IT190M5: Developing a Computer Use Policy Addressing Ethical Issues

Verified

Added on  2023/06/11

|4
|591
|402
Report
AI Summary
This report provides an overview of computer network security and ethical considerations within an IT context, specifically addressing the requirements of the IT190M5 assignment. It begins by defining ethical computing and delves into plagiarism and copyright infringement, highlighting their differences and methods for detection, including a real-world example of plagiarism in the news. The report further explains copyleft and software piracy, detailing the associated legal penalties. It also covers the ethical and legal implications of piggybacking, emphasizing the importance of upholding good ethics on social media and the legal aspects of employer monitoring of employee communications. Finally, it provides practical recommendations for securing personal computers and home networks, including the use of antivirus software, firewalls, strong passwords, and MAC address filtering. This resource is available for students to study and use as a guide, with more solved assignments and past papers available on Desklib.
Document Page
Running head: Computer network security 1
Computers and networks security
Student’s name
University affiliation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer network security 2
Ethical computing is the exercising of computer ethics. It is a branch of computing. It
involves doing the right things in cyberspace, that of the dual mission of computer ethics that
intends to establish ethical standards and extend ethical practice and promote exchange and
sharing of problems and knowledge among practitioners, scholars and the general public (Boneh,
D., & Mitchell, J. 2005).
Plagiarism is stealing and to the passing of ideas or words of another as one’s own. It is an act
of fraud. Plagiarism is a crime but can constitute copyright infringement. These two overlap to
some considerable extent but are not the same. Copyright infringement is using the works
safeguarded by copyright law with no permission. The main difference between copyright
infringement and plagiarism is that not all infringements are plagiarism and not all plagiarisms
are infringements. In case of plagiarism, one can know by running your articles through the
plagiarism checker. There have been cases reported before plagiarism. In one instance during
this year 2018 musician Azealia Banks claimed that RuPaul had plagiarized her song.
Copyleft is a kind license that tries to ensure that the public has the freedom to use, modify
and distribute creative work.
Software piracy is illegally copying and distributing or using the software. If sued, the
penalty is $100,000 for every title infringed. If charged with a criminal violation, the fine is
$250,000 for every title infringed and five years in prison.
Piggybacking is unauthorized accessing of wireless LAN. The aim is to gain free network
access and not to for malicious intentions, although it slows data transfer for legitimate users.
Piggybacking can lead to felony charges. It can also lead to a fine or jail time.
One must uphold good ethics when using social media to avoid insults and any bad conduct
that ruins human relationships. An example in the news where an employee was terminated due
Document Page
Computer network security 3
to actions on social is a story of fourteen Canadian men who got fired after they posted an
insulting post on twitter.
Technology has allowed employers to virtually monitor communications made by employees
through computers at workplace including emails. This is actually allowed legally.
Keylogging. A UK student jailed for using keyloggers to up his exam marks.
Reading emails. A court found an employer in Harvard University guilty of reading emails of 16
faculty deans.
Monitoring internet usage. In 2002 court in the USA ruled that monitoring internet usage of
employees is legal.
Ways of securing personal computers include; Installation of antivirus software,
Installing firewall, installation of anti-spyware software, checking on security settings of the
browser, Use complex and secure passwords. And ways of securing home networks include;
Switching off router when you are not using, using MAC address filtering, changing router
administrator’s password (Kizza, J. M. 2001).
Document Page
Computer network security 2
References
Boneh, D., & Mitchell, J. (2005). Computer and Network Security.
Kizza, J. M. (2001). Computer network security and cyber ethics. McFarland.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]