Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

READINGS: Textbook: Principles of Information Security, Fourth Edition - Ch 1 2 - Legal, Ethical, and Professional Issues in Information Security. Please keep the font

READINGS: Textbook: Principles of Information Security, Fourth Edition -Ch12-
Legal, Ethical, and Professional Issues in Information Security. Please keep the font size
to 12(Arial).
Please read the following case (Page 89 of the textbook w some modifications) and answer
the questions that follow. Submit your answers as required.
Note: Try to use what you learned in the lectures and what you have experienced in
dealing with the issues of Ethics in Computing Profession in your own career.
Henry Magruder made a mistake-he left a "Flash" at the coffee station. Later, when Iris
Majwubu was topping off her mug with fresh tea, hoping to wrap up her work on the current
SQL code module before it was time to go home, she saw the Flash on the counter.
Being the helpful sort, she picked it up, intending to return it to the person who'd left it behind.
Expecting to find perhaps the latest device drivers, or someone's work from the development
team's office, Iris slipped the flash into her laptop and ran a virus scan on its contents before
opening the file explorer program.
She had been correct in assuming the flash contained data files, and lots of them. She opened
a file at random: names, addresses, and Social Security numbers appeared on her screen.
These were not the records she expected; they looked more like critical payroll data
Concerned, she found a readme.txt file and opened it.
It read: Jill, see files on this disc. Hope they meet your expectations. Wire money to account
as arranged. Rest of data sent on payment.
Iris realized that someone was selling sensitive company data to an outside information
broker. She looked back at the directory listing and saw that the files spanned the range of
every department at Sequential Label and Supply-everything from customer lists to shipping
invoices.
She saw one file that appeared to contain the credit card numbers of every Web customer the
company supplied.
She opened another file and saw that it only contained about half of the relevant data.
Whoever did this had split the data into two parts. That made sense: payment on delivery of
the first half.
Now, who did this belong to? She opened up the file properties option on the readme.txt file.
The file owner was listed as "hmagruder." That must be Henry Magruder, the developer two
cubes over in the next aisle. Iris pondered her next action.
Iris called the company security hotline. The hotline was an anonymous way to report any
suspicious activity or abuse of company policy, although Iris chose to identify herself.
The next morning, she was called to a meeting with an investigator from corporate security,
which led to more meetings with others in corporate security, and then finally a meeting with
the director of human resources and Gladys Williams, the CIO of SLS.
Questions:
(e)1a. Describe the professional responsibilities in computing
List two professional organization that Iris should apply to better understand
and use their code of ethics in such scenario.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Mobile Communications

Authors: Jochen Schiller

2nd edition

978-0321123817, 321123816, 978-8131724262

More Books

Students also viewed these Programming questions

Question

Did the school meet Adequate Yearly Progress (AYP)?

Answered: 1 week ago