Click Here for Writing Assignment 3

advertisement
Bursic 8:00 A.M.
Group R9
CODES OF ETHICS AND CHALLENGES IN SOFTWARE INNOVATIONS
THAT ENSURE SECURE EMAIL SECURITY
Kwaku Boampong (KWB18@pitt.edu)
INTRODUCING THE CODE OF ETHICS
AND MY NAE CHALLENGE
I will be focusing on how the NSPE Code of Ethics for
Engineers and the American Society of Civil Engineers
Code of Ethics applies to the NAE challenge of my choice.
The NAE challenge that I am going to connect these codes
of ethics to, is, the challenges in software innovations that
ensure a secure email security. This is a broad topic, but I
am going to maintain one important aspect of email/internet
security, which is providing better security for data flowing
over various routes on the Internet so that the information
cannot be diverted, monitored, or altered. The only way to
complete this task is for engineers to continue making
“protocols for directing data traffic on the Internet can be
exploited to make messages appear to come from someplace
other than their true origin” [1]. I believe that it is important
for engineers to continue making these protocols,
specifically the “data monitoring switch”[2] because without
them, it is significantly easier for “attackers”[3] to bypass
email and Internet security systems. Ethics applies to this
NAE challenge because as stated by the NSPE code of
ethics, cannon 1, engineers must “hold paramount the safety,
health, and welfare of the public [4].” This shows the
importance of studying ethics because it gives the basic
background and the tasks that an engineer must accomplish.
Freshmen engineers should study this challenge and the code
of ethics because this NAE challenge relates to everyone in
the world as everyone uses cyberspace and the code of ethics
can help freshmen understand their duties as an engineer if
they continue to pursue it as a career.
BACKGROUND ON NAE CHALLENGE
AND DETAILS ON THE FOCAL ASPECT
The world of cyberspace and communication is a complex
one with numerous insecurities. Serious breaches of cyber
security in “financial and military”[3] computer systems
have already occurred. “Identity theft is a burgeoning
problem due to these breaches”[2]. Viruses and other cyberattacks plague computers and “disrupt commerce and
communication on the Internet”[3]. Communication these
days depends on computers and it is difficult for residents of
University of Pittsburgh Swanson School of Engineering
the United States to trust this main form of communication
due to the numerous breaches in cyberspace security.
Cyberspace security continues to pose some of the most
difficult challenges engineers have faced. Engineers
continue to face the challenge of “protecting the
confidentiality and integrity of transmit tted information and
deterring identity theft”[5] in cyberspace. It is important for
engineers to continue developing innovations that prevent
“attackers”[3] from breaching email and Internet security
systems.
The data-monitoring switch is an innovation that can
prevent these attackers. A data-monitoring switch is a
“networking hardware appliance that provides a pool of
monitoring tools to access traffic from a large number of
network links”[6]. This innovation is specifically used for
directing data traffic in cyber space to prevent things that
come from some other place other than their “true origin,
such as spam messages that carry viruses. The monitoringswitch pre-filters traffic to “offload tools and direct them to
the location according to one-on-one and many-to-many port
mappings”[6]. When a number of monitoring tools are
connected to the data-monitoring switch’s tool ports, copies
of traffic from any of the network ports can be switched to
any of the tools using the data monitoring “switch’s
management interface”[2]. A unique characteristic of
the data-monitoring switch, as opposed to matrix switches
and aggregating Taps, is that it can support port mappings.
This data-monitoring switch has numerous aspects to it,
which make it extremely complex. Although engineers
clearly put significant thought in constructing this innovation
to benefit email and cyberspace, there are bound to be ways
for “attackers”[3] to bypass this security. For example,
“attackers”[3] eventually determine ways to breach
command lines, which allow them to still get into out email
and harm our cyberspace security. This may be hard to
believe due to all of the work put into this innovation, but
gives Engineers more of a reason to continue working to
improve.
