IS322 Assignment 1 - v1
IS322 Assignment 1 - v1
Assignment 1 (20%)
Tasks:
For each of the following 4 parts, write a short report. Include the following in the reports:
A supermarket has been experiencing long lines during peak periods of the day. The problem is noticeably
worse on certain days of the week, and the peak periods sometimes differ according to the day of the
week. There are usually enough workers on the job to open all cash registers. The problem the
supermarket manager faces is knowing when to call some of the workers who are stocking shelves up to
the front to work the checkout counters.
Use one of your favourite search engines and search world’s biggest data breaches. Select at least two
of the major data breaches from the list you found and complete the following.
• Explain how they impacted you.
• Many of the breached companies had standard security controls like firewalls and intrusion
detection systems. Discuss what was missing in their designs and processes.
• Add other items that you believe organizations should improve on to avoid breaches.
You are a member of the plant information systems group for a small manufacturer of all-natural
ingredient cosmetics. Your firm promotes itself as adhering to the highest standards of compliance and
quality. Manufacturing is rigorously monitored via sensors and computer controls throughout the entire
process, and automated temperature controls ensure complete stability in the manufacturing
environment. Sensor tracking is performed from the moment that raw materials enter your facility,
throughout the manufacturing process, packaging, and on to distribution. The sensors and computer
controls were installed when the plant was built in the 1990s and use proprietary communications
protocols and are not Internet enabled. Data from these sensors is monitored by a group of three
technicians in the computer control room. Twelve workers are required to staff the control room 24/7,
including weekends and most holidays.
Your company has just purchased a plant previously owned by one of your competitors in a nearby state.
Your group has been asked to look at the feasibility of upgrading the sensors used in both plants to
Internet-enabled sensors connected to the Internet of Things. This would make it possible for technicians
in one control room to monitor the operation of both plants. Plant staffing could be reduced by 12 workers
saving $1.2 million in labour expenses per year. It is estimated that the cost of replacing the existing
sensors and converting to the Internet of Things is in the vicinity of $1.5 million.
In the wake of the December 2015 terrorist attack in San Bernardino, attention turned to the perpetrator’s
iPhone. A federal judge asked Apple, maker of the iPhone, to provide “reasonable technical assistance”
to the FBI in accessing the information on the phone with that hope of discovering additional threats to
national security.
Apple provided the FBI with data it had in their possession and sent Apple engineers to advise the FBI, but
refused to comply with the court order to bypass the phone’s security measures: specifically the 4-digit
login code and a feature that erases all data after ten incorrect attempts. The FBI argued that the bypass
could only be used for this phone, this one time. The agency also cited national security concerns, given
the phone may lead to better understanding the attack and preventing further incidents.
Apple CEO Tim Cook issued a public letter reiterating Apple’s refusal to cooperate. Cook advocated for
the benefits of encryption in society to keep personal information safe. He stated that creating the
backdoor entry into the iPhone would be akin to creating a master key capable of accessing the tens of
millions of iPhones in the U.S. alone. Cook also had concerns that the FBI was outstepping its bounds - by
using the court system to expand its authority - and believed the case should be settled after public debate
and legislative action through Congress instead.
Public opinion polls on the issue were split. A number of major tech firms filed amicus briefs in support
of Apple. The White House and Bill Gates stood behind the FBI. In anticlimactic fashion, the FBI withdrew
its request a day before the hearing, claiming it no longer needed Apple’s help to assess the phone.
Was Apple wrong for not complying with the FBI’s request? If so, why? If not, why not?
What ethical issues are involved in this case?
Who are the stakeholders in this situation?
Submission instructions
You will have to convert your assignment word document into a PDF document and name it:
SXXXXXXXX_Asg_1.pdf
Submit your completed assignment using the Assignment 1 DropBox available on the IS322
course page on Moodle before the due date - Thursday, 30th September 2021, 11:55 PM (Fiji
Time (FJT).
Individual Assignment
This assignment is to be completed individually. You must complete the assignment on your own
merit to get the marks allocated for this assignment.
Plagiarism
Any kind of plagiarism or cheating; like submission of work that is not your own will lead to a ZERO
(0) score AND you will be subject to disciplinary action. Discussing is permitted however you must
avoid giving your working copy or the final assignment file to anyone. This increases the risk of your
assignment being cited as a plagiarized work.
For this course, plagiarism detection software will be actively used to identify similar assignments.
ALL detected assignments will receive a mark of ZERO and will be referred to the disciplinary
committee.
Note: If you need clarifications while doing this assignment, you may post a message on the
Assignment 1 Help! Forum located on the IS322 Course Page under the Assessments block. Students
are advised to read through the responses for postings made by other students before posting their
own to avoid repetition of the queries.