Verified Document

Cyber Security Ethical Issues Associated With Ransomware Case Study

Cyber Security Ethical issues associated with ransomware

It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents of the United States it is even mind boggling for a law enforcing agency like the criminal investigation department to extort money from the citizens claiming that the affected parties visited illegal pornographic sites. The law is very clear incase one is caught violating law (IEEE, 2014). Such people should be subjected to the criminal justice system as opposed to extorting ransom from them. It is common for unsuspecting members of the public to use weak passwords for their email accounts. Such accounts are easily preyed on by cyber criminals. However, is it ethical for somebody to irregularly secure some important data and use it for his personal gain? Should such people capitalize on error by original owners for not using secure passwords to their e-mail accounts? Take an example of a homeowner who leaves his door unlocked. Does any one therefore...

Another ethical issue that this case elicits is the issue of privacy to sensitive personal information (IEEE, 2014). Do individuals have rights to keep that information private especially in the context of the ransomware? An email address contains very crucial information about an individual including his business dealing. Anybody having access to such information can do damning damages to the affected individual. Crucial information like ones medical records and social security records can be accessed by the ransomware gangs by intercepting information in ones inbox. The economy has become more and more dependent on computer controlled devices. How much faith should be placed in the hands of software programs? Are the programs any safer and what mechanisms can be put in place to ensure that such programs are safe now that the ransomware gangs are targeting the program software? Now that the network of nuclear defense missiles is computerized will such crucial systems also fall to the hands of software gangs? Should human element…

Sources used in this document:
References List

Attorney General's Department, Australian Government. (2013). National Plan to Combat

Cybercrime. Sydney: Commonwealth of Australia.

IEEE (2014). Ethics Committee.

http://www.ieee.org/organizations/committee/ethics/
Retrieved from http://www.justice.gov/criminal/cybercrime/
Cite this Document:
Copy Bibliography Citation

Related Documents

How Public Sector Information Managers Respond to Threats and Challenges...
Words: 2117 Length: 7 Document Type: Research Paper

CHALLENGES AND BIBLICAL PRINCIPLES IN MANAGING INFORMATIONToday, public sector information managers are responsible for the collection, organization, maintenance, and dissemination of information by their respective government agencies and other public organizations. This role has assumed new importance and relevance in recent years as the flow of information continues to intensify. The purpose of this paper is to provide a review of the scholarly literature concerning the ethical and legal issues

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now