Question

Evaluate the ethical issues as described in the scenario. Jenny had discovered some new friends on...

Evaluate the ethical issues as described in the scenario.

Jenny had discovered some new friends on the Internet—friends who shared her interest in programming. One of these new friends sent her a link to a new warez (illegally copied software) site.

She downloaded a kit called Blendo from the warez site. Blendo is a tool that helps novice hackers create attack programs that combine a mass e-mailer with a worm, a macro virus, and a network scanner. She clicked her way through the configuration options, clicked a button labeled “custom scripts,” and pasted in a script that one of her new friends had e-mailed to her. This script was built to exploit a brand-new vulnerability (announced only a few hours before).

Although she didn’t know it, the anonymous high-schooler had created new malware that was soon to bring large segments of the Internet to a standstill.

She exported the attack script, attached it to an e-mail, and sent it to an anonymous remailer service to be forwarded to as many e-mail accounts as possible. She had naively set up a mailback option to an anonymous e-mail account so she could track the progress of her creation. Thirty minutes later, she checked that anonymous e-mail account and saw that she had more than 800,000 new messages; the only reason there were not even more messages was that her mailbox was full.

Required:

Evaluate the ethical issues as described in the scenario.

(1000 to 1200 words)                                                                                                                

Homework Answers

Answer #1

If we read this scenario carefully we find multiple Cyber crime activities happening here.

1. Illegal/unauthorised access

2. Software attacks/Viruses

3. Lack commendment by a Programmer

1) Illegal/unauthorised access –

Taking access of any software program or a hardware or a system without proper permission of owner is called as Unauthorised access. In our scenario a worm that spread via email is taking unauthorised access of Jenny’s email box.

2) Software attacks/Viruses –

A worm which gets created through Blendo tool which is only created for destroying or doing some un ethical activities is called as virus attack.

3) Lack of Commendment –

As a computer professional / programmer we have certain responsibilities on us. We have to use our resources, software ethically and for purpose of good for society. Using an illegal software is not accepted here.

Also, while using an external link it is always expected that a computer professional should scan it for virus and then use OR at least verify it before downloading.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Carol Travis had recently shorted 400 shares of Pfi zer, Inc., at $25 because of new...
Carol Travis had recently shorted 400 shares of Pfi zer, Inc., at $25 because of new federal regulations on Medicare. She put up half the value of the purchase or $5,000 as margin. Pfi zer stock price $ 25 Shares purchased 400 Total purchase $10,000 Margin percentage (50%) 5,000 When the stock initially fell to $23.50 on a Friday, she was really excited. Based on the 400 shares she sold short, she had a $600 profi t. However, over the...
In the case below please answer the following 4- 6 pages 1. State the ethical issues...
In the case below please answer the following 4- 6 pages 1. State the ethical issues 2. State the legal issues 3. Discuss the options/debate the issues 4. Discuss extra info needed to make decision Rina Cummings has worked three 12-hour shifts every week at Amazon’s gargantuan New York City warehouse, called JFK8, on Staten Island since it first began operations in late 2018. As a sorter on the outbound ship dock, her job is to inspect and scan a...
Discuss ethical issues that can be identified in this case and the mode of managing ethics...
Discuss ethical issues that can be identified in this case and the mode of managing ethics Enron finds itself in this case. How would you describe the ethical culture and levels of trust at Enron? Provide reasons for your assessment. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among...
Review and submit the Donatos: Finding the New Pizza case study below. Answer the following two...
Review and submit the Donatos: Finding the New Pizza case study below. Answer the following two questions: 2. Evaluate the Wassup meeting as an exploratory methodology to help define the research question. 4. What measurement scales would you have used on the survey that was part of the in-restaurant product tests? Abstract and Written Case: The pizza segment of the fast-food industry is very aggressive. As people’s tastes change and new diets become the rage, restaurant chains must decide if...
Mattel Responds to Ethical Challenges Business Ethics This case was written by Debbie Thorne, John Fraedrich,...
Mattel Responds to Ethical Challenges Business Ethics This case was written by Debbie Thorne, John Fraedrich, O. C. Ferrell, and Jennifer Jackson, with the editorial assistance of Jennifer Sawayda. This case was developed for classroom discussion rather than to illustrate either effective or ineffective handling of an administrative, ethical, or legal discussion by management. All sources used for this case were obtained through publicly available material. Mattel, Inc. is a world leader in the design, manufacture, and marketing of family...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the purchases and fixed assets business areas. Prepare a 12- to 16-slide presentation describing the purchases and fixed assets business areas. Be sure to incorporate speaker notes as well as appropriate visuals, graphics, fonts, etc. Include any associated risk in these areas. Describe specific internal controls that include authorization of transactions, segregation of duties, adequate records and documentation, security of assets, and independent checks and...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT