Chegg I need you assistance once again for my next task. I\'m to write a short e
ID: 3729031 • Letter: C
Question
Chegg I need you assistance once again for my next task. I'm to write a short evaluation outlining the ethical violations you believe you have found. Describe why they are ethical violations. Be sure to consider all perspectives, not just those of one side (the company) or the other (the employees). Reference any code of ethics you are using. Use either the Acceptable Use Policy of the company you work for or, if there isn't one, use the SANS policy. Below in bold is the senario for my next task
The YoYoDyne Propulsion Systems network has started to become overly congested at certain times of the day so management has decided to perform some packet capture and analysis on the network. The goal is to determine areas where there can be improvements made to the network. This will also help management understand where there may be misutilization of the network. The results reported here are for the month of August, 2014.
Results
The following are areas where there was a lot of excess bandwidth use because of unusually large downloads.
A number of downloads from www.ea.com. This included URLs that reference sims-3, battlefield-3 and mass-effect-3. The majority of these downloads were to a single IP address – 172.17.19.203
Large downloads from the Apple network including URLs referring to iTunes with file extensions ending in .aac and .m4v.
Large downloads from Microsoft with file extensions ending in .exe. A lot of bandwidth was consumed on August 12 & 13, 2014. While it didn’t impair our network connection, it was a lot of bandwidth used across those two days.
Large file downloads throughout the month from Ubuntu.com as well as redhat.com. These were in the multi-gigabyte range per download.
Last.FM and Pandora were large consumers of bandwidth across the company.
There was a lot of activity to Dropbox.com and less to Box.com throughout the month.
There was a lot of activity to Webmail sites. Some usernames and passwords were captured. They are listed in the table below.
Username
Password
P4ssw0rd!1
B111C05by%
Alpha1@scramble.com
MyPassword123
foulthings@freewebmail.com
Passwords
me@me.com
Me123ABC$
foo@foo.com
F00ness1!
There was a lot of activity to banking sites and there were banking account numbers as well as some usernames captured but these have been left out of the report due to their sensitive nature.
There was a lot of activity on Twitter, Facebook and LinkedIn throughout the month. While Facebook activity came from IP addresses across the company, the majority of Twitter use resolved to a small number of IP addresses on the floor where sales, marketing and customer service are.
There was a lot of activity to ESPN, primarily from the floor where sales is located and most of the activity took place in the morning, though in the early part of the month there was a lot of activity all day long.
Conclusions
YoYoDyne Propulsion Systems would benefit from implementing a caching proxy server. This would allow content to be cached at the proxy, reducing the amount of bandwidth being consumed to our service provider. It would also allow us to restrict access to particular sites that we felt offered risk to us.
One area not considered for this activity was e-mail exchanges. This should be evaluated as well.
Username
Password
P4ssw0rd!1
B111C05by%
Alpha1@scramble.com
MyPassword123
foulthings@freewebmail.com
Passwords
me@me.com
Me123ABC$
foo@foo.com
F00ness1!
Explanation / Answer
Ethical violations(User side):
Large downloads from ea.com by a particular ip address is clear violation of ethical code. The user is downloading game setups during office hours.
Songs download from apple network is also an ethical violation.
.exe files download from Microsoft site needs to be further evaluated to check if the setups are necessary or not.
Time on facebook needs to be limited for users.
All day activity on ESPN needs to be stopped. For Ubuntu.com and redhat.com the setup downloads need to be evaluated and there should be a central directory which contains approved softwares from where the user can take thoose setups and need not download the softwares multiple times.
Ethical violations(Company side):
Capturing Username and password from webmail sites is privacy violation for users.
Banking account numbers shouldn't be captured. The activities should be monitored based on machines' IP.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.