Verified Document

Cyber Security Cloud Computing Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions:

Describe the circumstances involved

Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud

Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported that the attacks were carried out using two servers at a Web-hosting company located in Ukraine and a group of personal computers. The report further says that the attackers controlled the previously mentioned devices after infecting them with malicious software program. The stolen information from the company included names, addresses, e-mail addresses, and phone numbers. Information regarding to bank account number remained undisclosed to the hackers. The other side of the story is as reported by Symantec. The media claim that the hackers sent out scam e-mails seeking private financial information such as bank account numbers. In addition, they asked the users to click on a link that automatically infected their personal computers with the malicious software. After the information was stolen, the hackers re-emailed the victims claiming that they are going to delete their files unless the victims met some payment requirements as demanded by them (Brenner, 2009).

Identify the ethical aspects associated with the breach

The hackers successfully managed to infiltrate the confidentiality of the victims of the scam. The security of the victims data was then jeopardized as the hackers demanded payment or otherwise the delete all the data from the victims' database. This is risky as the victims could end up losing crucial data.

Identify the legal aspects associated with the breach

The cyber security breach was launched in Ukraine targeting the U.S. citizens. Since the victims are hackers and U.S. citizens probably Ukrainians, it becomes difficult for the victims to report the case to either Ukraine authorities or U.S.. This is because by reporting the case to U.S. authorities, the courts may not have legal jurisdiction to charge the hackers even if they are court. On the other hand, it becomes difficult and expensive to...

In addition, the Ukraine courts may fail to consider the breach as a criminal offense.
Provide at least three legal and at least three ethical recommendations which can be used to prevent similar circumstances from happening in the future

The clients should be advised to desist from using default passwords

Same password and username should not be re-used again and again

User accounts should be disable when an employee leaves the company

Run security scans: for instance, there are softwares that detect malicious sites and warn the user not to accept the link if elements of suspicion are detected (Lewis, 2003; Spinello, 2011).

2. Assume that your company will be implementing cloud-computing technology. Address the following questions:

Describe the technology and business benefits of its implementation

Cloud computing is a phrase used to describe a computing type that relies on the sharing of networking resources instead of personal devices or local servers to host applications. In this technology, the word cloud is used symbolically to mean internet. Therefore, cloud computing can also be described as an internet-based computing that entails delivering services such as servers, storage and application to a company's computers and devices via the internet.

Employing cloud-based computing essentially eliminates large up-front licensing and server costs. It leads to a drastic reduction in the costs associated with consultation and installation of the servers. In addition, the technology eliminates the 'upgrade treadmill' usually associated with traditional-based desktop and server-based software. Lastly, this technology offers accessibility of the company's data from any location: it is easy to use and is compatible with both Windows and Mac OS X.

Discuss at least three ethical concerns of cloud computing for your company

Confidentiality: This forms the principal ethical concern of the cloud computing for my company. It is unethical issue to trust a third party, which for this case is the cloud computing service vendor, with confidential client information. Allowing the vendor to access highly confidential information could subject the client into inexplicable risks.

Another ethical…

Sources used in this document:
References

Baase, S. (2008). Gift of fire: Social, legal, and ethical issues for computing and the Internet, (3rd ed.). Upper Saddle River, NY: Pearson / Prentice Hall.

Brenner, B. (2009). Monster.com Breach (Again!): Evolution of a Disclosure Letter. Retrieved from: http://www.csoonline.com/article/478083/monster.com-breach-again-evolution-of-a-disclosure-letter

Quigley, M. (2008). Encyclopedia of Information Ethics and Security. New York: Idea Group Inc. (IGI), 2008

Lewis, J.A. (2003). Cyber Security: Turning National Solutions into International Cooperation: A Report of the Csis Technology and Public Policy Program. Washington, DC: CSIS
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing at Easyjet
Words: 2637 Length: 8 Document Type: Essay

Cloud Computing at EasyJet 25/08/2015 Brief Company background Discussion of business problem High level solution Benefits of solving the problem Business/technical approach Business process changes Technology or business practices used to augment the solution Conclusions and overall recommendations High-level implementation plan EasyJet, a Luton-based low cost airline in the UK has managed to create differentiation from other low cost airlines through the introduction of a new system of seat booking. The move brought in a new era in the otherwise

Cloud Computing and Insider Threats
Words: 1411 Length: 5 Document Type: Introduction

adopting the use of cloud-based technologies in the last five years. This trend has caused a significant shift in the way that many organizations interact with information both internally and externally. Yet there are also many risk factors inherent in these technologies, some of which are the result of insider conspiracy (Brender & Markov, 2013). Cloud computing offers many advantages over traditional IT infrastructure which make it an attractive option,

How Businesses Can Use Cloud Computing Technology
Words: 3405 Length: 8 Document Type: Term Paper

organizations can do to protect client data comprehensively and how they do this. It will also examine the most common forms of data customers generate, and take a look at some of the contemporary hardware and software that organizations protecting and handling data in the cloud use presently. Common Types of Customer Data Data Identity: The individual is at the core of any database, so gaining an insight into how a person

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cyber Security
Words: 1691 Length: 5 Document Type: Research Paper

Fundamental Challenges With respect to cybersecurity, there are two fundamental challenges – technological and human. On the technology side, many firms underinvest in cybersecurity, for whatever reason. It can be difficult to keep up with evolving threats, such as new ransomware, and companies that lack modern cybersecurity technology are especially vulnerable. In particular, companies are often keen to adopt new technologies – today cloud computing and the use of personal mobile

Cloud Security Key Elements
Words: 1594 Length: 5 Document Type: Term Paper

Cloud SecurityIntroductionCloud security refers to the integrated technologies and procedures to respond to potential internal and external business threats. Its primary goal is to protect cloud computing infrastructure. It forms an essential element in the spheres of cybersecurity, particularly in the ever-growing digital business world. Enterprises have embraced digital migration in most of their services, so cloud security has become indispensable. Threats to data security are more advanced owing to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now