logo

Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack

5 Pages828 Words74 Views
   

Added on  2023-01-16

About This Document

This study explores classical ethical theories and ways to resolve cyber-crime, focusing on the Petya cyber attack. It discusses the ethicality of cybersecurity practices and the impact on privacy and political rights. The study emphasizes the importance of ethical considerations in businesses' incident responses and breach handling.

Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack

   Added on 2023-01-16

ShareRelated Documents
Running head: CYBER-CRIME
Cyber-Crime
(Petya Cyber Attack)
Name of the student:
Name of the university:
Author Note
Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack_1
CYBER-CRIME
Understanding classical theories and ways to resolve the issues for cyber-crime:
Ethics is a critical element of the sound defense strategy of cyber-security. Despite any clear
ethical rules and standards, the professionals of cybersecurity have been indistinguishable from
various criminals with black-hat. They are against the individual whom they have been seeking to
secure the data and systems. In this study, Information Technology ethics is understood from the case
of 'Petya' ransomware attack.
Applying various classical ethical theories:
The Petya is the family of encrypting ransomware. It was initially found in 2016. It has
targeted the systems that are Microsoft Windows. It has affected the record of the master boot for
executing the payload. This is to encrypt the file system at the hard drive. The first company at
Australia to be affected by the attack of the Cadbury's Chocolate Factory in Hobart (Richardson and
North 2017). The utilitarianism has been considering the results of behaviors or actions. It has been
seeking whether it can optimize pleasure through minimizing the pain. The black hat hacking has
been seeking for increasing the pain that has been inflicted on the external parties. This can be
typically political and technological. This is the only variant to hack considering to be unethical as
per utilitarianism.
To understand the ethicality of the privacy of information. This is needed to contemplate the
problems under the ethical system. The duties and rights or deontology have been concentrating on
performing activities. These are right in themselves instead of being right due to their outcomes.
Implementing the moral act as the activity to determine the rights of other people and the duties posed
on the actors. The approach is suitable for the analysis of the privacy of data (Fayi 2018). This is
because one can claim the right towards protecting data with corresponding duties. For finding the
Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Essay on Cyber Security And Privacy
|9
|1930
|38

Cyber Crime and Ethics
|9
|2307
|294

A Brief Study on Cyber Crime and Ethical Hacking
|6
|1709
|80

Theories of Ethics: Just Consequentialism, Utilitarianism, and Deontology in Information Ethics
|4
|731
|141

Ethical Considerations in Cyber-Crime
|6
|802
|128

IT Ethics and Law in Cyber Security in UK
|7
|1331
|436