HOW MY NAE CHALLENGE CONNECTS
TO MY CODE OF ETHICS
1
October 21, 2011
Kwaku Boampong
The NSPE Code of Ethics for Engineers and the American
Society of Civil Engineers Code of Ethics applies to my
NAE challenge in numerous ways. The NSPE Code of
Ethics for Engineers develops a main focus of the
importance of engineering as a “learned profession [7]”. “As
members of this profession, engineers are expected to
exhibit the highest standards of honesty and integrity.
Engineering has a direct and vital impact on the quality of
life for all people. Accordingly, the services provided by
engineers require honesty, impartiality, fairness, and equity,
and must be dedicated to the protection of the public health,
safety, and welfare.”[4] This clearly relates to my NAE
challenge because the data-monitoring switch was created to
prevent “attackers”[3] from entering the somewhat secure
email/cyberspace of the public and harming peoples
identities. According to the NSPE code of ethics Engineers
are required to work towards the protection of public welfare
and preventing the loss of identity is surely the protection of
public welfare. Another connection from the NSPE code of
ethics that connects to my NAE challenge is the professional
obligation of an engineer to “strive at all times to serve the
public interest”[7]. To serve the public interest an Engineer
must continue to improve innovations to ensure that it
satisfies it’s purpose. The data-monitoring switch used to
protect cyberspace and email security is still not fully secure
because some “attackers”[3] find ways capable of bypassing
this security. Based on the NSPE Code of Ethics, engineers
must continue to add to this innovation until it is fully secure
and prevent all “attacker” from accessing our personal
information through cyberspace and email.
I also found a certain connection between the American
Society of Civil Engineering Code of Ethics and my specific
NAE challenge. For example, Cannon 3 of this code of
ethics states that, “engineers shall act in such a manner as to
uphold and enhance the integrity and dignity of the
engineering profession”[7]. In my opinion, one way for an
engineer to enhance the integrity and dignity of the
profession is to accomplish each and every task to the best of
their ability and continue to add on to an innovation if it
does not satisfy the needs of the people. This connects to my
NAE challenge because it is a difficult task to fully ensure
security in email and cyberspace security because there are
numerous ways that your security can be breached. This is
why engineers must continue to follow this code of ethics
and develop newer innovations to protect our Internet
security. This NAE challenge affects the safety and welfare
of the public in a great way because if our identities are
accessed through cyberspace, many civilians in the United
States of America could end up victims of credit card fraud
and lose a substantial amount of money. That is why
engineers must continue to follow the NSPE and the
American Society of Civil Engineering Code of Ethics
because they both show the importance of an engineer’s job
towards benefitting my NAE challenge.
THE IMPORTANCE OF TEACHING
FRESHMAN ENGINEERS THE CODE OF
ETHICS
As stated by the NSPE code of ethics, “Engineering is an
important and learned profession. As members of this
profession, engineers are expected to exhibit the highest
standards of honesty and integrity. Engineering has a direct
and vital impact on the quality of life for all people.
Accordingly, the services provided by engineers require
honesty, impartiality, fairness, and equity, and must be
dedicated to the protection of the public health, safety, and
welfare. Engineers must perform under a standard of
professional behavior that requires adherence to the highest
principles of ethical conduct”[4]. This provides the basis of
what you need to follow to be an Engineer.
I believe that it is extremely important to teach freshmen
engineers the NSPE Code of Ethics and the American
Society of Civil Engineers Code of Ethics. For example, an
engineer’s job is extremely important to the society and
students must understand that before going into the
profession of engineering. One way for students to
understand these is through the teaching of the codes of
ethics. If these ethics are embedded into their mind as young
engineers, they are bound to follow them through out their
entire career. With these codes of ethics young engineers can
be certified and are guaranteed to one day help society and
most importantly cyberspace and email security.
