Preview

Case Study: When Hackers Turn to Blackmail

Better Essays
Open Document
Open Document
1690 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study: When Hackers Turn to Blackmail
Case Study: When Hackers Turn to Blackmail
1. The introduction of Sunnylake hospital case
The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.

Once Sunnylake Hospital was a backwater community care centre, while Paul, the CEO of Sunnylake had come to the hospital five years earlier, the situation of Sunnylake Hospital changed. Because he introduced cutting-edge technology to the small hospital. Paul was convinced that Sunnylake could grow only if it shook off outdated habits and procedures, and that switching from paper records to electronic medical records (EMRs) would improve the quality of care for the hospital’s patients. After a careful search Paul had hired an earnest young man named Jacob Dale to be Sunnylake’s director of IT, and the two had worked to execute his vision.The success of the EMR initiative had transformed the hospital to a a role model for small hospitals everywhere. One day Paul received an illiterate extortion e-mail from an unknown sender, but he did not realize the implied threat in the e-mail. He had great faith in Jacob and the IT system. While after Paul received another e-mail from the same sender, the dangers came out. Sunnylake had no way of delivering records to doctors. The hospital was about to come to a standstill. Meanwhile the third e-mail arrived, Paul and Jacob knew that this is some kind of system-wide ransom ware, Now Paul had to face to a difficult choice, to give $100,000 or not. This is not just a question of money anymore. They have human lives at stake. Jacob said to Paul“ if we

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Pervasive influence of information technology with penetration of computers and communication in all aspect of the workplace, it is important for a organization to keep up with the advancement of technology in the criminal justice and security agency. Technology is playing a major role in how criminals for committing crimes, which is why there has been a increase in cyber crimes because a criminal…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,…

    • 422 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Child Rearing (19th Century)

    • 6310 Words
    • 26 Pages

    Homework based on the seminar: Domesticity and Protest: American Women Writers in the Nineteenth Century…

    • 6310 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In this article the author explains patients’ records at healthcare facilities may now be stored using electronic medical records (EMR) instead of the paper charts that have been used in the past. EMRs have several disadvantages and advantages. One of the biggest disadvantages to EMRs is the high initial start-up cost. The healthcare facilities have to buy the equipment to begin the process. They also have to hire people to convert their current files from paper copies to electronic copies. This is a very time-consuming process, which is another disadvantage. Transferring all the medical records takes a good deal of time, and if a doctor has need of a particular file and it hasn’t yet been transferred, the paper copy has to be found. This also increases the possibility of errors (Ellis-Christensen, 2003-2009).Unfortunately, not all EMR systems work the same. This can be a challenge when putting in a system. Healthcare providers may have different systems from facility to facility, and those systems might not be compatible. If the systems are not compatible, it will likely be difficult to get information about patients instantly (Ellis-Christensen, 2003-2009). Another challenge that comes up when starting to use an EMR system is the threat of hackers, such as nurses, Doctors and so on printing patients’ records sharing them with other people. When information is stored in a database, virtually anyone can gain access to them. This has happened countless times on the internet in many well-publicized cases, so the possibility that personal medical records could be hacked is concerning to many patients (Ellis-Christensen, 2003-2009).…

    • 517 Words
    • 3 Pages
    Satisfactory Essays