Assignment on Banking Security

Assignment Completion Method:        

Your assignment will involve two important phases, which will require you to:

Part A:
Answer the following questions:
  1. Question 1: What is a Firewall and how do they protect a business? (~250 Words)
  2. Question 2: Phishing is a type of scam. What is the purpose of phishing emails? List and describe four basic steps can you use to avoid phishing scams? (~250 Words)
  3. Question 3: Discuss the relationship between surveillance and privacy. Identify and describe what safeguards exist to protect the individual? (~250 Words)
  4. Question 4: Describe ‘social commerce’ and discuss three potential benefits to customers and 3 potential benefits to the business. (~250 Words)


Part B:

Use the Toulmin’s Model of Argument to analyse the supplied Assignment Case Study (see the Assignment Case Study section below) and provide your opinion on the strength or weakness of the argument with relation to the Claim that we have provided.  (~ 600 words).
You MUST use these instructions to complete the ‘Your Opinion’ section of Part B:
To apply the model to test the validity/strength of a CLAIM the reader must examine each sentence in the article and categorise them as a Toulmin element or as an unnecessary extra e.g. ‘opinion’, ‘hearsay’, ‘definitions’ etc. Once all sentences have been categorised then the elements should be examined in sequence.
  1. What is the CLAIM? We have provided this for you already.
  2. Is there any DATA to support the CLAIM? If so how much? The quantity and quality of DATA can suggest the strength of the CLAIM.
  3. Is there a WARRANT (Explicit or Implicit)? Explicit WARRANTS are often stronger because the author can direct the reader to accept the CLAIM. Implicit WARRANTS leave the reader’s opinion open to interpretation and this may go against the author’s  intended purpose.
  4. Is there BACKING? If so how much? The quantity and quality of BACKING can suggest strength of the WARRANT and thus may increase the strength of the CLAIM.
  5. Is there a REBUTTAL? The quantity and scope of the REBUTTAL may reduce the strength of the CLAIM and thus dissuade the reader’s acceptance of the CLAIM.
  6. Is there a QUALIFIER? If so, to what extent does it reduce the scope of the CLAIM because this will impact on the strength of the CLAIM?

Your Opinion – this is a personal perception based on your interpretation of the article. The presence, quality and quantity of the different Toulmin elements must be applied to make this critical assessment.

Learning Objectives:

In the process of this assessment task you will:
Gain an understanding of:
·                     Protecting and managing business information resources from unauthorised online      access;                         
·                     The deceptive aspects and mitigation strategies to counter against socially engineered online scams;
·                     The fundamental counter‐balance between surveillance and individual privacy;
·                     The benefits of a ‘social commerce’ approach for customers and business.
·                     Gain a fundamental understanding of Toulmin’s Model of Argument;
·                     Learn to apply the argument model for critical analysis of a case study; and,
·                     Demonstrate your critical thinking skills as applied to the argument Claim.

Assignment Case Study:

Claim: >>> Australian anticrime authorities can’t protect Australian businesses against cybercrime
Internet‐enabled crime is the greatest challenge to law‐enforcement in the 21st century, particularly in terms of differing trans‐border jurisdictions, the risk to our national security, privacy, business data and the potential impact it could have on the economy overall. Hence it seems surprising of the 20,329 staff members in the New South Wales Police Force there are only 95 working in the cyber and fraud division. Based on this you would have to ask the question; Is Detective Superintendent Arthur Young, Commander of the NSW Fraud and Cyber Crime Squad, equipped to deal with threat from internet‐related crime?
Young acknowledges, "There's no commander that would say they've got enough resources to combat this issue, but that's something we're working towards.” Young also declared "I don't think you can ever be fully prepared however, we've got some good systems in place to do what we want in terms of mostly identifying and preventing a lot of the cybercrime." The NSW Crime Commission's latest annual report states that uncrackable smart phones are hindering criminal investigations with at least two murder investigations in Sydney recently being affected.
In response to the technological issues Superintendent Young also usually seeks collaboration from private companies, such as Apple and Google. Young would also like to see the punishments associated with cybercrime increased to match other crimes such as robbery because currently they are disproportionate. Given the Internet is borderless, transnational crime is also something Young has to deal with. When it comes to solving trans‐border cybercrime, the NSW Police has a good relationship with the FBI, US Homeland Security and Britain's Scotland Yard. Yet, relationships with some other overseas anticrime agencies need improving if we are to be more effective in combatting trans‐border cybercrime.
With respect to local cybercrime, Superintendent Young says advancements are constantly being made to prevent cybercrime hence we are not losing the race just keeping pace! Young further hopes that sometime in the near future business organisations will be required by law to divulge publicly if they have had a data breach noting “if companies don't report breaches, how do we know it's actually occurring?" Alarmingly, Young said "I think one of the challenging things for law enforcement in NSW or globally is the fear of investigating cybercrime or fraud‐related crime because it is difficult to prove so it is often ignored."

"Dates of births are one of the greatest sought‐after pieces of personal information that ID criminals are looking for. Robert Chan from the National Crime Authority (NCA) acknowledged community education on cybercrime avoidance performed by various anticrime bodies is helping to reduce cybercrime occurrence. Mr Chan also noted at the recent Australian ‘Unity Against Cybercrime Conference’ (UACC) a working party of anticrime organisation heads was established to develop a unified approach for the detection of and the defence of Australian Businesses against cybercrime.

No comments:

Post a Comment