Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Chegg I need you assistance once again for my next task. I\'m to write a short e

ID: 3729031 • Letter: C

Question

Chegg I need you assistance once again for my next task. I'm to write a short evaluation outlining the ethical violations you believe you have found. Describe why they are ethical violations. Be sure to consider all perspectives, not just those of one side (the company) or the other (the employees). Reference any code of ethics you are using. Use either the Acceptable Use Policy of the company you work for or, if there isn't one, use the SANS policy. Below in bold is the senario for my next task

The YoYoDyne Propulsion Systems network has started to become overly congested at certain times of the day so management has decided to perform some packet capture and analysis on the network. The goal is to determine areas where there can be improvements made to the network. This will also help management understand where there may be misutilization of the network. The results reported here are for the month of August, 2014.

Results

The following are areas where there was a lot of excess bandwidth use because of unusually large downloads.

A number of downloads from www.ea.com. This included URLs that reference sims-3, battlefield-3 and mass-effect-3. The majority of these downloads were to a single IP address – 172.17.19.203

Large downloads from the Apple network including URLs referring to iTunes with file extensions ending in .aac and .m4v.

Large downloads from Microsoft with file extensions ending in .exe. A lot of bandwidth was consumed on August 12 & 13, 2014. While it didn’t impair our network connection, it was a lot of bandwidth used across those two days.

Large file downloads throughout the month from Ubuntu.com as well as redhat.com. These were in the multi-gigabyte range per download.

Last.FM and Pandora were large consumers of bandwidth across the company.

There was a lot of activity to Dropbox.com and less to Box.com throughout the month.

There was a lot of activity to Webmail sites. Some usernames and passwords were captured. They are listed in the table below.

Username

Password

James.walker@gmail

P4ssw0rd!1

juniorbarnes@live.com

B111C05by%

Alpha1@scramble.com

MyPassword123

foulthings@freewebmail.com

Passwords

me@me.com

Me123ABC$

foo@foo.com

F00ness1!

There was a lot of activity to banking sites and there were banking account numbers as well as some usernames captured but these have been left out of the report due to their sensitive nature.

There was a lot of activity on Twitter, Facebook and LinkedIn throughout the month. While Facebook activity came from IP addresses across the company, the majority of Twitter use resolved to a small number of IP addresses on the floor where sales, marketing and customer service are.

There was a lot of activity to ESPN, primarily from the floor where sales is located and most of the activity took place in the morning, though in the early part of the month there was a lot of activity all day long.

Conclusions

YoYoDyne Propulsion Systems would benefit from implementing a caching proxy server. This would allow content to be cached at the proxy, reducing the amount of bandwidth being consumed to our service provider. It would also allow us to restrict access to particular sites that we felt offered risk to us.

One area not considered for this activity was e-mail exchanges. This should be evaluated as well.

Username

Password

James.walker@gmail

P4ssw0rd!1

juniorbarnes@live.com

B111C05by%

Alpha1@scramble.com

MyPassword123

foulthings@freewebmail.com

Passwords

me@me.com

Me123ABC$

foo@foo.com

F00ness1!

Explanation / Answer

Ethical violations(User side):

Large downloads from ea.com by a particular ip address is clear violation of ethical code. The user is downloading game setups during office hours.
Songs download from apple network is also an ethical violation.
.exe files download from Microsoft site needs to be further evaluated to check if the setups are necessary or not.
Time on facebook needs to be limited for users.
All day activity on ESPN needs to be stopped. For Ubuntu.com and redhat.com the setup downloads need to be evaluated and there should be a central directory which contains approved softwares from where the user can take thoose setups and need not download the softwares multiple times.

Ethical violations(Company side):

Capturing Username and password from webmail sites is privacy violation for users.
Banking account numbers shouldn't be captured. The activities should be monitored based on machines' IP.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote