Kim Mattson

ITS 360

CH 3

What Would You Do?

2. As the CFO, I would say nothing to the blackmailer, nor would I give in to his demands.  Notifying the appropriate authorities would be the next phone call I would make.  I would proceed to speak with the IT staff about the issue and what steps are needed to resolve it, and what can be set in place to prevent or minimize any cyber-attack.

5. I would set up a meeting with the CIO and ask to see the details and reasons for the chosen security improvements. I would make it clear that I am not trying to undermine her knowledge but explain that it is over the budget and would need to be approved by the CEO. She could possibly explain things to the CEO as well.  Also coming up with an alternative plan or postpone some elements of the upgrade for the next year if possible. The CIO could also participate with yearly budgeting to ensure enough is allocated towards the IT needs.

Cases

Anonymous and Social Hacktivism

1. Although the motive behind some of their attacks seem justified, it is not the way things go in society.  The activities they collaborate on are still illegal and risking freedom over it would not be worth it. There are other ways to support your beliefs; although they may not produce results quickly or at all.

2. Anonymous’ actions against PayPal, MasterCard, and Bank of America were ethical.  These financial corporations were processing donations and that just boils down to business.  It doesn’t necessarily mean they support everything WikiLeaks posts and they couldn’t have been that naïve to think nothing controversial would ever come up. And setting up satellite stations for the citizens of Syria was a considerate action to them. The citizens had nothing to do with Anonymous and Anonymous was aware of the possible consequences and took steps to ensure the citizens didn’t receive backlash.

3. Anonymous is a serious threat. It seems at times their efforts have a good conviction behind it, but if you’re a government entity or major corporation, chances are you will rub one member the wrong way and be their next focus.

 

Computer Forensics

1.  Because of computer forensics, incriminating electronic evidence was revealed. ‘Electronic paper trails’ last forever somewhere, no matter where they were erased.

2. Computer forensics can dig up or trace someone’s motives before anything is executed. Other means of investigating can be explained as happenstance or circumstantial, not especially concrete.  Documents, websites, emails are concrete evidence; they can be directly tied to someone.

3.  Any experience in law enforcement, the criminal system, accounting, finance, and foreign languages would be an asset with pursuing careers in computer forensics.