Ryan Volz

ITS 370

Shin ping Tucker


4.)† The Company that I picked was 3M which is headquartered in St. Paul Minnesota. The chief executive officer (CEO) is Mike Roman, the chief information officer (CIO) is John Repko, and the chief information security officer (CISO) is John Valente. The easiest one to find was the CEO and the hardest one to find by far was the CISO.

5.) Kevin Mitnick is one of the most notorious hackers of all time, and now is a American computer security consultant. Before he was a consultant, he was a hacker and he started at a young age. At the age of 12 years old he hacked the Los Angeles punch card system used by the cityís bus system. He hacked a few other companies such as Digital Equipment Corporation and copied their software. He also hacked into Pacific Bell, which is owned by AT&T, voice mail computers. In order to track down and capture Kevin Mitnick, the FBI had the help from Tsutomu Shimomura. †††††


Case Exercises:

††††††††††† Discussion Questions:

1.) I think it was an insider because most likely Amy got an email, she opened the email, or clicked on a link in that email that allowed the worm or virus to get into the system. †

2.) What SLS can do to help prepare for this next incent or prevent it is provide training to the employees and educate them on what to do and not to do when they get a suspicious email.

3.) I think it was a virus because it spread to all the computers after it accessed Amyís computer.

††††††††††† Ethical Decision Making:

1.) I donít think it would be ethical for Amy to open files that contain a peoples Social Security Numbers, because that is private and personal information that shouldn't be passed around.

2.) If an email like that came through do not open it because it could contain a virus or worm. So, either report this with your manger or IT official and decide what the best course of action would be.