Ethics in Cybersecurity: North Korea and the Sony Hack
Select one of the following case studies from the Study Materials for this module to analyze for this discussion forum:
North Korea and the Sony Hack
Hackers Gain Direct Access to U.S. Power Grid Controls
Foreign Economic Espionage in Cyberspace
Then respond to the following:
What ethical issues relate to the cybersecurity threat discussed in the case study?
How do you see the importance of applying a deontological or consequentialist approach to addressing cyber threats that transcend national boundaries not only now, but into the future?
How might a pluralist approach to ethics be employed to further develop and implement an effective international agreement on cyber norms?
Readings:
1. Greenberg, A. (2017, September 6). https://www(dot)wired(dot)com/story/hackers-gain-switch-flipping-access-to-us-power-systems/
2. Haggard, S., & Lindsay, J. R. (2015). https://www(dot)eastwestcenter(dot)org/system/tdf/private/api117.pdf?file=1&type=node&id=35164
3. National Counterintelligence and Security Center. (2018). https://www(dot)dni(dot)gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf
4. AFP in the Hague. (2016, June 28). https://www(dot)theguardian(dot)com/world/2016/jun/28/cyberbulling-suicide-netherlands-canada-amanda-todd
5. Chernenko, E., Demidov, O., & Lukyanov, F. (2018, February 23). https://www(dot)cfr(dot)org/report/increasing-international-cooperation-cybersecurity-and-adapting-cyber-norms
6. Duggan, M. (2017, July 11). http://www(dot)pewinternet(dot)org/2017/07/11/online-harassment-2017/
7. Florida Atlantic University. (2017). https://www(dot)sciencedaily(dot)com/releases/2017/02/170221102036.htm
8. Pendergrass, W. S., & Wright, M. (2014). http://iacis(dot)org/iis/2014/25_iis_2014_132-140.pdf
Name
Course
Date
Cyber security
Cyber security refers to the practice of defending electronic systems, servers, computers, networks, and mobile devices from shrewish, malicious, and mischievous attacks. Cyber security has been prone to hacker attacks off late. There have been several cases of cyber-attacks in various places all over the world. One of the case is the North Korea and Sony hack where some hackers with the title Grand Old Party intruded the Sony internal data and accessed all its top secrets (Stengel, 2019).. The hackers many of the Sony’s personal computers and servers. The Grand Old Party wiped around 50% of Sony’s global network. These incidences took back Sony in the 1980s where it could only accept cash as the only means of payment. The hackers stole all Sony’s data before deleting it.
There are several issues which we can relate to this cyber security threat highlighted above. The attack raised issues like freedom of free speech and journalism ethics to disseminate information or something acquire by illegal means. Most people protest following the leakage of a highly confidential movie where the North Korean president Kim Jung-un dies after his helicopter downs and the president’s ...
π Other Visitors are Viewing These APA Essay Samples:
-
Critical Reading Review: βToronto Has No History!β
5 pages/β1375 words | No Sources | APA | Social Sciences | Other (Not Listed) |
-
Artificial Intelligence: Issues, Benefits, Policies, and Reasoning
1 page/β275 words | No Sources | APA | Social Sciences | Other (Not Listed) |
-
Engines of Change in Old Paris and New Lagos
5 pages/β1375 words | No Sources | APA | Social Sciences | Other (Not Listed) |