Integrity

 

Explore one principle in depth and discuss it and others with your peers.
Principles of professional conduct to examine in the AICPA Code of Professional Conduct document: Integrity
Reflect on what appropriate practice of the principle would look like in the field, and also on some potential examples of violations of the principle. Use the following questions to help guide your reflections:
How would you define and describe the principle in your own words?
What value does the principle bring to practitioners, businesses, and clients?
What is an example of a difficult situation that a practitioner may face related to your selected principle, and what would an ethical response to the situation be? Why might a practitioner be tempted to, or accidentally, not take an ethical course of action?

 

 

 

Integrity

You learned the definition of the American Dream in Week 1. You also learned about the American identity. Traits often associated with the American identity include boldness, confidence, perseverance, and integrity. These traits are often demonstrated through a character’s words or actions. This week, we’ll focus on integrity. For this discussion, use any of the Week 4 readings except for “Woman Hollering Creek” and describe how two of the characters display strong moral principles.
Criteria:
300 words minimum (excluding quotations and citation)

Integrity

You learned the definition of the American Dream in Week 1. You also learned about the American identity. Traits often associated with the American identity include boldness, confidence, perseverance, and integrity. These traits are often demonstrated through a character’s words or actions. This week, we’ll focus on integrity. For this discussion, use any of the Week 4 readings except for “Woman Hollering Creek” and describe how two of the characters display strong moral principles.
Criteria:
300 words minimum (excluding quotations and citation)

Threats to the confidentiality, integrity, and availability of data

 

 

 

 

 

While threats to the confidentiality, integrity, and availability of data may originate from many types of attackers, the information security threats from trusted insiders—such as employees, vendors, and contractors—can be particularly insidious because the attackers have legitimate credentials on enterprise systems and networks. Insider threats may be difficult to detect because it can be challenging to differentiate between potentially harmful actions and an employee’s authorized work.

 

Share a relevant story ideally based on your personal or professional experiences about how a security incident originated with an attack vector that was opened, either maliciously or accidentally, by a trusted insider. Focus your discussion on the features that make this particular insider attack unique by describing the salient features of the attack, when and how the breach incident was discovered, the data that was illegally accessed, and the short- and long-term consequences of the attack to the organization.

Confidentiality, Integrity, Availability

Answer the following short-answer questions:
• Which of the following is not the principal goal of the cryptography? Select among Confidentiality, Integrity, Availability
• Which of the following is the principal goal of encryption? Select among Confidentiality, Integrity, Availability
• What is a cipher?
• How many keys are used in a secure communication between two parties that use a symmetric-key encryption algorithm?
• What might be the size of an encrypted message, if the size of the plain text 15 bits. You can choose more than one. Select among 14 bit, 15 bits, 16 bits
Question 2
Any encryption operation uses a cipher and a key. Explain the Caesar cipher and the possible keys used by giving an example.
Question 3
Describe the terms permutation, substitution, and the mode of operation. Provide examples to these terms in the context of the Vigenere Cipher.

 

 

Threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing.

 

 

 

 

There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all these risks.

Create a 1-to 2 -page table, in Microsoft® Word, listing a minimum of 6 threats using the column headers and details below:
Threat – List the threat.
Threat to Type of Data (data-at-rest,data-in-transit, or processing) – Identify the type.
Confidentiality/Integrity/Availability– Identify whether some or all are affected by labelling: C, I, and/orA.
Mitigation Suggestion – Describe a mitigation plan in 2-3 sentences.
Example:
Threat: Password Compromise
Threat to Type of Data: Data-At-Rest
Confidentiality/Integrity/Availability: C & I
Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.

Include a short paragraph that highlights two access control techniques or policies that enforce security.

 

critical thinking

pplying virtue ethics to the Mattel case.
Required Reading

Part 1: Critical Thinking

Before you begin to write up your Case, let’s consider what is meant by “critical thinking.” Critical thinking is one of the five key rubric criteria by which your assignments are graded. Therefore, it is required that you demonstrate evidence of critical thinking in all assignments. For an overview of critical thinking, read the following very carefully:

Kurland, D. (2000). What is critical thinking? Critical Reading. Retrieved from http://www.criticalreading.com/critical_thinking.htm

Next, review the Critical Thinking Skills chart at the following site. This is an excellent visual synopsis of the various components of critical thinking. Note the questions that are associated with each element of critical thinking:

A must have chart featuring critical thinking skills. (2014). Educational Technology and Mobile Learning. Retrieved from http://www.educatorstechnology.com/2013/05/a-must-have-chart-featuring-critical.html

Part 2: Virtue Ethics

Visit the library, and locate the following article:

Sethi, S., Veral, E., Shapiro, H., & Emelianova, O. (2011). Mattel, Inc.: Global manufacturing principles (GMP) – A life-cycle analysis of a company-based code of conduct in the toy industry. Journal of Business Ethics, 99(4), 483-517. Retrieved from ProQuest.

Case Assignment

In a well-written 3- to 4-page paper, discuss how three virtues apply to the Mattel case.

Keys to the Assignment
1.Choose three virtues (e.g., justice, fairness, integrity, courage, honor, truthfulness, etc.), and define each using a reputable online dictionary (e.g., http://www.merriam-webster.com/).
2.Using a section heading for discussion of each of your chosen virtues, discuss how each virtue applies to some ethical issue raised by the Mattel case. For example, you might describe how the virtue you have selected might have been used to more appropriately guide the actions, behaviors, and/or policies of the company (e.g., you may choose to discuss the company’s working conditions, worker safety, company fairness, or Mattel’s attitudes towards the environment).
3.Be sure to use at least two sources from the library to support your discussion and analysis (choose sources that are not included in the Background section of Module 2).
4.Follow The Student Guide to Writing a High Quality Academic Paper guide.
5.Don’t forget to properly cite your sources – both in-text and as end references!
6.You are expected to demonstrate evidence of critical thinking – as defined in the background materials of Module 2 and the grading rubric.