Discussion
In order to keep discussions lively please choose at leastONEof the questions below and post to the discussion board no later than the start of Week 4 to give others the chance to respond.Ashley Madison (ashleymadison.com) promotes itself as a dating Web site for married people. In July of 2015 a group called The Impact Team broke into the company and took all their data, holding it for the ransom of the site being shut down ("OnlineCheating SiteAshleyMadisonHacked"http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/.) When Ashley Madison did not agree to the ransom, the Impact Team released the data. You can read all about the security breach in the Ashley Madison reading section. Here are your topics to discuss (discuss all of them) 1. The behavior Ashley Madison promotes is considered immoral in most cultures. Because the people registered on the site are presumed to be engaging in behavior popularly considered immoral many observers thought the customers had it coming, as it were. Discuss this idea. Do you agree with it? Why or why not? 2. What can beprovenwith the data? 3. The data is currently not very accessible to non-technical users; would it be ethical to make the data more accessible to the victims of the breach so they could demonstrate potential innocence? 4. What does the Ashley Madison case say about security and privacy in general?Suppose a denial-of-service attack shuts down two dozen major websites, including retailers, stock brokerages, and large corporate entertainment and information sites, for several hours. No data was compromised. The attack is traced to one of the following perpetrators. Do you think different penalties are appropriate, depending on which it is? Explain why. If you would impose different penalties, how would they differ? Describe the penalties for each case, including potentially creative alternatives, as well as your rationale:a. A foreign terrorist who launched the attack to cause billions of dollars in damage to the U.S. economy.b. A newly hired IT employee working for an Internet domain registrar whose script malfunctioned during an enterprise-wide test. He panicked and didn't inform his supervisors because he was afraid of being fired.c. A teenager using intrusion tools she found on a website.d. A cyberintrusion group showing off to another cyberintrusion group about how many sites it could shut down in one day.e. A group of extremist animal-rights vegans who wish to return society to a pre-industrial existence. They had hoped to permanently shut down the Internet and have vowed to try again.You own a small software consulting company. A local gated community has approached you with a request for proposal (RFP). There has been an increase in vandalism. The local news recently featured a story about burglars wearing garbage crew uniforms. Dog droppings are a nuisance, despite the complimentary plastic bags positioned all along the walking trails. Several female residents have reported flashers (men exposing themselves) and one female jogger had to escape someone grabbing her. Some famous rare songbirds have been gradually disappearing; cats are suspected. A hearing-impaired child crossing the street was injured by a bicycle going too fast. There are two entrance/exits for the community. They want to keep track of the times of the arrivals and departures of every person who comes into the gated community, in car, by bicycle or motorcycle, or on foot (there is a bus stop across the street and a light rail station a block away), whether that is residents, guests, service workers (including postal workers and emergency responders), employees, and pets. Furthermore, they wish to keep track of all grievances filed to the main office: noise complaints, appearance complaints, dog waste and off-leash issues, etc. As prospective clients often do, they've already begun considering the physical implementation: they wish to use RFID chips in the pets (including service animals) and issue RFID photo badges to residents, employees, and regular service workers, including emergency responders assigned to the area. Guests and irregular service workers will need to check in and receive a temporary RFID photo badge from either gate and turn it back in when they leave. All vehicles, including bicycles, belonging to residents will be outfitted with RFID chips, as well. Visiting vehicles, including bicycles, will have an RFID sticker attached during their visit. Visiting pets (including service animals) will be issued temporary RFID collars. They are considering a badge program for regular guests, but haven't decided how to secure that in case the guest becomes unwanted. Residents will be required to supply the main office with all household member (including pets) and contact information, including mobile phone numbers. Assume all of what the gated community wishes to do is legal. Prepare ethical arguments for and against their plans. [BREAKING NEWS: the community has recently acquired aUAV- and wants advice on how to best use it]Many of the reading articles (noted as being useful for Weighty Post Option #4) discuss "A Right to Be Forgotten". Develop and post your arguments both for and against "A Right To Be Forgotten" legislation. As one of the articles poses at the end, "How do you allow people to force information to be removed without challenging the 'freedom of the Internet'?" Have you personally had something end up on the Internet that you wished you could take back? Feel free to incorporate recent news items about celebrities and photos in the Cloud.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question