Ipt Website

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Describe the social and ethical issues of maintaining the information

gathered safe.

In society today are living in the information age which can be described as an era
were economic activities are mainly information based (an age of industrialisation).
This is due to the development and use of technology. The main characteristics of this
era can be summarized as a rise in the number of knowledge workers, a world that
has become more open - in the sense of communication and internationalization. This
paradigm shift brings new ethical and juridical problems which are mainly related to
issues such as the right of access to information, the right of privacy which is
threatened by the emphasis on the free flow of information, the protection of the
economic interest of the owners of intellectual property and the Accuracy of data
and information.

A more recent example of a social and also major ethical issue has been the Christ
church massacre which Facebook allowed the shooter to do a live, but however
through that live video being able to be shared more than a thousand times and not
taken down as soon as possible. Through that incident Facebook had been
questioned for the accuracy and also appropriateness of videos being able to be
shared through the social media outlet, also how it was not meeting the safety
requirements of users. In addition, a few months before Facebook was again targeted
through there leakage of personal private information on the messenger app due to
Facebook breaching privacy issues of sharing their user’s information also putting the
users into danger instead of safety.

From the perspective of software design and development, the major social and
ethical issues include:

 The impact of software

 Rights and responsibilities of software developers

 Software piracy and copyright

 Use of networks and who uses it

 The software markets

 Legal implications
Accuracy of Data and Information

Inaccurate data results in incorrect information being output from the information
system. The consequences of such incorrect information can be minor or major. The
term ‘data integrity’ is used to describe the correctness and validity of data. All
information systems should include mechanisms for maximising data integrity.
Accuracy of Data and Information has been a major ethical issue in society due to
there being false information portrayed to individuals.

However as there are many issues surrounding the process there are various
techniques used including: data validation and data verification checks. Data
validation involves checking the data is in the correct format and is reasonable as it
gets entered into the system. For example, the HSC assessment mark in a course must
be a number between 0 and 100; the software can perform such validation and
ensure that this is the case. However, knowing the mark entered is your actual result
requires a completely different technique. Data verification checks ensure the data
entered is actually correct. For example, although 97 is a legitimate HSC mark, it might
have been mistyped as 79, data verification aims to correct such errors. In this case
the data entry operator may be required to physically check each entered mark
before pressing the submit data. Verifying data as correct is a much more difficult task
than validating it as reasonable. Data can become inaccurate over time, which can
lead to social issues being created.

The accuracy of collected data is improved when the format of data collection forms
ensure data is in the required format and required range. Both computer and paper-
based forms can include masks that provide a template to indicate the format of the
data required.

Security of information and data

Security of most assets is tied in with guarding against burglary or demolition. A case
of this would be the alarm of your vehicle; it means to keep away vandals and robbers.
Pin codes and passwords on cell phones are prohibitive to burglary. Comparative
methods are utilized to ensure information and data, anyway there is an extra issue to
this. Most information and data can be effectively be altered or replicated with no
perceptible change to the first. Consequently, we require extra procedures and
methods for managing the security of information and data.
Some security issues that all have raised social and ethical issues and originators need
to consider incorporates:

· Virus assaults:
Infections are programming programs that intentionally produce some undesired or
undesirable outcome. Most infections are spread by means of connections to
messages yet in addition tainted media, for example, streak drives and CDs

· Hackers:
These are individuals, regularly with a wide specialized information and aptitude, who
intends to survive or get around any security components utilized by a PC framework.
This enables them to see, use and even alter information and data of your own, can
range from private and personal such as account details to simple online gaming
hacks

· Theft:
Unauthorized duplication of information and data onto another framework.
Additionally, physical burglary of equipment, as a result, the information and data it
contains.

· Unauthorized access by over a significant time span worker:


Past and present representatives may malevolently mess with information or they may
view and utilize information of a private sort improperly.

· Hardware deficiencies:
Failure of equipment, and specifically stockpiling drives, can result in loss of
information. It is inescapable that equipment will in the long run fizzle sooner or later.

· Passwords:
Passwords are utilized to affirm that a client who they state they are. When checked
the client name is then utilized by the framework to dole out specific access rights to
the client
Explain at least three consequences if the information was hacked and leaked

Cybercrime is now a sophisticated transnational threat that operates on a significant


scale and has become an increasingly important issue for the global community.
Hacking is defined as the unauthorized access or entry into computers, computer files,
online storage mechanisms, and other computer-related technologies. This entry
often results in a data breach. Usually, hacking is aimed at obtaining confidential
information such as financial records, bank accounts, company client profiles, trade
secrets, copyrighted information, and other similar types of information.

