Case Study: Application of Ethical Theory to Ransomware Cyber Attacks
VerifiedAdded on 2020/03/28
|7
|1574
|313
Case Study
AI Summary
This case study examines the 2017 Ransomware cyber attack, analyzing its impact and ethical dimensions. The assignment explores the attack's origins, affected stakeholders (including Russia, UK, Ukraine, China, India, Egypt, and Italy), and the malicious software involved (WannaCry). It applies ethical theories such as deontology and utilitarianism to evaluate the moral implications, including illegal operations and extortion. The study highlights the need for advanced security measures like encryption, authentication, and ethical practices to mitigate future attacks. It concludes that implementing advanced security measures, including encryption and authentication, is the best approach for addressing IT network issues. The assignment references key sources to support its analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: APPLICATION OF ETHICAL THEORY
Application of Ethical Theory
Case Study: Ransomware Cyber attack May 2017
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Application of Ethical Theory
Case Study: Ransomware Cyber attack May 2017
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1APPLICATION OF ETHICAL THEORY
Summary of Scenario: Ransomware Cyber attack May 2017
The Ransomware Cyber attack was originated in the month of May, 2017 by a group of
cyber criminals and hackers (McGoogan, Titcomb & Charlotte Krol, 2017). The cyber attack had
been caused for infecting a huge number of computers and devices. The Ransomware Cyber
attack have covered over 45,000 attacks on computer devices over 99 countries including Russia,
UK, Ukraine, China, India, Egypt, and Italy. The major companies had to face the Ransomware
Cyber attack and the most harmful impact was on the Russian Interior Ministry and Europe.
Deontology theory had been helpful for evaluating the moral values of the operations and it
would highlight the development of the correct actions based on the theory of ethics and
knowledge for analysis of the scenario of Ransomware Cyber attack (Crimmins, 2017). The
chief scientist of the firm of Agari had confirmed that the Ransomware Cyber attack was
scattered throughout the globe and it was not intentionally done for harming any specific
country. The malware attack was initiated on 14th April through a dump and it is confirmed that
the group of hackers and cyber criminals behind the attack was Shadow Breakers. The
Utilitarianism theory is developed for implying the righteous decision of probable solutions of
Ransomware Cyber attack and it is based on the happiness and approval of the majority number
of people (Arntzenius, 2014). The Ransomware was typical malware that was prone in
encrypting the user’s data and it demanded specific amount of money for decrypting the data.
The malicious software responsible for harming the computer devices was termed as
WannaCryptor 2.0 or shortly WannaCry. The software exploits the Windows vulnerability and
forms the issues in developing the solution for the windows security update. The attack of the
malicious software had integrated the language support for increasing the threat level in the
Summary of Scenario: Ransomware Cyber attack May 2017
The Ransomware Cyber attack was originated in the month of May, 2017 by a group of
cyber criminals and hackers (McGoogan, Titcomb & Charlotte Krol, 2017). The cyber attack had
been caused for infecting a huge number of computers and devices. The Ransomware Cyber
attack have covered over 45,000 attacks on computer devices over 99 countries including Russia,
UK, Ukraine, China, India, Egypt, and Italy. The major companies had to face the Ransomware
Cyber attack and the most harmful impact was on the Russian Interior Ministry and Europe.
Deontology theory had been helpful for evaluating the moral values of the operations and it
would highlight the development of the correct actions based on the theory of ethics and
knowledge for analysis of the scenario of Ransomware Cyber attack (Crimmins, 2017). The
chief scientist of the firm of Agari had confirmed that the Ransomware Cyber attack was
scattered throughout the globe and it was not intentionally done for harming any specific
country. The malware attack was initiated on 14th April through a dump and it is confirmed that
the group of hackers and cyber criminals behind the attack was Shadow Breakers. The
Utilitarianism theory is developed for implying the righteous decision of probable solutions of
Ransomware Cyber attack and it is based on the happiness and approval of the majority number
of people (Arntzenius, 2014). The Ransomware was typical malware that was prone in
encrypting the user’s data and it demanded specific amount of money for decrypting the data.
The malicious software responsible for harming the computer devices was termed as
WannaCryptor 2.0 or shortly WannaCry. The software exploits the Windows vulnerability and
forms the issues in developing the solution for the windows security update. The attack of the
malicious software had integrated the language support for increasing the threat level in the

2APPLICATION OF ETHICAL THEORY
organization (Kharraz et al., 2015). The industries that rely on the usage of legacy systems are
comparatively most vulnerable for the Ransomware Cyber attack.
