Cyber Security/Cloud Computing
Consider a recent cyber security breach (specific event) and address the following questions:
Describe the circumstances involved
Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud
Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported that the attacks were carried out using two servers at a Web-hosting company located in Ukraine and a group of personal computers. The report further says that the attackers controlled the previously mentioned devices after infecting them with malicious software program. The stolen information from the company included names, addresses, e-mail addresses, and phone numbers. Information regarding to bank account number remained undisclosed to the hackers. The other side of the story is as reported by Symantec. The media claim that the hackers sent out scam e-mails seeking private financial information such as bank account numbers. In addition, they asked the users to click on a link that automatically infected their personal computers with the malicious software. After the information was stolen, the hackers re-emailed the victims claiming that they are going to delete their files unless the victims met some payment requirements as demanded by them (Brenner, 2009).
Identify the ethical aspects associated with the breach
The hackers successfully managed to infiltrate the confidentiality of the victims of the scam. The security of the victims data was then jeopardized as the hackers demanded payment or otherwise the delete all the data from the victims' database. This is risky as the victims could end up losing crucial data.
Identify the legal aspects associated with the breach
The cyber security breach was launched in Ukraine targeting the U.S. citizens. Since the victims are hackers and U.S. citizens probably Ukrainians, it becomes difficult for the victims to report the case to either Ukraine authorities or U.S.. This is because by reporting the case to U.S. authorities, the courts may not have legal jurisdiction to charge the hackers even if they are court. On the other hand, it becomes difficult and expensive to...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now