logo

Verizon Wireless Cyber Attack

8 Pages1711 Words226 Views
   

Added on  2019-10-30

Verizon Wireless Cyber Attack

   Added on 2019-10-30

ShareRelated Documents
Running head: VERIZON WIRELESS CYBER ATTACKVerizon Wireless Cyber AttackName of the StudentName of the UniversityAuthor’s Note:
Verizon Wireless Cyber Attack_1
1VERIZON WIRELESS CYBER ATTACKIntroductionICT or Information and Communication Technology has taken the modern world oftechnology. Tremendous advantages are obtained from this technology. It combines the basiccommunication mode with technologies like wireless signals (Niebuhr, 2013). It reduces the costand complexities of the technologies. In spite of having such marvelous advantages, ICT isresponsible for various cyber attacks and cyber crime in the technological world. The attacks andcyber threats are challenges for the cyber world. Every cyber threat is a challenge to the ethicalworld (Dewey, 2016). The four classical theories of ethics solve the problems of ethicaldilemmas in the world.The following essay provides a brief description about the cyber attack of VerizonWireless organization. It is one of the most dangerous cyber attacks in the history of cyber crime.The case study is described with the help of four classical theories of ethics. The essay links thecase study with all the four theories of ethics. The description is given in the followingparagraphs.DiscussionVerizon Wireless Case StudyThe very popular and recognized company of the United States of America, VerizonWireless, provides several products and services that are wireless. An infamous data breach tookplace in the organization in July 2017. All the data related to the customers were exposed in thecloud. The partner of Verizon Wireless organization was responsible for this cyber attack("Verizon customer information exposed in data breach", 2017). Data was not protected perfectly
Verizon Wireless Cyber Attack_2
2VERIZON WIRELESS CYBER ATTACKand it was leaked. The cause of this cyber attack was the non-configured repository files. Thesefiles were based on cloud. Approximately 14 million client details were exposed in the scam.These details contained the account numbers, pin numbers, usernames and everything about theclients. This was recorded as one of the most dangerous cyber attacks ever happened.Four Classical Ethical TheoriesThe Four Classical Theories of Ethics helps to solve the ethical dilemmas in non-ethicalsituations (Dewey, 2016). The theories include the Utilitarianism Theory, Deontology Theory,Virtue Theory and the Contract Theory. Utilitarianism TheoryThis particular theory states that an activity can be claimed as the best activity only if itprovides maximum utility. Even the activity should maximize the utility of a situation. Thesatisfaction gained from a utility after subtracting the suffering and trouble of an individualinvolved in that activity (Crimmins, 2017). The two most common types of utilitarianisms arethe average utilitarianism and total utilitarianism. The average utilitarianism occurs when there isa chance of gaining average utility from a situation. The total utilitarianism occurs when there isa chance of obtaining complete or total utility from a situation. These assumptions are made afterevaluating the situation by the theory. In the case study, Verizon Wireless has suffered through amajor cyber attack. All the data related to the customers were exposed in the cloud. The partnerof Verizon Wireless organization was responsible for this cyber attack. Data was not protectedperfectly and it got leaked. The cause of this cyber attack was the non-configured repositoryfiles. These files were based on cloud (Arntzenius, 2014). This particular act of the partner ofVerizon Wireless is a non-ethical act. All data in an organization is highly confidential in nature.
Verizon Wireless Cyber Attack_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ETHICAL ISSUES IN CYBER CRIME.
|8
|1652
|638

Ethical Issues in Cyber Crime Assignment
|6
|1770
|409

Cyber Attacks on Verizon Wireless Network
|10
|1842
|34

Report On Cyber Attacks | ICT In Modern World
|11
|2431
|35

Essay on Classical Theories of Ethics
|9
|1870
|46

Ransomware Attack Case Assignment
|9
|2074
|82