- Published: September 18, 2022
- Updated: September 18, 2022
- University / College: University of Colorado Boulder
- Language: English
- Downloads: 26
Q.
1: Battle field 1 Cracking: Kind of Fraud: Cracking a gameor software is known as software cracking. It falls in the category of Computer Fraud and Abuse Act (CFAA). This law is included in Comprehensive Crime Control Act of 1984.
Software cracking is the modification of software to remove ordisable features which are considered undesirable by the person cracking thesoftware, especially copy protection features(including protection against the manipulation of software, serial number, hardware key, date checks and disc check)So, making a crack as skidrow did is the illegal attemptwhich led company to the failure in their revenue generation and it falls inthe CFAA. Q. 2: Google: (protecting data andprivacy of users) Physicalsecurity to protect data integrity: As they distribute data to multiple centers so in case ofany accident (fire, disaster and etc.) the data can be shifted to protectednetworks/centers. Every data is monitored 24/7. The access to data is in tight security.
Custom hardware with security atits core: The level of security at google started with theirhardware including vendors, chips of custom design. Google allows you theauthenticate security at every level. Encryption to keep data private and protected: Google provide end-to-end encryption plus data is securedby HTTPS and TLS (transport layer Security). It also encrypts emails andcookies by default. Strong controls to limit access totrusted personnel: Google limit your business data to google personnel whoneed this to do their jobs. In case of working with third party (customersupport vendors) to provide google services, an assessment is conduct to ensurethe level of security, protection and privacy which needed to receive access toyour business profile.
Q. 3: Payroll: QualityConcerns addressing to Failure: Assessingquality: The quality ofthe software is followed by the SEEPP principles. If it result in failure theprotection of the user are in Risk. Accuracy ofInformation: Information should be accurateComplyingwith Legal requirements: The systemshould follow the rules and regulations of the local, state and federalgovernment to avoid failures. If it’s failing in this the system is going to befailed badly.
EnsureData Security: Ensure datasecurity to the stakeholders e. g. disclose any danger related to software. If it’snot secure it will led it to the failure.
ProfessionalEthics and Practices:· Be fair and truthful in all matters· Always put the public’s interests first· Donate professional skills to goodcauses· Accept responsibility for your own work· Ensure adequate software specification· Understand specifications fully· Ensure you are suitably qualified· Ensure all goals are achievable· Ensure proper methodology· Ensure resources are authenticallyapproved· Reject bribery· Do not accept secret payments from theclientQ. 4: Anti-lock Braking System: QualityConcerns addressing to FailureThesafety aspect: The safetyaspect of this system is clear, public safety is directly involved through thelives of the passengers of the automobile and other automobiles on the road andpedestrians. If it fails in safety it will led people to death. Visibilityof the System: If a system is invisibleto the user that requires knowledge of the physical characteristics of theautomobile, braking system, driving environment and safety that will also ledthe system to failureAGood Engineer: In this mix disciplinesoftware an engineer will requireknowledge of the software side of the system as well as the physical hardware, sensors and controls. Missing one theabove mentioned task will definitely heading towards system failure. ProfessionalEthics and Practices:· Disclose any software-related dangers· Approve only safe, well tested software· Only sign documents in area ofcompetence· Cooperate on matters of public concern· Produce software that respects diversity· Be fair and truthful in all matters· Always put the public’s interests first· Donate professional skills to goodcauses· Accept responsibility for your own work· Avoid conflicting financial interests· Temper technology judgments with ethics.· Accept responsibility for your own work· Ensure adequate software specification· Understand specifications fully· Assure standards are known by employees· Assure knowledge of confidentialityprotocols· Assign work according to competenceQ.
5: Avionics: QualityConcerns addressing to FailureKnowledge aboutphysical equipment, sensor, controls, flight characteristics and other systemof the airplane is mandatory. Safetyaspects: The lives of theflight crew, passengers Algorithms: Aerodynamic withcorrect functionsA licensedengineer to develop the systemMissing one theabove mentioned task will definitely heading towards system failure. ProfessionalEthics and Practices:· Disclose any software-related dangers· Approve only safe, well tested software· Only sign documents in area ofcompetence· Cooperate on matters of public concern· Produce software that respects diversity· Be fair and truthful in all matters· Always put the public’s interests first· Donate professional skills to goodcauses· Accept responsibility for your own work· Avoid conflicting financial interests· Temper technology judgments with ethics.· Accept responsibility for your own work· Ensure adequate software specification· Understand specifications fully· Assure standards are known by employees· Assure knowledge of confidentialityprotocols· Assign work according to competence Q.
6: Stock marketing Trading Software: QualityConcerns addressing to Failure: MechanicalfailuresOveroptimizationThepublic interest aspect: The economicinterests of the public would be adversely affected in the event of a crash. Reason: The consequences of such a crash, resultingfrom an incorrectly engineered system. ProfessionalEthics and Practices:· Be fair and truthful in all matters· Always put the public’s interests first· Donate professional skills to goodcauses· Accept responsibility for your own work· Ensure adequate software specification· Understand specifications fully.· Ensure you are suitably qualified· Ensure all goals are achievable· Ensure proper methodology· Ensure resources are authenticallyapproved· Reject bribery· Do not accept secret payments from theclient