Applying Doing Ethics Technique on Case Scenario
1. What is going on?
The situation had demonstrated the ramifications of the enhanced capacities for shaping
the improvement of the issues with respect to PC framework and web capacities. The
Ransomware Cyber Attack have secured more than 45,000 assaults on PC gadgets more than 99
nations including Russia, UK, Ukraine, China, India, Egypt, and Italy. The malware assault was
started on fourteenth April through a dump and it is affirmed that the gathering of programmers
and digital lawbreakers behind the assault was Shadow Breakers. The Ransomware was common
malware that was inclined in encoding the client's information and it requested particular
measure of cash for unscrambling the information. The malignant programming in charge of
hurting the PC gadgets was named as WannaCryptor 2.0 or WannaCry. The product abuses the
Windows security flaws and structures the issues in building up the answer for the windows
security refresh. The assault of the vindictive programming had incorporated the dialect bolster
for expanding the danger level in the association.
2. What are the facts?
Ransomware Cyber attack was originated in the month of May, 2017
Ransomware Cyber attack have covered over 45,000 attacks on computer devices
over 99 countries including Russia, UK, Ukraine, China, India, Egypt, and Italy.
Shadow Breakers initiated the malware attack through a dump of system operations
and software
organization (Kharraz et al., 2015). The industries that rely on the usage of legacy systems are
comparatively most vulnerable for the Ransomware Cyber attack.
Applying Doing Ethics Technique on Case Scenario
1. What is going on?
The situation had demonstrated the ramifications of the enhanced capacities for shaping
the improvement of the issues with respect to PC framework and web capacities. The
Ransomware Cyber Attack have secured more than 45,000 assaults on PC gadgets more than 99
nations including Russia, UK, Ukraine, China, India, Egypt, and Italy. The malware assault was
started on fourteenth April through a dump and it is affirmed that the gathering of programmers
and digital lawbreakers behind the assault was Shadow Breakers. The Ransomware was common
malware that was inclined in encoding the client's information and it requested particular
measure of cash for unscrambling the information. The malignant programming in charge of
hurting the PC gadgets was named as WannaCryptor 2.0 or WannaCry. The product abuses the
Windows security flaws and structures the issues in building up the answer for the windows
security refresh. The assault of the vindictive programming had incorporated the dialect bolster
for expanding the danger level in the association.
2. What are the facts?
Ransomware Cyber attack was originated in the month of May, 2017
Ransomware Cyber attack have covered over 45,000 attacks on computer devices
over 99 countries including Russia, UK, Ukraine, China, India, Egypt, and Italy.
Shadow Breakers initiated the malware attack through a dump of system operations
and software

3APPLICATION OF ETHICAL THEORY
WannaCryptor 2.0 or shortly WannaCry was the malicious software responsible for
harming the computer devices
3. What are the issues?
The issues of the Ransomware Cyber attack on the various numbers of people have been
given below,
a) The Ransomware Cyber attack had caused the infiltration in the network of the
various big and national organizations.
b) The data and information of the various organizations would be encrypted and it
would make the data and information processing very hard of the users.
c) The hackers had demanded a sum of money for accessing the data and information as
the hackers had done it for their personal benefits by targeting all the organizations
using legacy system for their operations.
4. Who is affected?
The stakeholders that had been largely infected and harmed due to the Ransomware
Cyber attack of May, 2017 by the Shadow Breakers include various business and government
organization for depicting the use of computer systems. The organizations that had been using
the legacy system had to face the issues of developing the uncertain priority of the development
of the process. The shadow breakers consisting of various hackers and cyber criminals would
have to ensure that the operations would be involved for developing the appropriate solution to
the development model.
5. What are the ethical issues and implication?
WannaCryptor 2.0 or shortly WannaCry was the malicious software responsible for
harming the computer devices
3. What are the issues?
The issues of the Ransomware Cyber attack on the various numbers of people have been
given below,
a) The Ransomware Cyber attack had caused the infiltration in the network of the
various big and national organizations.
b) The data and information of the various organizations would be encrypted and it
would make the data and information processing very hard of the users.
c) The hackers had demanded a sum of money for accessing the data and information as
the hackers had done it for their personal benefits by targeting all the organizations
using legacy system for their operations.
4. Who is affected?
The stakeholders that had been largely infected and harmed due to the Ransomware
Cyber attack of May, 2017 by the Shadow Breakers include various business and government
organization for depicting the use of computer systems. The organizations that had been using
the legacy system had to face the issues of developing the uncertain priority of the development
of the process. The shadow breakers consisting of various hackers and cyber criminals would
have to ensure that the operations would be involved for developing the appropriate solution to
the development model.
5. What are the ethical issues and implication?
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4APPLICATION OF ETHICAL THEORY
The ethical issues of the scenario of Ransomware Cyber attack are the illegal deployment
of the effective and improved operations. The extortion of the money for decrypting the data and
information of the users is also unethical behaviour.
Chen and Schonger (2017) have stated that Deontology theory could be developed for
evaluating the moral values of the operations and it would highlight the development of the
correct actions based on the theory of ethics and knowledge. The Utilitarianism theory is
developed for implying the righteous decision of any event is based on the happiness and
approval of the majority number of people. The theories would be critically evaluated for
ensuring the flow of the operations and development of the proposition.
