Respond to the two posting below by students.
The article which is addresses about Cyber Attacks on U.S. Companies since 2014 to 2015. Hackers mainly focusing on databases, point-of sale systems for financial gain. They are targeting by
nation-states on infrastructure. Few things are organized by date of attack which is publicly announced by the attacks or breaches. In December 2015 Iranian hackers got control of this New York
dam’s sluice system in 2013, but all the controls are disconnected manually at the time of cyber breach. The owner of the Hyatt hotel announced publicly that he identified malware on payment
processing systems which was used on multiple locations. Between August and December 2015 it affected 250 locations which were revealed in investigation.
Alliance Health it is an online health portal, have exposed personal information of 1.5 million users by misconfiguration of installing mongo DB database. From beginning of fall 2015 1.025 Wendy’s
restaurant has been affected by hacking customer’s payment information by breach to June. A hacker with Twitter handle announced online names and contact information of 2, 9000 department of
Homeland Security and FBI employees in February 2016. The entire above mentioned are attacks caused on U.S companies due to hackers and these can be considered as the 7th computer ethics i.e.
should not use other peoples’ computer resources without authorization.
Walters, R. (2014). Cyber-attacks on US companies in 2014. Heritage Foundation Issue Brief, 4289.
As our world turns to the digital technology, the normal client’s connectivity changes from discontinuous to consistent as we encounter new challenges that disturb our prosperity. The first
commandment of the Computer Ethics was violated. The commandment says that, “Thou shall not use a computer to harm other people.” This commandment clarifies that it’s not acceptable to steal
someone’s information through the computer. The acts of accessing data of other individuals without their consent are unethical and unacceptable. Some types of these violations are phishing,
hacking, spamming and cyber-bullying (Wire, 2017).
An article that clarifies this violation was published on 18th January 2017 by Tribune Media Wire. This article explains about Gmail phishing scam that makes well informed clients look like
novices. Mark Maunder, the CEO of Word fence clarified that the hacker will probably send you an email that contains an attachment. When clicked on, you are taken to a page like Gmail login and if
enter your login credentials you are offering access to hackers to your email accounts. The author indicates that Gmail users ought to permit two-factor authentication which gives one an additional
level of security (Wire, 2017). The article says unless the scammers get access to your telephone, they are not able to have the access code that allows one to get the account. The specialists
assert that that one needs to look for the lock icon that is found next to the address bar indicating a secure website. Sometimes it’s a foolproof endeavor where scammers host their web pages on
Prosecuting cybercrime remains a challenge to legal hierarchy even though it has grown to be a big presence. Ardit Ferizi became the first person to be prosecuted by the United States for Cyber
Crimes in 2015. It’s puzzling that this threat is large and yet the society seems unprepared to manage it. 76% of consumers are aware that they should secure their data online and yet they still
involve themselves in hazardous behavior. This sort of word wide ambivalence is quite worrying and could have a big effect on our ability to combat cybercrime in future.
My greatest concern is that criminals might get a leeway through our gadgets in the pocket and at home. The challenge is dependent upon us to ensure we are not manipulated and we take any steps
necessary to guard our digital information. If we stop thinking about it, there are various ways that could be followed to enhance our digital security.
If I were in a similar position, I would do investigate on this phishing hackers with the help of FBI for high profile leaders who may be behind this scam