MIS101: Assignment

Improved Essays
MIS101 – Assignment Template – Trimester 1, 2015
Your Name: Costa Banias
Student Number: 215162709
Deakin Email: cbanias@deakin.edu.au
Assignment – Part A
Question 1: Provide a brief explanation of each of the following security terms and provide an example of each. (~250 Words) o Something the user is, also known as biometrics is a type of authentication system that examines person’s natural physical characteristics. There are various applications that can be undertaken such as retina scans, fingerprint scans, facial recognition and iris scans. Of these retina and fingerprint scans appear to give the most definitive form of identification. o Something the user has is a form of authentication in which the person has regular identification
…show more content…
List three (3) acceptable and three (3) unacceptable activities you would include in an ‘acceptable internet usage’ policy? (~250 Words)
Insert your answer here

Question 3: List and describe the three fundamental tenets of Ethics in a business environment. Explain why ‘unethical is not necessarily illegal’ and give an example that shows this? (~250 Words) 185-186
Insert your answer here

Question 4: Informed consent is an important consideration for an organisation’s customers and their Privacy Policy. Identify and describe the two models of informed consent typically used in eCommerce and Social Networking sites privacy policies. Which is the preferred option? Justify your answer. (~250 Words) 192-193
Insert your answer here
Assignment – Part B
A case study analysis using Toulmin’s Model of Argument (~600 WORDS)
Use the Toulmin Table provided for your answers.
Element Sentence/s
Claim Australian business is an ‘easy target’ for cyber attacks
Evidence • Last week Graham Ingram, the General Manager of Australia Independent Cyber Emergency Unit (AusCert), told a security conference Australia was as much as five years behind the latest cyber

Related Documents

  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Scott and Mia, I am not sure which one of your can help me, but in reconciling our account I have discovered a few issues and have some questions. The swiped amount on the reports provided for the GL reconciliation do not always match the swiped amount. I understand that a vendor can undercharge a charge and swipe a card multiple times, but I did not think they could process cards for more than the total payment amount. For example, in tying out our invoice for 2/28-3/6/2018 I found that the swiped amount ties to our invoice/what was paid out via our account, but the swiped amount is for a different amount than what was issued. In six of the seven instances where the swiped amount was different than the issued amount, the swiped amount…

    • 281 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    2. The IEEE 802.11n:- The IEEE 802.11n standard, appear in 2008, And become popular because the jump in data transfer rates from about 54 Mbps to nearly 600 Mbps. The IEEE 802.11n standard was officially completed in 2009 but most of the technical features were ratified in 2007. Most companies supported for the creation of a 60 GHz based standard for WLANs to succeed the 802.11n standard, and a lot of attention and effort was devoted to this activity.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    I affixed a hold tag on container #28, which was formerly known as container #9 and it was bulk packaged in my presence. As Katie mentioned below, the bulk packaging only requires the operator to remove and change the drum label, thus the container is easy to locate and sample. Let me know if there is anything that I can do to…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Elisha, for the month of April you scored 7.6 points per hour. Your current yearly average is 7.3 points per hour. The team average for the month of April was 9.2 points per hour and the department average for the same month was 9.2 points per hour. Elisha, you continue to perform well below the department expectations in productivity month-over-month. As stated before this cannot continue.…

    • 407 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Thank you Madeline for the response. Also I review the claim for the patient Williams,Elmira DOS 02/29/2016 and I see that the claim missing the authorization number since the patient have as a payer St.Francis Life. Would you please review and add the missing information on claim. Please email back so I can add the authorization number on the original claim that I will Hold in Trizetto.…

    • 66 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    As mentioned in 1a. , the students enrolling in the course are normally required to complete an out-of-class practice with a CALL software. Students who 1) do not take part in the research or 2) who later withdraw from the research will be recommended to refer back to the normal course principle and they will not be accounted as one of the participants (even in Group A) as they do not agree or no longer consent to take part in the research…

    • 82 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    1. Why did Congress enact the Sarbanes-Oxley Act? What are the major provisions and benefits of the Act? Congress enacted the Sarbanes-Oxley Act in order to protect investors. This was done by improving the accuracy and reliability of corporate disclosures made by in accordance with the securities laws.…

    • 1002 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    One thing that this ACA-122 class has taught me is how to email somebody properly; such as a professor, teacher, or anyone really. It’s impacted me because I had questions and had to email someone, but I didn’t know the correct format and how. The second thing is time management. Yes, you will have a ton of assignments due, but you have at least three weeks to do it for ACA. It impacted me because I do procrastinate and if you do that, it can be a problem for ACA.…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    I realized that a tremendous amount of players are not listening to staff, or being very toxic, hacking on the server, etc. I think the problem to this is the new people to this server, the new people are new to the server and are not aware of the rules, reason being they haven't really looked into them, Even though Cheating is bannable on most of the servers, they still might not know. They just want to play the server. Rule breakers/toxic players are not the only problem. The biggest problem, in my point of view are the questions that they have for the rules or server.…

    • 334 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. The media I use the most is television, while print is my least used form of media. This is what I had expected, since I rarely feel the desire to sit down and just read during the school year, I’d rather watch several television episodes. Relaxing on my bed or couch watching TV or Netflix sounds like a more enjoyable evening, instead of sitting at my desk reading boring textbooks for physics. Plus, I traveled home this weekend and all of my recorded shows were ready to be watched, since there is no DVR on the television in my dorm, therefore I had to view them before they’d be deleted.…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Digital Fingerprint

    • 546 Words
    • 3 Pages

    The main ethical issues of biometric technology are personal privacy violations, protection and use of personal data, and conflicting beliefs and values with objectification of the body. Other ethical concerns include that some individuals associate fingerprints with criminal activity and are uncomfortable with an involvement in something associated to crime, and that people feel embarrassed when facial recognition or other types of biometrics malfunction and they are rejected by a sensor in public areas. Question 3.…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Human Gait Recognition

    • 1629 Words
    • 7 Pages

    Gait recognition is a kind of biometric technology that can be used to monitor people or recognize known persons and classify unknown subjects. It is a particular way of walking on foot and its aims is to discriminate individuals by the way they walk. Gait is less unobtrusive biometric, non-contact, perceivable at a distance and hard to disguise where these properties makes it so attractive. The existing Gait representations capture both motion and appearance information which are sensitive to changes in various conditions such as carrying and clothing. Here proposed new method for gait recognition where in this method the firstly binary silhouette of a walking person is detected from each frame and secondly the feature from each frame is extracted…

    • 1629 Words
    • 7 Pages
    Improved Essays