Article URL
Criterion A
Describe one social/ethical concern related to the IT system.
The social and ethical concern is that the security of the school website is very low. This led to unauthorized access to classified material, which caused a lot of harm to several users.
Describe the relationship of one primary stakeholder to the IT system.
The main stakeholder in this case is the students who go to this school. By signing up for the schools, they are legally bound to allow the school to save all of their records. So their school reports, personal details such as name, email, Passport photocopy, achievements, etc. will all be saved on the school database.
The main stakeholder in this case is the students who go to this school. By signing up for the schools, they are legally bound to allow the school to save all of their records. So their school reports, personal details such as name, email, Passport photocopy, achievements, etc. will all be saved on the school database.
Describe, step by step, how the IT system works.
Essentially, the school's website is connected to a back end database. Therefore, whenever a school administrator enters the student's data on the database, it is saved. The administrator might be asked to verify the information entered to ensure its reliability (perhaps a double step verification). When the data entered is verified, it is sent over a network to the school's website. When the user logs in, they are given the ability to access the website. They can request information depending on what their login access allows. When the request is made, data is sent over to the database, and a query is made depending on the user's request, then it is sent back to the website and displayed on the screen.
Criterion C
Essentially, the school's website is connected to a back end database. Therefore, whenever a school administrator enters the student's data on the database, it is saved. The administrator might be asked to verify the information entered to ensure its reliability (perhaps a double step verification). When the data entered is verified, it is sent over a network to the school's website. When the user logs in, they are given the ability to access the website. They can request information depending on what their login access allows. When the request is made, data is sent over to the database, and a query is made depending on the user's request, then it is sent back to the website and displayed on the screen.
Explain the relationship between the IT system and the social/ethical concern described in Criterion A.
The IT system is designed in such a way that it allows security to be breached. This is because of the lack of security procedures in place. The first problem is that the network that is used may not be secure, therefore it may be possible to intercept information and access the website that way. However, aside from that, since the website has a login page, it is possible to redirect the user to a bogus site and then steal login details like that (pharming). Alternatively, phishing could be used. Since as mentioned in the article, the same password was used to access both the school database and the school emails, it suggests that there are no strict requirements on the passwords to make sure that they are different than the ones on the database, therefore, it reduces the security of the system.
The IT system is designed in such a way that it allows security to be breached. This is because of the lack of security procedures in place. The first problem is that the network that is used may not be secure, therefore it may be possible to intercept information and access the website that way. However, aside from that, since the website has a login page, it is possible to redirect the user to a bogus site and then steal login details like that (pharming). Alternatively, phishing could be used. Since as mentioned in the article, the same password was used to access both the school database and the school emails, it suggests that there are no strict requirements on the passwords to make sure that they are different than the ones on the database, therefore, it reduces the security of the system.
Evaluate the impact of the social/ethical issues on the relevant stakeholders.
This system poses several concerns for the students. The main one is that their private data can be breached and released online. Other than that, the hackers who get unauthorized access to that information can sell it to third party organizations. which is another privacy breach. Another disadvantage is that with such a system, it may not be so reliable due to data redundancy issues in the database (especially if its a large school). This means that the student's data can be incorrect and can thus impact them in the future, especially when they apply to university, or to other schools.
This system poses several concerns for the students. The main one is that their private data can be breached and released online. Other than that, the hackers who get unauthorized access to that information can sell it to third party organizations. which is another privacy breach. Another disadvantage is that with such a system, it may not be so reliable due to data redundancy issues in the database (especially if its a large school). This means that the student's data can be incorrect and can thus impact them in the future, especially when they apply to university, or to other schools.
However there are several advantages for the student as well. The main one is that the website database system essentially allows them to access their details at any time from anywhere provided they have access to the internet. In addition to that, since all the data is saved on the database, it is easy for school administrators to finish up their records easily, so they can have all records in the same place. With a well designed database, if the student goes to university or transfers schools, it is very easy to move the documents.
Concerns for the school are many as well. The main one is the reliability of the website, if its unreliable and causes problems to the users then they can get used and their reputation will decrease a lot. In addition, it is very expensive to set up such a database and invest in security measures to be taken to ensure database security, website security. In addition to that, the school may have to invest in IT staff to design such a difficult system. Otherwise, the school would have to buy commercial software, which may not tend to all their needs. Another disadvantage to the school is that the school will have to rely on such a system, and if the system requires maintenance then it doesn't work. In addition, the website and database must be backed up in case some reliability issue occurs. Also, data must be encrypted.
Advantages for the school are that it is very easy to control the records, and it makes the job of the school administrators much easier. In addition to that, it can be backed up which means that it cannot be lost, unlike using a paper based database. Another advantage is that with the website database system, the school can employ online applications for new students and allow their students and parents to manage their accounts which makes them more trustworthy. And with the website, the school can advertise itself.
Overall, due to its convenience, the database system is required and hence must be used, even though it poses issues. Therefore, the issues must be reduced before a system is created.
Criterion D
Evaluate one solution that addresses at least one problem identi ed in Criterion C.
A problem identified in C was the fact that the system lacks security and hence could lead to data loss. There is one solution which could work for this.
A problem identified in C was the fact that the system lacks security and hence could lead to data loss. There is one solution which could work for this.
Encrypting all the data sent to and fro from the database, AND encrypting all the database's content in case someone hacks it. This has several advantages and disadvantages.
The advantage of this solution is that if one manages to intercept information, or hack into the database, then the data is encrypted, therefore there is no security breach.
Disadvantages are that this may be expensive, and it still does not solve the problem if the hacker has access to a repeated password. And, with this encryption, only the student will be able to see their records, therefore when an administrator wants to create reports etc, they will have to go through the students count which is difficult and time consuming.
