Ethical issues & Challenges of IT

We have been assisting technology clients with their university assignments, courses, classroom exercises and publications.

Ethical Issues in Information Systems

We had drafted a six-months-long university assignment on subjects ranging from security threats plaguing high-speed cellular systems and authentication/authorization mechanisms to ‘The Fallacies in Acceptable User policies’. Few of the weekly questionnaires covered comprised of some of these:

  • Are you abiding by the rights and responsibilities of distributing information?
  • Lack of Netiquette Uniformities: Etiquettes over the internet
  • Ethical Challenges confronting IT / IS Managers.
  • Effectively monitoring real-time batch jobs processing Data.
  • Malicious Access Point Detection Methods for Wireless Local Area Network
  • A Brief Idea on “man in the middle” Attack.
  • The Wired Equivalent Privacy (WEP) & Wi-Fi Protected Access (WPA) security protocol.
  • VPN, Encryption, and Tunneling.
  • Papers on Remote Access Protocols – Point-to-Point Protocol (PPP) / Serial Line Internet Protocol (SLIP)

Having said that, we have also been writing on a variety of technology-related topics ranging from Java Q&A to Bitcoin Minning hardware reviews.

A Continuous Effort to combat Malicious Access Point

Researchers and technology frontrunners have been analyzing the vulnerabilities that a legitimate victim could run into if he has connected to a malicious AP sitting in-between the victim and the authorized AP. Sensitive information ranging from financial credentials to personal data could be stolen and used for unethical purposes.

The prevalent and expanding Wi-Fi networks that we see, can be divided into two types- the first is common network topology where each node is capable of reaching out to other node using radio relay of substantial range and therefore doesn’t need exclusive routing logic.

The second variation comprises of a radio relay system in the first node to connect all nodes in its range, and for nodes out of range, intermediate nodes with radio relay capabilities are used to cascade the signal unless they reach the destination.

In recent times, the access points come with inbuilt wireless traffic encryptions which are designed to provide security to the network. However, simple tools like Air cracking suite could still be used to crack the network password or perform DOS attacks thereby heavily compromising the network security feature.

The Wired Equivalent Privacy (WEP) & Wi-Fi Protected Access (WPA) security protocol

Since the Wired Equivalent Privacy (WEP) encryption had shortcomings and was easily breakable, one approach to preventing malicious points from emerging into the system was the use of Wi-Fi Protected Access (WPA) security protocol. Using long enough passwords or passphrases makes pre-shared key WPA virtually unbreakable.

All regular WLAN-equipment that worked with WEP are able to be simply upgraded and no new equipment needs to be bought. WPA is a trimmed-down version of the 802.11i security standard that was developed by the IEEE 802.11 to replace WEP. In addition to WPAv1, TKIP, WIDS, and EAP may be added alongside. TKIP implements per-packet key mixing with a re-keying system and also provides a message integrity check.

Some opine that layer 2 and layer 3 encryption methods are not good enough for protecting sensitive data. Those technologies add encryption only to parts of the communication path, still allowing people to spy on the traffic if they have gained access to the wired network somehow. The solution may be encryption and authorization in the application layer, using technologies like SSL, SSH, GnuPG, PGP, etc. The disadvantage of this approach is that it fails to cover all traffic.

From Java Q&A to Bitcoin Mining Hardware:

  • Handbook on Network Security and Monitoring.
  • Java Interview Questions for Udemy Academy.
  • The basics of Cloud Computing? Your privacy and the cloud?
  • Concepts of public distributed ledger called the blockchain.
  • The use of cryptography encryption and protocols – SHA-2.
  • What is Bit Mining and how does it affect the Block Chain?
  • Use of advanced hardware: Graphics Processing Units (GPUs) and ASIC.

Being a technology blogger, we excel at abstracting the technical complexities and present a content that appeals to average non-technical business owners. Bombarding Users and business owner with hosts of Technology jargon would literally intimidate them and 90% of your potential customers wouldn’t feel interested enough to read through.

I call it the “Final Touch”. Proactive researching, stepping up the sales-pitch, increasing readability, transforming a stale piece of text into something brilliantly interesting. Find our delivery commitments here.