Question

In: Computer Science

Jenny had discovered some new friends on the Internet—friends who shared her interest in programming. One...

Jenny had discovered some new friends on the Internet—friends who shared her interest in programming. One of these new friends sent her a link to a new warez (illegally copied software) site.

She downloaded a kit called Blendo from the warez site. Blendo is a tool that helps novice hackers create attack programs that combine a mass e-mailer with a worm, a macro virus, and a network scanner. She clicked her way through the configuration options, clicked a button labeled “custom scripts,” and pasted in a script that one of her new friends had e-mailed to her. This script was built to exploit a brand-new vulnerability (announced only a few hours before).

Although she didn’t know it, the anonymous high-schooler had created new malware that was soon to bring large segments of the Internet to a standstill.

She exported the attack script, attached it to an e-mail, and sent it to an anonymous remailer service to be forwarded to as many e-mail accounts as possible. She had naively set up a mailback option to an anonymous e-mail account so she could track the progress of her creation. Thirty minutes later, she checked that anonymous e-mail account and saw that she had more than 800,000 new messages; the only reason there were not even more messages was that her mailbox was full.

Required:

Evaluate the ethical issues as described in the scenario.

(1000 to 1200 words)

Solutions

Expert Solution

Ans for the given problem

If we read this scenario carefully we find multiple Cyber crime activities happening here.

1. Illegal/unauthorised access

2. Software attacks/Viruses

3. Lack commendment by a Programmer

1) Illegal/unauthorised access –

Taking access of any software program or a hardware or a system without proper permission of owner is called as Unauthorised access. In our scenario a worm that spread via email is taking unauthorised access of Jenny’s email box.

2) Software attacks/Viruses –

A worm which gets created through Blendo tool which is only created for destroying or doing some un ethical activities is called as virus attack.

3) Lack of Commendment –

As a computer professional / programmer we have certain responsibilities on us. We have to use our resources, software ethically and for purpose of good for society. Using an illegal software is not accepted here.

Also, while using an external link it is always expected that a computer professional should scan it for virus and then use OR at least verify it before downloading.

************************************Thank You************************************


Related Solutions

Interest groups are groups of people with a shared interest or characteristic who attempt to influence...
Interest groups are groups of people with a shared interest or characteristic who attempt to influence government to promote their shared interest. A variety of different types of interest groups exist. For example, economic groups can be a collection of small businesses, such as the Small Business Association of America, or a union, such as the California Faculty Association. Your constitutional right to engage in interest group activity can be found in the First Amendment to the U.S. Constitution, which...
Think about some of your friends and what you have discovered by visiting their homes. Do...
Think about some of your friends and what you have discovered by visiting their homes. Do they buy different things than you do? If so, why? How might a company distinguish you from them in terms of its targeting? Is it always harder to find new customers than it is to retain old ones or does it depend on the business you're in? Does one-to-one marketing have to be expensive? How can small organizations interact with their customers in a...
One of your friends had a very serious medical emergency and had to go to the...
One of your friends had a very serious medical emergency and had to go to the hospital for treatment. She was very upset because upon her arrival, she was asked for her insurance card, which she did not have, and was transferred to another hospital. You had learned there was a law that was passed that made this type of treatment by a hospital illegal. However, before telling your friend opinion, you wanted to find out more about this law...
Jenny bought a new car for $30,000. The loan contract asked her to pay $880 per...
Jenny bought a new car for $30,000. The loan contract asked her to pay $880 per month for 36 months. What is the APR of the auto loan? 0.30% 3.57% 2.93% 3.37%
Mary is writing letters to her friends Barry, who lives in Australia, and Nelly and Penny,...
Mary is writing letters to her friends Barry, who lives in Australia, and Nelly and Penny, who live overseas. She seals the letters in the envelopes but is called to the door and cannot remember which letter is in which envelope when she gets back. Since she is in a hurry and doesn’t have any spare envelopes, she just writes the three addresses on the three envelopes in a random order. She only has one international $3 stamp and two...
describe an incident in which some one defined you as a deviant by others who had...
describe an incident in which some one defined you as a deviant by others who had greater social power .Did the incident involve race, class and gender? How did this incident illustrates the importance of power in the process of defining what is and is not deviant?
In 2018, Elizabeth and some of her friends invested money to start a company named FRIENDZ...
In 2018, Elizabeth and some of her friends invested money to start a company named FRIENDZ Corporation. The following transactions occurred during 2018. Jan 1                         The corporate charter authorized 70,000 shares of 5%, $100 par value cumulative preferred stock and unlimited shares of $10 par value common stock. Jan 6                         Issued 200,000 common shares at $16 per share to Elizabeth and other investors Jan 7                         Issued another 500 common shares to Elizabeth in exchange for her services in organizing the corporation. Jan 12                       The...
You have some friends who are doing a group project with you. The goal is to...
You have some friends who are doing a group project with you. The goal is to test H0 : u = 5 vs H1 : u > 5. They have to go, but before they leave they tell you what they have found. They have a sample mean = 4.8, a critical number x bar ( this would be x with a bar over it ) critical = 4.9, ( xc = 4.9 , where the underline should be on...
Some friends tell you that they paid $14,773 down on a new house and are to...
Some friends tell you that they paid $14,773 down on a new house and are to pay $769 per month for 30 years. If interest is 6.3% compounded monthly,what was the selling price of the house?How much interest will they pay in 30 years?
Early in 2018 Johnson Company was acquired by a new owner who discovered errors in the...
Early in 2018 Johnson Company was acquired by a new owner who discovered errors in the accounting records. The new owner would like you to analyze the error described and then determine the impact the accounting items listed. Each error should be analyzed separately. Be Sure to indicate the dollar amount or not the error caused the items to be overstated (OS) or Understated (US) or No Effect. Vacation pay earned in 2017 of 31100 was not accrued in 2017....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT