Ethics in Cybersecurity: North Korea and the Sony Hack
Select one of the following case studies from the Study Materials for this module to analyze for this discussion forum:
North Korea and the Sony Hack
Hackers Gain Direct Access to U.S. Power Grid Controls
Foreign Economic Espionage in Cyberspace
Then respond to the following:
What ethical issues relate to the cybersecurity threat discussed in the case study?
How do you see the importance of applying a deontological or consequentialist approach to addressing cyber threats that transcend national boundaries not only now, but into the future?
How might a pluralist approach to ethics be employed to further develop and implement an effective international agreement on cyber norms?
Readings:
1. Greenberg, A. (2017, September 6). https://www(dot)wired(dot)com/story/hackers-gain-switch-flipping-access-to-us-power-systems/
2. Haggard, S., & Lindsay, J. R. (2015). https://www(dot)eastwestcenter(dot)org/system/tdf/private/api117.pdf?file=1&type=node&id=35164
3. National Counterintelligence and Security Center. (2018). https://www(dot)dni(dot)gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf
4. AFP in the Hague. (2016, June 28). https://www(dot)theguardian(dot)com/world/2016/jun/28/cyberbulling-suicide-netherlands-canada-amanda-todd
5. Chernenko, E., Demidov, O., & Lukyanov, F. (2018, February 23). https://www(dot)cfr(dot)org/report/increasing-international-cooperation-cybersecurity-and-adapting-cyber-norms
6. Duggan, M. (2017, July 11). http://www(dot)pewinternet(dot)org/2017/07/11/online-harassment-2017/
7. Florida Atlantic University. (2017). https://www(dot)sciencedaily(dot)com/releases/2017/02/170221102036.htm
8. Pendergrass, W. S., & Wright, M. (2014). http://iacis(dot)org/iis/2014/25_iis_2014_132-140.pdf
Name
Course
Date
Cyber security
Cyber security refers to the practice of defending electronic systems, servers, computers, networks, and mobile devices from shrewish, malicious, and mischievous attacks. Cyber security has been prone to hacker attacks off late. There have been several cases of cyber-attacks in various places all over the world. One of the case is the North Korea and Sony hack where some hackers with the title Grand Old Party intruded the Sony internal data and accessed all its top secrets (Stengel, 2019).. The hackers many of the Sony’s personal computers and servers. The Grand Old Party wiped around 50% of Sony’s global network. These incidences took back Sony in the 1980s where it could only accept cash as the only means of payment. The hackers stole all Sony’s data before deleting it.
There are several issues which we can relate to this cyber security threat highlighted above. The attack raised issues like freedom of free speech and journalism ethics to disseminate information or something acquire by illegal means. Most people protest following the leakage of a highly confidential movie where the North Korean president Kim Jung-un dies after his helicopter downs and the president’s ...
You Might Also Like Other Topics Related to ethics essays:
- Nursing at its Best: Philosophy, Ethics, and Advocacy for Quality Care1 page/≈275 words | 4 Sources | APA | Health, Medicine, Nursing | Essay |
- Ethics and Equity in Shaping Personality and Conscience2 pages/≈550 words | 5 Sources | APA | Health, Medicine, Nursing | Essay |
- Military Ethics II. Literature & Language Assignment1 page/≈550 words | 1 Source | APA | Literature & Language | Essay |
- Doing ethics across cultures. Social Sciences Essay2 pages/≈550 words | APA | Social Sciences | Essay |
- Professional military Ethics. Literature & Language Essay1 page/≈550 words | 1 Source | APA | Literature & Language | Essay |
- Organizational Ethics and CSR. Business & Marketing Essay3 pages/≈825 words | APA | Business & Marketing | Essay |
- Philosophical Ethics. Literature & Language Coursework3 pages/≈825 words | MLA | Literature & Language | Coursework |