Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
APA
Subject:
Social Sciences
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 4.32
Topic:

Ethics in Cybersecurity: North Korea and the Sony Hack

Other (Not Listed) Instructions:

Select one of the following case studies from the Study Materials for this module to analyze for this discussion forum:
North Korea and the Sony Hack
Hackers Gain Direct Access to U.S. Power Grid Controls
Foreign Economic Espionage in Cyberspace
Then respond to the following:
What ethical issues relate to the cybersecurity threat discussed in the case study?
How do you see the importance of applying a deontological or consequentialist approach to addressing cyber threats that transcend national boundaries not only now, but into the future?
How might a pluralist approach to ethics be employed to further develop and implement an effective international agreement on cyber norms?
Readings:
1. Greenberg, A. (2017, September 6). https://www(dot)wired(dot)com/story/hackers-gain-switch-flipping-access-to-us-power-systems/
2. Haggard, S., & Lindsay, J. R. (2015). https://www(dot)eastwestcenter(dot)org/system/tdf/private/api117.pdf?file=1&type=node&id=35164
3. National Counterintelligence and Security Center. (2018). https://www(dot)dni(dot)gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf
4. AFP in the Hague. (2016, June 28). https://www(dot)theguardian(dot)com/world/2016/jun/28/cyberbulling-suicide-netherlands-canada-amanda-todd
5. Chernenko, E., Demidov, O., & Lukyanov, F. (2018, February 23). https://www(dot)cfr(dot)org/report/increasing-international-cooperation-cybersecurity-and-adapting-cyber-norms
6. Duggan, M. (2017, July 11). http://www(dot)pewinternet(dot)org/2017/07/11/online-harassment-2017/
7. Florida Atlantic University. (2017). https://www(dot)sciencedaily(dot)com/releases/2017/02/170221102036.htm
8. Pendergrass, W. S., & Wright, M. (2014). http://iacis(dot)org/iis/2014/25_iis_2014_132-140.pdf

Other (Not Listed) Sample Content Preview:
CYBER SECURITY
Name
Course
Date
Cyber security
Cyber security refers to the practice of defending electronic systems, servers, computers, networks, and mobile devices from shrewish, malicious, and mischievous attacks. Cyber security has been prone to hacker attacks off late. There have been several cases of cyber-attacks in various places all over the world. One of the case is the North Korea and Sony hack where some hackers with the title Grand Old Party intruded the Sony internal data and accessed all its top secrets (Stengel, 2019).. The hackers many of the Sony’s personal computers and servers. The Grand Old Party wiped around 50% of Sony’s global network. These incidences took back Sony in the 1980s where it could only accept cash as the only means of payment. The hackers stole all Sony’s data before deleting it.
There are several issues which we can relate to this cyber security threat highlighted above. The attack raised issues like freedom of free speech and journalism ethics to disseminate information or something acquire by illegal means. Most people protest following the leakage of a highly confidential movie where the North Korean president Kim Jung-un dies after his helicopter downs and the president’s ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to ethics essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!