Ipt Website
Ipt Website
Ipt Website
gathered safe.
In society today are living in the information age which can be described as an era
were economic activities are mainly information based (an age of industrialisation).
This is due to the development and use of technology. The main characteristics of this
era can be summarized as a rise in the number of knowledge workers, a world that
has become more open - in the sense of communication and internationalization. This
paradigm shift brings new ethical and juridical problems which are mainly related to
issues such as the right of access to information, the right of privacy which is
threatened by the emphasis on the free flow of information, the protection of the
economic interest of the owners of intellectual property and the Accuracy of data
and information.
A more recent example of a social and also major ethical issue has been the Christ
church massacre which Facebook allowed the shooter to do a live, but however
through that live video being able to be shared more than a thousand times and not
taken down as soon as possible. Through that incident Facebook had been
questioned for the accuracy and also appropriateness of videos being able to be
shared through the social media outlet, also how it was not meeting the safety
requirements of users. In addition, a few months before Facebook was again targeted
through there leakage of personal private information on the messenger app due to
Facebook breaching privacy issues of sharing their user’s information also putting the
users into danger instead of safety.
From the perspective of software design and development, the major social and
ethical issues include:
Legal implications
Accuracy of Data and Information
Inaccurate data results in incorrect information being output from the information
system. The consequences of such incorrect information can be minor or major. The
term ‘data integrity’ is used to describe the correctness and validity of data. All
information systems should include mechanisms for maximising data integrity.
Accuracy of Data and Information has been a major ethical issue in society due to
there being false information portrayed to individuals.
However as there are many issues surrounding the process there are various
techniques used including: data validation and data verification checks. Data
validation involves checking the data is in the correct format and is reasonable as it
gets entered into the system. For example, the HSC assessment mark in a course must
be a number between 0 and 100; the software can perform such validation and
ensure that this is the case. However, knowing the mark entered is your actual result
requires a completely different technique. Data verification checks ensure the data
entered is actually correct. For example, although 97 is a legitimate HSC mark, it might
have been mistyped as 79, data verification aims to correct such errors. In this case
the data entry operator may be required to physically check each entered mark
before pressing the submit data. Verifying data as correct is a much more difficult task
than validating it as reasonable. Data can become inaccurate over time, which can
lead to social issues being created.
The accuracy of collected data is improved when the format of data collection forms
ensure data is in the required format and required range. Both computer and paper-
based forms can include masks that provide a template to indicate the format of the
data required.
Security of most assets is tied in with guarding against burglary or demolition. A case
of this would be the alarm of your vehicle; it means to keep away vandals and robbers.
Pin codes and passwords on cell phones are prohibitive to burglary. Comparative
methods are utilized to ensure information and data, anyway there is an extra issue to
this. Most information and data can be effectively be altered or replicated with no
perceptible change to the first. Consequently, we require extra procedures and
methods for managing the security of information and data.
Some security issues that all have raised social and ethical issues and originators need
to consider incorporates:
· Virus assaults:
Infections are programming programs that intentionally produce some undesired or
undesirable outcome. Most infections are spread by means of connections to
messages yet in addition tainted media, for example, streak drives and CDs
· Hackers:
These are individuals, regularly with a wide specialized information and aptitude, who
intends to survive or get around any security components utilized by a PC framework.
This enables them to see, use and even alter information and data of your own, can
range from private and personal such as account details to simple online gaming
hacks
· Theft:
Unauthorized duplication of information and data onto another framework.
Additionally, physical burglary of equipment, as a result, the information and data it
contains.
· Hardware deficiencies:
Failure of equipment, and specifically stockpiling drives, can result in loss of
information. It is inescapable that equipment will in the long run fizzle sooner or later.
· Passwords:
Passwords are utilized to affirm that a client who they state they are. When checked
the client name is then utilized by the framework to dole out specific access rights to
the client
Explain at least three consequences if the information was hacked and leaked
Key legislation
Criminal Code
Main offences
s.478.1(1) Criminal Code—unauthorised access to, or modification of, restricted data;
Penalties
The maximum penalty for unauthorised access to, or modification of, restricted data
is 2 years’ imprisonment;
The maximum penalty for using a carriage service to menace, harass or cause
offence is 3 years’ imprisonment.
Hacking can be accomplished through many different means. These can include:
Using online mechanisms or other cybercrime techniques to gain entry into computer
networks from a remote location
A recent Example of hacking has been a Chinese contractor for finance giant AMP
has been caught before the courts for downloading customers’ personal information
in what police say was a major data breach. Yi Zheng, has pleaded guilty to
downloading documents, including passports and driver’s licences, of 20 different
customers at AMP, which he then sent to his personal Gmail account in October last
year which he not only breaches the copyright law but also privacy laws due to the
exposures of personal detail of AFP individuals. According to a report from The
Australian, he was caught after he attempted to install a dark-web Internet browser
on his AMP laptop in December, using an external USB storage device and picked up
by AMP’s software program Dtex to automatically alert AMP’s cyber-security staff. A
month later, he was arrested by NSW Border Force officers as he tried to board a flight
to China. Officers seized mobile phones, SIM cards, a laptop and electronic storage
devices. Zheng’s lawyer William Chan entered a plea of guilty at the Downing Centre
Local Court. He will be sentenced next month with a possible sentence of a few years
in jail.
https://www.channelnews.com.au/chinese-amp-contractor-pleads-guilty-to-data-
breach/
A very important and recent case on data leakage has been the Julian Assange Case.
Charges against Assange involved one of the biggest compromises of US classified
information. The WikiLeaks founders. US government counsel Ben Brandon had told
the court the conspiracy to commit computer intrusion charge against Assange
involved one of the biggest compromises of classified information in history. It included
hundreds of thousands of activity reports relating to the Afghanistan and Iraq wars
and some 250,000 US diplomatic cables. The US accuses Assange of conspiring with
former US Army intelligence analyst Chelsea Manning to crack passwords to gain
access to the information, which was subsequently posted on WikiLeaks. He will face
up to five years in a US prison if convicted.