Information System Homework Help

Our professional writers will address all you homework
requirements and provide a quality paper with guarantees of 100% plagiarism free.
We provide 24/7 customer Support.

Order Research Paper In a Few Clicks



    Get my paper done

    By clicking “Get my paper done”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related emails.

    Information System Homework Help

    Part 1 For the first part of the assessment, I want you to read the case study on page 449-450 in the textbook.  Then turn to page 497, continue reading the case study about password cracking between Charlie and Peter. Answer the discussion questions #1 and #2 1 Would the use of such a tool be an ethical violation on Charlie’s part? Is it illegal? 2. Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter’s call, Charlie calls back to give Peter his key: “We got lucky and cracked it early.” Charlie says this to preserve

    Part 1
    For the first part of the assessment, I want you to read the case study on page 449-450 in the textbook.  Then turn to page 497, continue reading the case study about password cracking between Charlie and Peter.
    Answer the discussion questions #1 and #2
    1 Would the use of such a tool be an ethical violation on Charlie’s part? Is it illegal?
    2. Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter’s call, Charlie calls back to give Peter his key: “We got lucky and cracked it early.” Charlie says this to preserve Peter’s illusion of privacy. Is such a “little white lie” an ethical action on Charlie’s part?
    Be sure to cite your references using APA style guidelines
    Part 2
    Assessment Instructions:
    Read the embedded .pdf and provide a 1-2 page assessment of the case study. In your assessment, be sure to correctly identify the problem statement being hypothesized along with the concluding recommendation from the authors.
    Be sure to cite your references using APA style guidelines.
    Part 3
    Throughout the first few pages in Chapter 6, you read about all different types of access controls. You read about role-based, attribute-based, and so on (refer to the chart on page 326-327 in the textbook).
    Access controls are extremely important for any organization. By properly implementing access controls, you as a security expert can save the network from being attacked both by an insider and of course from an outsider.
    Assessment Instructions:
    For this assessment, you are to find a scholarly article on one of the access control methods you read about, preferably about the one that intrigues you the most. Use the Library or Google Scholar to find the article. I want you to conduct a short literature review of the article. In this review, be sure to include the problem statement and what the conclusion was from the article. Your opinions matter in this review.
    The literature review should be no more than 5 pages long.
    Be sure to cite your references using APA style guidelines.