6. What can be done about it?
The implementation of the advanced security measure would be formed for analysing the
development of the profound implication of the operations. The use of security features,
encryption, authentication, and practice of ethically righteous actions would be developed for
integrating the correct solution to the operations of the system. The organizations that had been
using the legacy system had to face the issues of developing the uncertain priority of the
development of the process. Hence, they need to protect their system from external infiltration
and exploitation.
7. What options are there?
The improved services would be implied for dealing with the issue of the Ransomware
Cyber attack and the unethical behaviour of the cyber criminals in harming the overall
development of the functions. The profound use of the ethically right practice would be formed
by implying the safety and management of the operations for ensuring the decisive analysis of
The ethical issues of the scenario of Ransomware Cyber attack are the illegal deployment
of the effective and improved operations. The extortion of the money for decrypting the data and
information of the users is also unethical behaviour.
Chen and Schonger (2017) have stated that Deontology theory could be developed for
evaluating the moral values of the operations and it would highlight the development of the
correct actions based on the theory of ethics and knowledge. The Utilitarianism theory is
developed for implying the righteous decision of any event is based on the happiness and
approval of the majority number of people. The theories would be critically evaluated for
ensuring the flow of the operations and development of the proposition.
6. What can be done about it?
The implementation of the advanced security measure would be formed for analysing the
development of the profound implication of the operations. The use of security features,
encryption, authentication, and practice of ethically righteous actions would be developed for
integrating the correct solution to the operations of the system. The organizations that had been
using the legacy system had to face the issues of developing the uncertain priority of the
development of the process. Hence, they need to protect their system from external infiltration
and exploitation.
7. What options are there?
The improved services would be implied for dealing with the issue of the Ransomware
Cyber attack and the unethical behaviour of the cyber criminals in harming the overall
development of the functions. The profound use of the ethically right practice would be formed
by implying the safety and management of the operations for ensuring the decisive analysis of

5APPLICATION OF ETHICAL THEORY
the system development. The Ransomware was common malware that was inclined in encoding
the client's information and it requested particular measure of cash for unscrambling the
information. Hence, use of technically advanced malware detection and prevention would help in
analysis of the system for malware attacks and integrate the correct solutions for the system
development.
8. Which option is best and why?
The implementation and use of the advanced security measure would be the best action
for dealing with such kind of IT network issues. The use of security features like encryption,
authentication, and password protection would be developed for integrating the correct solution
to the operations of the system. The security features are helpful for forming the advanced
network security and it would cohesively form the development of the systematic operations.
The analysis of the system development would help in forwarding the collaboration of the
implied development and operations.
the system development. The Ransomware was common malware that was inclined in encoding
the client's information and it requested particular measure of cash for unscrambling the
information. Hence, use of technically advanced malware detection and prevention would help in
analysis of the system for malware attacks and integrate the correct solutions for the system
development.
8. Which option is best and why?
The implementation and use of the advanced security measure would be the best action
for dealing with such kind of IT network issues. The use of security features like encryption,
authentication, and password protection would be developed for integrating the correct solution
to the operations of the system. The security features are helpful for forming the advanced
network security and it would cohesively form the development of the systematic operations.
The analysis of the system development would help in forwarding the collaboration of the
implied development and operations.

6APPLICATION OF ETHICAL THEORY
References
Arntzenius, F. (2014). Utilitarianism, decision theory and eternity. Philosophical
Perspectives, 28(1), 31-58.
Chen, D. L., & Schonger, M. (2017). Social preferences or sacred values? theory and evidence of
deontological motivations.
Fried, C. (2015). Contract as promise: A theory of contractual obligation. Oxford University
Press, USA.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference
on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24).
Springer, Cham.
Lazar, S. (2017). Deontological Decision Theory and Agent-Centered Options. Ethics, 127(3),
579-609.
McGoogan, C., Titcomb, J., & Charlotte Krol. (2017). What is WannaCry and how does
ransomware work?. The Telegraph. Retrieved 19 September 2017, from
http://www.telegraph.co.uk/technology/0/ransomware-does-work/
Niebuhr, R. (2013). Moral man and immoral society: A study in ethics and politics. Westminster
John Knox Press.
References
Arntzenius, F. (2014). Utilitarianism, decision theory and eternity. Philosophical
Perspectives, 28(1), 31-58.
Chen, D. L., & Schonger, M. (2017). Social preferences or sacred values? theory and evidence of
deontological motivations.
Fried, C. (2015). Contract as promise: A theory of contractual obligation. Oxford University
Press, USA.
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference
on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24).
Springer, Cham.
Lazar, S. (2017). Deontological Decision Theory and Agent-Centered Options. Ethics, 127(3),
579-609.
McGoogan, C., Titcomb, J., & Charlotte Krol. (2017). What is WannaCry and how does
ransomware work?. The Telegraph. Retrieved 19 September 2017, from
http://www.telegraph.co.uk/technology/0/ransomware-does-work/
Niebuhr, R. (2013). Moral man and immoral society: A study in ethics and politics. Westminster
John Knox Press.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.