VERIZON WIRELESS CYBER ATTACK.

Added on - 30 Oct 2019

  • 8

    pages

  • 1711

    Words

  • 81

    Views

  • 0

    Downloads

Showing pages 1 to 3 of 8 pages
Running head: VERIZON WIRELESS CYBER ATTACKVerizon Wireless Cyber AttackName of the StudentName of the UniversityAuthor’s Note:
1VERIZON WIRELESS CYBER ATTACKIntroductionICT or Information and Communication Technology has taken the modern world oftechnology. Tremendous advantages are obtained from this technology. It combines the basiccommunication mode with technologies like wireless signals (Niebuhr, 2013). It reduces the costand complexities of the technologies. In spite of having such marvelous advantages, ICT isresponsible for various cyber attacks and cyber crime in the technological world. The attacks andcyber threats are challenges for the cyber world. Every cyber threat is a challenge to the ethicalworld (Dewey, 2016). The four classical theories of ethics solve the problems of ethicaldilemmas in the world.The following essay provides a brief description about the cyber attack of VerizonWireless organization. It is one of the most dangerous cyber attacks in the history of cyber crime.The case study is described with the help of four classical theories of ethics. The essay links thecase study with all the four theories of ethics. The description is given in the followingparagraphs.DiscussionVerizon Wireless Case StudyThe very popular and recognized company of the United States of America, VerizonWireless, provides several products and services that are wireless. An infamous data breach tookplace in the organization in July 2017. All the data related to the customers were exposed in thecloud. The partner of Verizon Wireless organization was responsible for this cyber attack("Verizon customer information exposed in data breach", 2017). Data was not protected perfectly
2VERIZON WIRELESS CYBER ATTACKand it was leaked. The cause of this cyber attack was the non-configured repository files. Thesefiles were based on cloud. Approximately 14 million client details were exposed in the scam.These details contained the account numbers, pin numbers, usernames and everything about theclients. This was recorded as one of the most dangerous cyber attacks ever happened.Four Classical Ethical TheoriesThe Four Classical Theories of Ethics helps to solve the ethical dilemmas in non-ethicalsituations (Dewey, 2016). The theories include the Utilitarianism Theory, Deontology Theory,Virtue Theory and the Contract Theory.Utilitarianism TheoryThis particular theory states that an activity can be claimed as the best activity only if itprovides maximum utility. Even the activity should maximize the utility of a situation. Thesatisfaction gained from a utility after subtracting the suffering and trouble of an individualinvolved in that activity (Crimmins, 2017). The two most common types of utilitarianisms arethe average utilitarianism and total utilitarianism. The average utilitarianism occurs when there isa chance of gaining average utility from a situation. The total utilitarianism occurs when there isa chance of obtaining complete or total utility from a situation. These assumptions are made afterevaluating the situation by the theory. In the case study, Verizon Wireless has suffered through amajor cyber attack. All the data related to the customers were exposed in the cloud. The partnerof Verizon Wireless organization was responsible for this cyber attack. Data was not protectedperfectly and it got leaked. The cause of this cyber attack was the non-configured repositoryfiles. These files were based on cloud (Arntzenius, 2014). This particular act of the partner ofVerizon Wireless is a non-ethical act. All data in an organization is highly confidential in nature.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document