Blake Janowicz

ITS 360

Shin-Ping Tucker

30 September 2016

Chapter 3

What Would You Do?

2. You are the CFO of a sporting goods manufacturer and distributor. Your firm has annual

sales exceeding $500 million, with roughly 25 percent of your sales coming from online

purchases. Today, your firm’s Web site was not operational for almost an hour. The IT

group informed you that the site was the target of a distributed denial-of-service attack.

You are shocked by an anonymous call later in the day in which a man tells you that your

site will continue to be attacked unmercifully unless you pay him $250,000 to stop the

attacks. What do you say to the blackmailer?

 

Keep him on the phone as long as possible without tipping him off to then trace the call if you have the resources so they can be punished federally. If this fails, you could counter attack with white hat hackers within your organization.

 

4. Imagine that you have decided on a career in computer forensics. Do research to

determine typical starting positions and salaries for someone with a four-year degree in

computer forensics. Do further research to find three universities that offer four-year

degrees specializing in computer forensics. Compare the three programs, and choose the

best one. Why did you choose this university?

 

Carnegie Mellon University Pittsburgh, PA

 

Massachusetts Institute of Technology Cambridge, MA

 

Stanford University Stanford, CA

 

Out of the three, I choose MIT due to it being a prestigious school. I have dreamed of going there but would never afford it.

 

Discussion Questions

1. If you had an opportunity to join Anonymous, would you? Why, or why not?

 

If I had the opportunity to, I probably would because the experience would be unprecedented. Their views and strong force in numbers makes ethical hacking very sought after.

 

 

 

 

2. Would you say that Anonymous’ actions in support of WikiLeaks were legal? Were these

actions ethical? What about their actions to set up satellite transmission stations across

Syria?

 

The actions were not necessary ethical as they released confidential information but the motive and cause I would say are legitimate. Their actions to set up transmissions stations were to give the Syrian people a voice and rise above the oppression of the Syrian government.

 

3. How serious of a threat does Anonymous pose to organizational and government Web

sites?

 

They pose a high threat, since they were able to do it with United States Department of Justice. Any site out there is susceptible to hacking, it just comes down to how secure it really is.                       

 

Discussion Questions

1. What role did computer forensics play in the high-profile cases of the New York subway

bomber and the San Francisco Bay oil spill?

 

Cyber forensics played a big role in the subway bomber case because the FBI and CIA were able to recover information that was hidden and or deleted by sweeping his computer.

 

2. Why might computer forensics be more effective at preventing crimes than other forms of

criminal investigation?

 

Because a lot of cases now involve criminal acts being committed on technological media which, in some cases, only cyber forensic investigators can find. Things can seemingly be kept anonymous on the internet but, in most cases, big brother is watching.

 

3. In addition to computer-related training, what other education and background would be

ideal for someone who wants to make a career in computer forensics? 

 

Someone who has experience with forensic crime solving would be a great candidate to train for cyber forensics. This is because in order to “walk the walk, and talk the talk” you need to have the foundational mindset for the work. Thinking outside the box is the greatest mental strategy to have with regards to forensics.