trojan-horse attacks on
quantum-key-distribution systems. Physical Review A, 73(2), 022320.
Greene, A. S. (2013). What is Constitutional Obligation. BUL Rev., 93, 1239.
Jullien, B., & Sand-Zantman, W. (2018). Internet regulation, two-sided pricing, and sponsored
data. International Journal of Industrial Organization, 58, 31-62.
Langweg, H., & Snekkenes, E. (2004, April). A classification of malicious software attacks.
In IEEE International Conference on Performance, Computing, and Communications,
2004 (pp. 827-832). IEEE.
McDermid, D. (2015). Ethics in ICT: an Australian perspective. Pearson Higher Education AU.
References
Dornhackl, H., Kadletz, K., Luh, R., & Tavolato, P. (2014, April). Malicious behavior patterns.
In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (pp.
384-389). IEEE.
Gisin, N., Fasel, S., Kraus, B., Zbinden, H., & Ribordy, G. (2006). Trojan-horse attacks on
quantum-key-distribution systems. Physical Review A, 73(2), 022320.
Greene, A. S. (2013). What is Constitutional Obligation. BUL Rev., 93, 1239.
Jullien, B., & Sand-Zantman, W. (2018). Internet regulation, two-sided pricing, and sponsored
data. International Journal of Industrial Organization, 58, 31-62.
Langweg, H., & Snekkenes, E. (2004, April). A classification of malicious software attacks.
In IEEE International Conference on Performance, Computing, and Communications,
2004 (pp. 827-832). IEEE.
McDermid, D. (2015). Ethics in ICT: an Australian perspective. Pearson Higher Education AU.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.