Tuesday, May 5, 2020

Information Technology Ethics Procedures

Question: Discuss about the Information Technology Ethics Procedures. Answer: Introduction: A team of academics has claimed that, in Tesco Bank a wide range of external attack is taking place due to lack of protection. The news has been reported on 2nd December, 2016 in Australia (Jones, 2016). Unsophisticated type of external attack exploited the visa card payment system that has been used by the consumer of Tesco Banking Management Company in the last month. A set of survey reported that, the new emerging technologies are enabling the cyber criminals more active as they are easily getting information regarding the debit card and credit card numbers. However, the attack technique is referred to as distributed guessing attack. The private information of more than 500 cards has been exploited currently due to lack of security features (Stolfo, SSalem Keromytis, 2012). In order to avoid these problems, many additional security features are currently added up to the online payment process. What are the different facts? Currently, the rate of hacking during online transaction process is increasing widely all over the world. In order to reduce this issue the most of the well known online retail websites are currently changed the online security setting to keep the websites secured from the external attacks (Jenjarrussakul Matsuura, 2014). Fraud prevention is one of the major concerns in online transaction. On the other hand, it has been found that hackers cannot get the details of master card users in the same way. Specifically, this kind of hacking is not applicable for master card. The guessing attack is also not applicable for those who are using the 3-D security technologies to provide extra protection (Myers, 2015). The 3-D protection technology includes verification made y visa, master security code etc. Since two to three months this issue was raised and come under focus but after the incident of Tesco bank, were more than 9,000 consumers got affected, this news was officially reported. Ethical and non ethical issues The Newcastle team has identified different types of hacking procedures. This type of hacking was based on complete guess work that generally used by the hackers. The term hacking itself is referred to as one of the major ethical issue (Kim et al., 2015). In hacking the official banking details and personnel details of the users can be theft by the attackers and those can be misuse by them at the same time. Sometimes, hacking become necessary due to its association with legal requirement, rather legal needs. In order to search criminals sometimes it becomes necessary to hack the personnel details; this is unethical but from the legal perspectives it is non ethical (Stolfo, Salem Keromytis, 2012). Cyber attack is ethical issue whereas, for the companys benefit if personnel data is getting hacked then, it will be termed as non ethical issue. Particularly for Tesco banking, hacking of debit card details is ethical issue. Who is affected? Particularly, for the Tesco banking details hacking incident, the affected were the users of the credit card and debit card. The personal data and the banking details that are required to be stored to make the cards valid were hijacked by the external attackers (Shang et al., 2014). Tough the attackers hacked those data with guess works. The victims of the hacking incident are not only the debit and credit card users but also the Tesco banking organization itself. It has been found that, the minimum data those are required, to hack the credit details are not properly secured by the company (Acharya Kamath, 2013). In order to keep the data secured currently most of the retail websites are using 3-D protection or security technologies (Jenjarrussakul Matsuura, 2014). Therefore, from the organizational perspective it can be said that, Tesco banking and the users of Tesco credit and debit cards users are affected due to the hacking incident. Ethical issue and its implication The detected ethical issue is the stealing of banking details of the users of the Tesco credit and credit card. With the help of a guess work the banking details of the users are getting hijacked and also misused. This is the ethical issue and in order to resolve this problem the banking executives have decided to use the 3-D security technology (Jones, 2016). The password or secret code of the card was guessed by the hackers and once they enable to get the code they steal the banking details. Generally during online transaction the data used to get hacked. What are the options? In order to resolve this issue already the report has given a very good option that is usage of 3-D security technology (Jones, 2016). Apart from this, there are many other options that can be used to resolve the hacking issue. Authentication is needed to be adopted so that the data stored in the banking account cannot be retrieved by any other external attackers. Another important option is encryption. In this technique all the data will be secured. A user who does not have the decryption key cannot fetch the data stored in the banking storage (Acharya Kamath, 2013). Another option is the usage of symmetric key; this kind of keys can be used by both the sender and the receiver of the data. During online transaction, if the receiver does not have the particular key that is required to retrieve the banking data, then they cannot fetch the data stored in the storage. Which option is best and why? Among the different given options the best option is the usage of 3-D security technology. The 3-D secured payment option is referred to as one of the best options of online money transaction. The technology is capable to provide a secured online payment method (Jenjarrussakul Matsuura, 2014). Basically for visa and master card, 3-D technology provides extra level of security to the users. It will help a user to protect him from unauthenticated use of the credit card. The 3-D technology is consists of master card secured code and is also verified by visa. References Acharya, U. D., Kamath, P. R. (2013). A secure and high capacity image steganography technique.arXiv preprint arXiv:1304.3629. Balogun, O. J., Ajiboye, F. A., Dunsin, A. T. (2013). An Investigative Study on Factors Influencing the Customer Satisfaction with E-Banking in Nigeria.International Journal of Academic Research in Economics and Management Sciences,2(6), 64. Jenjarrussakul, B., Matsuura, K. (2014, June). Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels. InThe 13th Workshop on the Economics of Information Security. Jones, R. (2016).Tesco Bank cyber attack involved guesswork, study claims.the Guardian. Retrieved 3 December 2016, from [online]: https://www.theguardian.com/technology/2016/dec/02/tesco-bank-cyber-attack-involved-simply-guessing-details-study-claims Kim, S. J., Ma, M. C., Lee, H. K., Kim, J. B. (2015). A Study on Service Architecture for Secure Authentication System.International Journal of Security and Its Applications,9(9), 9-20. Myers, A. (2015). Cross-Border Commerce without Constraint: Shifting from Territorial-Based Regulation to an Industry-Based Code of Conduct for the Online Payment Processing Industry.Fed. Comm. LJ,67, 434-434. Shang, W., Ding, Q., Marianantoni, A., Burke, J., Zhang, L. (2014). Securing building management systems using named data networking.IEEE Network,28(3), 50-56. Stolfo, S. J., Salem, M. B., Keromytis, A. D. (2012, May). Fog computing: Mitigating insider data theft attacks in the cloud. InSecurity and Privacy Workshops (SPW), 2012 IEEE Symposium on(pp. 125-128). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.