For your initial post, develop a scenario that presents an ethical dilemma in an information security setting. Take this opportunity to develop a scenari
For your initial post, develop a scenario that presents an ethical dilemma in an information security setting. Take this opportunity to develop a scenario that will stimulate a discussion on different approaches to privacy and ethical problems. The scenario you create should be realistic but unique. It’s okay to think creatively!
Your scenario will be more engaging and meaningful if it is plausible. Focus on typical events rather than rare occurrences or unrealistic characters.
- Provide enough background for participants to see how the situation and policies could influence outcomes.
- Leave enough ambiguity for participants to interpret unknown factors that might influence their approach.
- Provide a clear question or decision for participants to address.
Review the following example of an ethical dilemma scenario, but don’t use it as your initial post.
Your IT administrator assigns the members of your department to perform the company’s yearly ethical hacking audit. During last year’s exercise, one of the IT engineers went outside the scope of the ethical hacking contract and accessed HR files. This was deemed a deliberate violation of the plan, and the employee was fired. However, the vulnerability to access the records was included in the ethical hacking audit report. Knowing that this vulnerability existed last year, how would you proceed in this year’s audit?
In your response posts, address the ethical dilemmas posed by your peers. Apply what you have learned from this module’s resources on ethical standards to justify your response.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Scenario:
The ethical dilemma I’m presenting stems from a real-life incident involving the Nashoba Regional School District, where a breach of the PowerSchool student information system (SIS) exposed the Social Security numbers of 41 former students, 8 former staff, and 2 current staff on Friday January 17, at 8:54 am, email sent to me.
This situation raises critical questions about how organizations should respond to cybersecurity incidents, particularly in education or settings relying on third-party software systems.
Key Challenges in This Ethical Dilemma:
- Transparency vs. Reputation: Should the district provide full disclosure of the breach details, risking reputational harm, or limit the information shared to avoid panic?
- Resource Constraints: The district has limited staff and funding. Should they redirect resources from educational programs to upgrade cybersecurity systems, or rely on PowerSchool to mitigate the breach?
- Incomplete Contact Information: Some affected individuals cannot be notified due to outdated records. What steps should the district take to fulfill its ethical and legal obligations in these cases?
- Third-Party Responsibility: As a PowerSchool breach, how much responsibility falls on the district vs. the vendor?
This situation reflects broader, real-world challenges faced by organizations:
- Data Breaches in Education: Educational institutions are often targets of cyberattacks due to insufficient security measures.
- Balancing Priorities: Schools must juggle their obligation to protect sensitive data with the practical limitations of budgets and staffing.
- Vendor Accountability: Reliance on third-party systems adds complexity to breach response and prevention.
Questions for Discussion:
- How can organizations like Nashoba balance transparency with maintaining public trust?
- Should resources be diverted from other programs to strengthen cybersecurity, even at the cost of education?
- How far should the district go to notify affected individuals with incomplete contact information?
- What role should third-party vendors like PowerSchool play in breach prevention and response?
Note *, Still more to follow!.
RESPONSE TWO
At Sinclair Bank, you work as a Security Information Analyst reviewing policies on handling sensitive data. While analyzing system usage to improve reliability, you downloaded raw data from the bank’s SQL database and prepared it in Excel for a presentation. However, the bank has strict rules requiring all Personally Identifiable Information (PII) to be stored only on internal servers, not on the third-party cloud system. By mistake, you saved the data to the cloud. The third-party vendor discovered this during an audit and reported it to the bank.
Now the bank faces an ethical and procedural dilemma. Should they inform affected customers and regulators about the breach or handle it internally to protect their reputation? What consequences should you face for unintentionally violating policy?
To prevent this in the future, the bank could enforce stricter controls, such as automated alerts or restrictions on where sensitive data can be saved. Better employee training and tools that help ensure compliance with data policies could also help avoid similar mistakes. This situation shows how important it is to balance accountability, ethics, and strong security practices.
Undergraduate Discussion Rubric
Overview
Your ac�ve par�cipa�on in the discussions is essen�al to your overall success this term. Discussion ques�ons will help you make meaningful connec�ons between the course content and
the larger concepts of the course. These discussions give you a chance to express your own thoughts, ask ques�ons, and gain insight from your peers and instructor.
Directions
For each discussion, you must create one ini�al post and follow up with at least two response posts.
For your ini�al post, do the following:
Write a post of 1 to 2 paragraphs.
In Module One, complete your ini�al post by Thursday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your ini�al post by Thursday at 11:59 p.m. of your local �me zone.
Consider content from other parts of the course where appropriate. Use proper cita�on methods for your discipline when referencing scholarly or popular sources.
For your response posts, do the following:
Reply to at least two classmates outside of your own ini�al post thread.
In Module One, complete your two response posts by Sunday at 11:59 p.m. Eastern.
In Modules Two through Eight, complete your two response posts by Sunday at 11:59 p.m. of your local �me zone.
Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.
Discussion Rubric
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Comprehension Develops an ini�al post with an
organized, clear point of view
or idea using rich and
significant detail (100%)
Develops an ini�al post with a
point of view or idea using
adequate organiza�on and
detail (85%)
Develops an ini�al post with a
point of view or idea but with
some gaps in organiza�on and
detail (55%)
Does not develop an ini�al
post with an organized point of
view or idea (0%)
40
Timeliness N/A Submits ini�al post on �me
(100%)
Submits ini�al post one day
late (55%)
Submits ini�al post two or
more days late (0%)
10
1/7/25, 10:05 AM Undergraduate Discussion Rubric – CYB-260-12259-M01 Legal and Human Factors of Cyb 2025 C-1 (Jan – Mar)
https://learn.snhu.edu/d2l/le/content/1831858/viewContent/38649345/View 1/2
Criteria Exemplary Proficient Needs Improvement Not Evident Value
Engagement Provides relevant and
meaningful response posts
with clarifying explana�on and
detail (100%)
Provides relevant response
posts with some explana�on
and detail (85%)
Provides somewhat relevant
response posts with some
explana�on and detail (55%)
Provides response posts that
are generic with li�le
explana�on or detail (0%)
30
Wri�ng (Mechanics) Writes posts that are easily
understood, clear, and concise
using proper cita�on methods
where applicable with no errors
in cita�ons (100%)
Writes posts that are easily
understood using proper
cita�on methods where
applicable with few errors in
cita�ons (85%)
Writes posts that are
understandable using proper
cita�on methods where
applicable with a number of
errors in cita�ons (55%)
Writes posts that others are
not able to understand and
does not use proper cita�on
methods where applicable (0%)
20
Total: 100%
1/7/25, 10:05 AM Undergraduate Discussion Rubric – CYB-260-12259-M01 Legal and Human Factors of Cyb 2025 C-1 (Jan – Mar)
https://learn.snhu.edu/d2l/le/content/1831858/viewContent/38649345/View 2/2
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.