Category | Assignment | Subject | Management |
---|---|---|---|
University | Monash University (MU) | Module Title | FIT1057 Introduction to cybersecurity |
Word Count | 1250 Words |
---|---|
Assessment Type | Essay |
Assessment Title | Assessment: Case Study and Ethical Analysis |
Academic Year | 2025 |
This is an individual assignment where you will be required to write an essay in response to only ONEof the scenarios described on the next page (Bawden & Robinson, 2020). Your discussion should be based on academic sources1and the ethical principles that have been discussed in FIT1057 during Weeks 1, 4, and 7.
The word limit is 1250 words ± 10% (i.e., a minimum of 1125 words and a maximum of 1375 words). This word limit includes in-text citations and headings, but excludes the reference list. Penalties will apply for not adhering to the word limit. Any words beyond 1375 words will not be read by your marker.
1. Alice is a university librarian tasked with using library analytics to identify opportunities for service improvement. She finds an unusual pattern in the behaviour of some patrons, whom she identifies as mainly female students of technology subjects from a particular ethnic background. She believes that she can recommend targeted services to help this group of students. Although they will necessarily be identified, these students' data are being used only for the purpose for which it was collected: the improvement of library services. The students concerned will not be identified to others, and there seems to be no harm in what is proposed. The only impact on this group of students will be an offer of enhanced library services.
Identify ethical issues raised by the scenario. Critically discuss these in relation to the five ethical principles presented in this unit and, where you deem appropriate, utilitarianism and Kant's categorical imperative.
2. Taylor is employed to run penetration-tests for companies all over the world, often employing social engineering techniques such as vishing (extracting information from someone - typically, an employee of the company - over the phone) as a way to identify weaknesses in the company's online security. After running the penetration test, Taylor provides a report detailing all the security vulnerabilities uncovered, including those directly involving a human component which she identified through the use of social engineering techniques.
Identify ethical issues raised by the use of social engineering as part of a penetration-test. Critically discussthese in relation to the five ethical principles presented in this unit and, where you deem appropriate, utilitarianism and Kant's categorical imperative.
Buy Answer of FIT1057 Assignment & Raise Your Grades
Order Non Plagiarized AssignmentIf you are struggling with your FIT1057 Introduction to cybersecurity Essay Assessment: Case Study and Ethical Analysis? Be stress-free! AI-free Assignment Help is here for you. We assure you that our essay writing service will make you productive and help you achieve high grades in your academic year. A free list of assignment assignment sample written by PhD experts is also provided here that can help you boost your study power and check the quality of the research paper. So contact us today and get your high-quality assignment!
Let's Book Your Work with Our Expert and Get High-Quality Content