Your Name: Costa Banias
Student Number: 215162709
Deakin Email: cbanias@deakin.edu.au
Assignment – Part A
Question 1: Provide a brief explanation of each of the following security terms and provide an example of each. (~250 Words) o Something the user is, also known as biometrics is a type of authentication system that examines person’s natural physical characteristics. There are various applications that can be undertaken such as retina scans, fingerprint scans, facial recognition and iris scans. Of these retina and fingerprint scans appear to give the most definitive form of identification. o Something the user has is a form of authentication in which the person has regular identification …show more content…
List three (3) acceptable and three (3) unacceptable activities you would include in an ‘acceptable internet usage’ policy? (~250 Words)
Insert your answer here
Question 3: List and describe the three fundamental tenets of Ethics in a business environment. Explain why ‘unethical is not necessarily illegal’ and give an example that shows this? (~250 Words) 185-186
Insert your answer here
Question 4: Informed consent is an important consideration for an organisation’s customers and their Privacy Policy. Identify and describe the two models of informed consent typically used in eCommerce and Social Networking sites privacy policies. Which is the preferred option? Justify your answer. (~250 Words) 192-193
Insert your answer here
Assignment – Part B
A case study analysis using Toulmin’s Model of Argument (~600 WORDS)
Use the Toulmin Table provided for your answers.
Element Sentence/s
Claim Australian business is an ‘easy target’ for cyber attacks
Evidence • Last week Graham Ingram, the General Manager of Australia Independent Cyber Emergency Unit (AusCert), told a security conference Australia was as much as five years behind the latest cyber