CONCLUSION
The NAE challenge of completely ensuring a secure
cyberspace can one day be accomplished through the use of
the data-monitoring switch developed by engineers. I believe
that this specific protocol for directing data traffic can be
very beneficial with the correct development. Engineers
must also be taught these codes of ethics as freshmen
because it allows them to fully grasp the knowledge and the
duty of an engineer. Also, by instilling the NSPE Code of
Ethics and the American Society of Civil Engineering Code
of Ethics into young engineers, they will understand the
importance of improving innovations and aiding the public.
2
Kwaku Boampong
Therefore, giving them the mindset and certification
necessary to continue to improve email/cyberspace security.
REFERENCES
[1] Kaplan, Dan. "Cybersecurity, the next Frontier for NASA Engineers Messaging - SC Magazine Australia - Secure Business Intelligence." IT
Security News, Security Product Reviews and Opinion - SC Magazine
Australia - Secure Business Intelligence. SC Magazine, 2 June 2011. Web.
02
[2] Ramirez, Jessica. "Educating Elite Hackers and Cybersecurity Experts."
The Daily Beast. 9 Mar. 2010. Web. 02 Oct. 2011.
<http://www.thedailybeast.com/newsweek/2010/03/09/educating-elitehackers.html>.
[3] "Introduction to the Grand Challenges for Engineering - Engineering
Challenges." Grand Challenges for Engineering. Web. 02 Oct. 2011.
<http://www.engineeringchallenges.org/cms/8996/9221.aspx>.
Oct. 2011. <http://www.scmagazine.com.au/Feature/259366,cybersecuritythe-next-frontier-for-nasa-engineers.aspx>.
[4] "ASCE Code of Ethics." ASCE Code of Ethics. Web. 27 Oct. 2011.
<http://wadsworth.com/philosophy_d/templates/student_resources/0534605
796_harris/cases/Codes/asce.htm>.
[5]"New Automation Standards Tackle Cybersecurity Threats - Engineer
Live, For Engineers, By Engineers." Engineer Live - Engineering News |
Engineering Jobs | Engineering Product Reports. Asian Engineer, 2 Oct.
2010. Web. 02 Oct. 2011. <http://www.engineerlive.com/Asia-PacificEngineer/Safety_Environment/New_automation_standards_tackle_cybersec
urity_threats/23490/>.
[6] Wolff, Josephine. "Interview With Cyber-Security Czar Howard
Schmidt." The Daily Beast. 21 Dec. 2010. Web. 02 Oct. 2011.
<http://www.thedailybeast.com/newsweek/2010/12/21/interview-withcyber-security-czar-howard-schmidt.html>.
[7] NSPE Code of Ethics for Engineers." National Society of Professional
Engineers. National Society of Professional Engineers”. Web. 27 Oct. 2011.
<http://www.nspe.org/Ethics/CodeofEthics/index.html>.
ADDITIONAL SOURCES
Amadei, Bernard. "Engineering for the Developing World - Engineering
Challenges." Grand Challenges for Engineering. Web. 21 Oct. 2011.
<http://www.engineeringchallenges.org/cms/7126/7356.aspx>.
"Cyber Security Standards." Science Daily: News & Articles in Science,
Health, Environment & Technology. Science Daily. Web. 02 Oct. 2011.
<http://www.sciencedaily.com/articles/c/cyber_security_standards.htm>.
"Cyber Security Tips." US-CERT: United States Computer Emergency
Readiness Team. Web. 02 Oct. 2011. <http://www.us-cert.gov/cas/tips/>.
Grand Challenges for Engineering. Web. 02 Oct. 2011.
<http://www.engineeringchallenges.org/>.
Stephen, Unger H. Responsibility in Engineering: Victor Paschkis vs
Wernher Von Braun. Print.
Unger, Stephen H. "IT Professional." IT Professional. Print.
ACKNOWLEDGEMENTS
Thank you, Dan Budny and Beth Bateman Newborg for the
specifications for the formatting of this research paper.
Thank you to Diane Kerr, writing instructor, for proper
guidance in how to go about completing this research paper.
.
3
Download