Cyber Security Cloud Computing Term Paper

Total Length: 1389 words ( 5 double-spaced pages)

Total Sources: 7

Page 1 of 5

Cyber Security/Cloud Computing

Consider a recent cyber security breach (specific event) and address the following questions:

Describe the circumstances involved

Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud

Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported that the attacks were carried out using two servers at a Web-hosting company located in Ukraine and a group of personal computers. The report further says that the attackers controlled the previously mentioned devices after infecting them with malicious software program. The stolen information from the company included names, addresses, e-mail addresses, and phone numbers. Information regarding to bank account number remained undisclosed to the hackers. The other side of the story is as reported by Symantec. The media claim that the hackers sent out scam e-mails seeking private financial information such as bank account numbers. In addition, they asked the users to click on a link that automatically infected their personal computers with the malicious software. After the information was stolen, the hackers re-emailed the victims claiming that they are going to delete their files unless the victims met some payment requirements as demanded by them (Brenner, 2009).

Identify the ethical aspects associated with the breach

The hackers successfully managed to infiltrate the confidentiality of the victims of the scam. The security of the victims data was then jeopardized as the hackers demanded payment or otherwise the delete all the data from the victims' database. This is risky as the victims could end up losing crucial data.

Identify the legal aspects associated with the breach

The cyber security breach was launched in Ukraine targeting the U.S. citizens. Since the victims are hackers and U.S. citizens probably Ukrainians, it becomes difficult for the victims to report the case to either Ukraine authorities or U.S.. This is because by reporting the case to U.S. authorities, the courts may not have legal jurisdiction to charge the hackers even if they are court.
On the other hand, it becomes difficult and expensive to report the matter to the courts of Ukraine, which are miles away from the United States. In addition, the Ukraine courts may fail to consider the breach as a criminal offense.

Provide at least three legal and at least three ethical recommendations which can be used to prevent similar circumstances from happening in the future

The clients should be advised to desist from using default passwords

Same password and username should not be re-used again and again

User accounts should be disable when an employee leaves the company

Run security scans: for instance, there are softwares that detect malicious sites and warn the user not to accept the link if elements of suspicion are detected (Lewis, 2003; Spinello, 2011).

2. Assume that your company will be implementing cloud-computing technology. Address the following questions:

Describe the technology and business benefits of its implementation

Cloud computing is a phrase used to describe a computing type that relies on the sharing of networking resources instead of personal devices or local servers to host applications. In this technology, the word cloud is used symbolically to mean internet. Therefore, cloud computing can also be described as an internet-based computing that entails delivering services such as servers, storage and application to a company's computers and devices via the internet.

Employing cloud-based computing essentially eliminates large up-front licensing and server costs. It leads to a drastic reduction in the costs associated with consultation and installation of the servers. In addition, the technology eliminates the 'upgrade treadmill' usually associated with traditional-based desktop and server-based software. Lastly, this technology offers accessibility of the company's data from any location: it is easy to use and is compatible with both Windows and Mac OS X.

Discuss at least three ethical concerns of cloud computing for your company

Confidentiality: This forms the principal ethical concern of the cloud computing for my company. It is unethical issue to trust a third party, which for this case is the cloud computing service vendor, with….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Cyber Security Cloud Computing" (2012, November 29) Retrieved April 26, 2024, from
https://www.aceyourpaper.com/essays/cyber-security-cloud-computing-76732

Latest MLA Format (8th edition)

Copy Reference
"Cyber Security Cloud Computing" 29 November 2012. Web.26 April. 2024. <
https://www.aceyourpaper.com/essays/cyber-security-cloud-computing-76732>

Latest Chicago Format (16th edition)

Copy Reference
"Cyber Security Cloud Computing", 29 November 2012, Accessed.26 April. 2024,
https://www.aceyourpaper.com/essays/cyber-security-cloud-computing-76732