IST 110 - Acivity - Chapter 12 - Ethical Dilemma - Aidan Cox

docx

School

Pennsylvania State University *

*We aren’t endorsed by this school

Course

110

Subject

Mechanical Engineering

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by EarlGerbil522

Report
Visualizing Technology 6ed Chapter 12 : Ethics Student Name Aidan Cox Course and Section IST 110 – Section 002 Some programmers deliberately make code difficult to follow, using limited or cryptic documentation to protect their code. What are the implications of such practice? Is it legal? Is it ethical? Is it justified? Would this be beneficial or detrimental to business? Some programmers make their code difficult to follow using cryptic documentation. This choice usually prevents outside sources from gaining access to the code. The consequences of leaked or stolen source code can cause damage to an organization, as it results in financial losses and a loss of trust. Many companies rely on algorithms related to payment processing or fraud detection, which run digitally. Securing the code behind these algorithms is a critical aspect of the safety of customers’ data. Recently, efforts to compromise devices and software have grown. This increase in fraudulent activity indicates that organizations must protect their source code from various risks. Code getting leaked puts companies in a vulnerable position. It also presents competitors with the opportunity to gain a tactical edge. However, if programmers encrypt their code or write it in a way that is hard to understand, it makes it challenging for outsiders to use it to their advantage. Although creating encrypted code ensures that it is secure from outsiders, it has potential consequences for other people that need to work in the code within a company. Suppose programmers have to collaborate to create a program or source code, and one programmer encrypts their portion of the code. In that case, it could prevent other programs from understanding the program and making any necessary Print or submit your answer sheet electronically as directed by your instructor.
Visualizing Technology 6ed changes. Programmers should ultimately encrypt sensitive data during transfer and while it is stationary. It is also a good idea to monitor the data so that programmers are aware of any suspicious activity. Overall, creating encrypted code is not illegal. Whether or not a programmer should encrypt their code depends on how secure they want it to be. If the programmer doesn’t want anyone to be able to recreate their program, it is a good choice. However, if a programmer needs to collaborate with others, their encrypted code might be extremely difficult for their colleagues to interpret and slow the efficiency of the operation. Source: https://www.endpointprotector.com/blog/your-ultimate-guide-to-source-code-protection/ Print or submit your answer sheet electronically as directed by your instructor.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help