Can anyone help me please with this one? Ethical Theory question asked to analyz
ID: 3591277 • Letter: C
Question
Can anyone help me please with this one?
Ethical Theory question asked
to analyze the above case study using either two or four classical ethical theories. So, it is always from the
four classical ethical theories such as utilitarianism, deontology, virtue and contract.
case :
Company X has just signed a business agreement with Company Y, which entitles both of them to access each other clients’ records. Mr. Faisal, a software programmer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company’s database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated. Several weeks later and during a normal test on the software developed, Faisal discovered a serious ‘security hole’ in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in Company Y’s database system could not be trusted as the security hole posed a threat even on Company X’s database system. Faisal told his manager about the problem and explained its significance. The manager's response was, "That's not our problem; let's just be sure that our software functions properly." Faisal is not sure what to do. Refusing to work on the project means disobeying his manager’s orders. Continuing to work on the project, means disobeying one of God’s commands, this requires him to be truthful and sincere in his dealings
same tike this sample
Doing ethics technique Answer
What is going on?
What are the facts?
What are the issues?
Who is affected?
What are the ethical issues and implications?
Character Ethics
Kantianism/Deontology
Consequentialism
What can be done about it?
What options are there?
Which option is best – and why?
Explanation / Answer
What is going on?
In between the two companies X and Y during the runtime they have face security holes in the database. And they are try the discovery how the hacker can hack the client data from the database.
What are the facts?
The security holes in the database.
Company need to discover the reason behind that.
What all necessary steps to take in order to eliminate the issues.
What might be the reason behind the security threats and how the hackers hacked the database.
What are the issues?
Client information is lost and few customising changes which are client specific are lost.
Who is affected?
If the client information is hacked and there will a alot of business impact in the furture and also in present.
We cannot the deliver the project to the vendor in time. There will be big business impact
What are the ethical issues and implications?
Here the issue is how both companies can overcome it and implicate the issue in time.
Which kind of data has been hacked and what if we can restore it from previous backups.
What can be done about it? What options are there? hich option is best – and why?
We must follow all the strategies which are available to database administrators who would prevent security breaches and the laws, rules, and standards that may be applicable to a company and this possible security breach are:
- Always Change the default passwords for the default users.
- And Do not reuse the same passwords.
- when ever an employee is in leave Always disable the user accounts.
- Always track the logs in the server or systems and examine all kind of security logs in servers.
- Always do the regular network scans in the server or system.
- Always monitor the outbound network traffic in order to avoid the Malware detection.
- Always have plan for security precautions and implement the security plan.
- In between the clients and vendors raise user awareness about the security info.
- And have the management support to implement the security plan.
- Always patch the systems and updates which are available and Keep the operating system and application software up to date.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.