Cybersecurity Report: Analysis of Whistleblower Case Study

Verified

Added on  2019/09/16

|3
|510
|358
Report
AI Summary
This report analyzes a cybersecurity case involving a whistleblower who identified a security flaw. It explores the ethical and legal implications of such actions, particularly focusing on the balance between identifying vulnerabilities and the potential consequences for those who report them. The report discusses the importance of secure systems, the role of whistleblowers, and the legal protections available to them. It also highlights the challenges faced by security experts and the need for organizations to address identified security issues promptly. The report emphasizes the importance of cybersecurity and the need for responsible disclosure of security vulnerabilities, along with the legal and ethical considerations involved in protecting sensitive data and systems. The report also discusses how the cyber security team should be notified about the breach instead of making it public and the importance of the protection for the cyber experts who are working with the cyber crime team.
Document Page
Security expert identifies failure in
software, gets into trouble
1. When we discuss the common thing in a part of the cyber world, publicly accessible
websites have both advantages and disadvantages. When any of the security experts try to break
in the public network and analyze the flaws of open sites, he can find lots of major concerns with
those open sites. As Patrick Webster did with First State Super, he tried to breach the security of
First State. Although the intentions of whistleblower were not bad, he only wants to warn the
company regarding the security issue of the website. For such, security expert should be listening
about the issues and overcome those issues by working together will be a better option.
2. The open sites of the Internet make it vital for organizations to concentrate on the
security of their framework, as organizations move their business operations into the publicly
accessible networks, they should be cautious with their website security. As we can see in this
case where First State Security was notified by the Patrick and instead of various notifications,
they were not taking this seriously. Information should never be made public as doing that will
be the cyber law and any individual doing that will be treated under cybercrime act. Instead of
making information public, same can be notified to the cyber crime team.
3. Sadly, retaliation against the security experts who blow the whistle on the issues of
digital security is exceptionally normal. However, there are state and government laws that give
legitimate security and financial motivating forces for Digital Whistleblowers or cyber experts.
The Cyber Security Whistleblower Protection Manual gives them subtle elements on key
legitimate cases and government Whistleblower Award programs that might be accessible to
you. These programs will not only help these cyber experts in finding the vulnerability in the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
cyber world but also motivates them to work with the cyber crime team and find the holes or
breach in the security wall. Here are the current protections for Cybersecurity Whistleblowers:
Sarbanes-Oxley and Dodd-Frank Security.
Security for the employees of banks and other deposit institutions.
False Claims Act Security.
Security for Nuclear Whistleblowers.
Security for federal government employees.
Document Page
References
Vaughn, R. G. (1982). Statutory Protection of Whistleblowers in the Federal Executive Branch.
U. Ill. L. Rev., 615.
The recommendation, C. M. (2014). Rec (2014) 7 of the Committee of Ministers to member
States on the protection of whistleblowers. Adopted by the Committee of Ministers on 30 April
2014.
Robinson, R. K., Novicevic, M., & Nichols, D. L. (2014). Expanding Protection for
Whistleblowers under Federal Employment Laws: A Primer on Retaliation. Southern Law
Journal, 24(2), 221.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]