In Australia cybercrime describes both crimes directed at computers or other


information communications technologies (ICTs) such as hacking and denial of
service attacks, as well as traditional crimes where computers or ICTs are an integral
part of the offence such as online fraud, money laundering and identity theft.

Key legislation
Criminal Code

Main offences
s.478.1(1) Criminal Code—unauthorised access to, or modification of, restricted data;

s.477.3(1) Criminal Code—unauthorised impairment of electronic communication;

s.474.17 Criminal Code—using a carriage service to menace, harass or cause offence.

Penalties
The maximum penalty for unauthorised access to, or modification of, restricted data
is 2 years’ imprisonment;

The maximum penalty for unauthorised impairment of electronic communication is 10


years’ imprisonment;

The maximum penalty for using a carriage service to menace, harass or cause
offence is 3 years’ imprisonment.

Table: Cyber Crimes and the penalties of some cyber crimes


What Are Some Examples of Hacking?

Hacking can be accomplished through many different means. These can include:

Stealing someone’s password or computer security information

Using computer programs or viruses to access computer files

Physically stealing computer hardware and accessing the information later

Using online mechanisms or other cybercrime techniques to gain entry into computer
networks from a remote location

Accessing information stored in “cloud” storage devices

Tampering with wi-fi connections in order to gain access to local networks

Gaining password/security information through lawful means, then abusing those


access privileges for personal use (this is common in embezzlement-related cases)

Altering computer codes or website information

A recent Example of hacking has been a Chinese contractor for finance giant AMP
has been caught before the courts for downloading customers’ personal information
in what police say was a major data breach. Yi Zheng, has pleaded guilty to
downloading documents, including passports and driver’s licences, of 20 different
customers at AMP, which he then sent to his personal Gmail account in October last
year which he not only breaches the copyright law but also privacy laws due to the
exposures of personal detail of AFP individuals. According to a report from The
Australian, he was caught after he attempted to install a dark-web Internet browser
on his AMP laptop in December, using an external USB storage device and picked up
by AMP’s software program Dtex to automatically alert AMP’s cyber-security staff. A
month later, he was arrested by NSW Border Force officers as he tried to board a flight
to China. Officers seized mobile phones, SIM cards, a laptop and electronic storage
devices. Zheng’s lawyer William Chan entered a plea of guilty at the Downing Centre
Local Court. He will be sentenced next month with a possible sentence of a few years
in jail.

Are There any Legal Penalties for Hacking?


Hacking is a serious violation and can lead to serious legal consequences. Depending
on the damage rendered or the amounts stolen, hacking is often classified as a
misdemeanour or felony white collar crime. Criminal penalties can include jail or prison
time as well as criminal fines and retribution. In addition, a person or company whose
computer files have been hacked may often seek civil damages as well. This can
result in monetary damages awards for lost business income or lost profits. In particular,
hacking computers owned or operated by the U.S. government can lead to severe
legal penalties under the Computer Fraud and Abuse Act, the Espionage Act, or other,
similar laws.
Leakage
Data leakage is the unauthorized transmission of data from within an organization to
an external destination or recipient. The term can be used to describe data that is
transferred electronically or physically. Data leakage threats usually occur via the web
and email, but can also occur via mobile data storage devices such as optical media,
USB keys, and laptops. Data leakage, also known as low and slow data theft, is a huge
problem for data security, and the damage caused to any organization, regardless
of size or industry, can be serious. From declining revenue to a tarnished reputation or
massive financial penalties to crippling lawsuits, this is a threat that any organization
will want to protect themselves from.

https://www.channelnews.com.au/chinese-amp-contractor-pleads-guilty-to-data-
breach/

(Case used for data Leakage example and consequences)

A very important and recent case on data leakage has been the Julian Assange Case.
Charges against Assange involved one of the biggest compromises of US classified
information. The WikiLeaks founders. US government counsel Ben Brandon had told
the court the conspiracy to commit computer intrusion charge against Assange
involved one of the biggest compromises of classified information in history. It included
hundreds of thousands of activity reports relating to the Afghanistan and Iraq wars
and some 250,000 US diplomatic cables. The US accuses Assange of conspiring with
former US Army intelligence analyst Chelsea Manning to crack passwords to gain
access to the information, which was subsequently posted on WikiLeaks. He will face
up to five years in a US prison if convicted.

You might also like