StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

When Hackers Turn to Blackmail - Article Example

Cite this document
Summary
The research paper “When Hackers Turn to Blackmail” will look at the role that security and safety in safeguarding all the resources of the organization. Resources mean assets and human personnel, including all systems and processes contained therein…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
When Hackers Turn to Blackmail
Read Text Preview

Extract of sample "When Hackers Turn to Blackmail"

When Hackers Turn to Blackmail Harvard Business Review; October 2009, pp. 39 – 48. In an organization, the role that security and safety assumes is of critical importance in safeguarding all the resources of the organization. Resources mean assets and human personnel, including all systems and processes contained therein. The scope of responsibilities in security and safety includes detection of any kind of intrusion and initiating appropriate actions to ward off and prevent harm or damage to the organization, and identifying, addressing, and raising safety and security problems and concerns.

The case written by Caroline Eisenmann revealed security breach in Sunnylake’s Hospital’s information technology system, particularly rendering the electronic medical records of patients inaccessible. The hackers demand $100,000 in ransom money to regain access to the system. Paul Layman, the CEO of Sunnylake, is in a quandary as to the options available to address the dilemma.Alternative Courses of Action Mr. Layman is faced with the following alternative courses of action: (1) pay the ransom fee of $100,00 to the hackers to immediately regain access to the system; (2) improve security system by changing access controls, installing power backups, increase defense in depth strategy, employ encryption of data during transmission, strengthen antivirus, power and data back-up systems, firewalls, employs a highly competent human resource, passwords, and other computer security software, as needed; (3) disclose critical information to stakeholders; and (4) go back to manual processing of health care records.

Analysis and Recommendation After reviewing and evaluating the case facts including the expert advice of three commentators, Mr. Layman would be is the best position to do the following action. The advice of Richard L. Nolan is the most viable and consistent with code of business ethics. First and foremost, Mr. Layman should decide once and for all that paying the hacker should not be considered at any cost. Conceding to their demands would make them vulnerable for future security breaches. Further, there is no guarantee that these hackers would stick to their words.

Concurrently, the stakeholders must be informed of the situation to make them aware of dilemma that hospital is currently addressing. At the same token, IT personnel must round the clock to upgrade and fully secure their information system to ensure that this would never happen in the future. The present system’s loopholes should all be corrected including installation of a dependable back up system and business continuity plan in case of emergency situations. The suggestion of Nolan that reverting to a manual system, as required, should immediately be enforced during the installation of a better security information system.

Conclusion In addressing the concerns emerging on increased security strategies involving information systems, the most critical factor to consider is the organization’s awareness to the threats, issues, developments, applications that encompass overall security. Knowledge of one application or devise to counteract security breach might not be enough to completely ensure protection of the organization’s information and communication system. In a health care environment, the issue is confounded by the risk in human lives that are at stake with a security system which is completely vulnerable to cyber attack.

Work Cited:Eisenmann, Caroline. When Hackers Turn to Blackmail. Harvard Business Review. October 2009. Web. 18 April 2010.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 words”, n.d.)
When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/social-science/1565690-write-a-report-on-this-articlewhen-hackers-turn-blackmail
(When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 Words)
When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/social-science/1565690-write-a-report-on-this-articlewhen-hackers-turn-blackmail.
“When Hackers Turn to Blackmail Article Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/social-science/1565690-write-a-report-on-this-articlewhen-hackers-turn-blackmail.
  • Cited: 0 times

CHECK THESE SAMPLES OF When Hackers Turn to Blackmail

Biometric Security

The paper "Biometric Security" tells us about security measures.... These days the world community is experiencing a fierce security scare from several sources.... Terror-related incidents in different parts of the world.... hellip; While on the one hand, the terror attacks are resulting in loss of human lives, the heightened security measures are also causing a lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey, etc....
15 Pages (3750 words) Essay

The Role of Computers in Industrial Espionage

Some other acts associated to this are bribery, blackmail, and technological surveillance.... However, when the search becomes private, industrial espionage is an unlawful act and punishable with financial penalties and sometimes jail time.... Furthermore, this may lead businesses to bankruptcy and also affect the ties of friendly nations for when it already surpasses national boundaries it can make allied nations momentarily are indecisive and doubt...
7 Pages (1750 words) Research Paper

Ethical Thinking on the Life of Celebrities

Hackers either do these things as a sale pitch for their abilities or as a means to blackmail their chosen party.... These hackers believe that all information, whatever the type, needs to be shared.... Everything is just a click away.... People from far ranging islands and across seven seas are better connected than ever in history....
6 Pages (1500 words) Assignment

Application of Information and Communication Technology in Banking

The aim of the present paper is to address the function of information & communication technology in the banking sector.... The writer of the paper claims that the future of banks will not be in banking but rather in the market exchange of financial instruments.... hellip; In modern global banking firms, ICTs are intensively utilized for electronic transactional processing and in supporting banking experts in accomplishing their global tasks across geographical locations and time zones....
11 Pages (2750 words) Term Paper

Computer Crimes in the Modern World

This paper "Computer Crimes in the Modern World" focuses on the fact that with the passage of time, huge developments have been done in the field of computer science.... The computer is being used in every field of life.... A computer is being used in all walks of life.... hellip; The concept of the cyber world and the Internet has revolutionized the world to a great extent....
8 Pages (2000 words) Term Paper

Risk Assessment in Global Finance Inc

The trusted computing base is connected to the rest of the network using an Ethernet router which in turn is connected to a two Ethernet router and to which the switches of different departments are connected.... o provide access to dial-up users a PBX is used that is in turn connected to the network through a firewall....
12 Pages (3000 words) Case Study

Information System for Travel and Tourism

hackers use the system and study it extensively until they become proficient.... hackers use methods such as password cracking, exploiting known security weaknesses, and social engineering to gain access to unauthorized systems.... The essay identifies the common ways used by hackers to gain access to systems and critically evaluates the methods used to defend systems.... hackers focus on individual computer systems whenever they are online....
10 Pages (2500 words) Essay

Microwave Treatment on Maize Seed Germination and Growth

As the paper "Microwave Treatment on Maize Seed Germination and Growth" outlines, within the electromagnetic spectrum, there is the microwave part whose radiation frequency ranges from 300 MHz to 300 GHz.... The electromagnetic waves in this band have a non-ionizing effect.... hellip; The electromagnetic field is characterized by its energy content which is to its frequency by the equation: E = hf, where E = Electric field, h = plank's constant, and f = frequency....
13 Pages (3250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us