Preview

What Would You Do in a Blackmail Situation?

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Would You Do in a Blackmail Situation?
GAYOLA, Brent Julian S.
BSCS-CS I-1

What Would You Do No.4
You are the CFO of a sporting goods manufacturer and distributor. Your firm has annual sales exceeding $500 million, with roughly 25 percent of your sales coming from online purchases. Today your firm’s Web site was not operational for about an hour. The IT group informed you that the site was the target of a distributed denial-of-service attack. You are shocked by an anonymous call later in the day in which a man tells you that your site will be attacked unmercifully unless you pay him $250,000 to stop the attacks. What do you say to the blackmailer?

In some situations, the blackmailer may just be a cheap bluff. This is where honest self-evaluation comes into play. Is there really a ground for the blackmail? Is the blackmail really damaging; and can it hold water? These are some of the questions you should ask yourself and answer truthfully. Of the purpose of this article, we will assume that there is ground for blackmail. This singular step could end the blackmailer’s game. The leverage the blackmailer has over you is the information that he has on you; which has the potential of having some damaging effects on your person or those close to you. When you disclose this information yourself, you not only take away the blackmailers leverage but allow the story or blackmail claims to flow in your own tide.

Contact the law. This is a way of getting the blackmailer to pay for his / her acts. When you contact the law enforcement agent they will work hand in hand with you to catch the blackmailer in the act, so they can have evidence to prosecute him / her. Giving in to the blackmailer. Well, this is another option but the last I would want you to consider taking. This is usually taken by those who don’t want to involve the police or a lawyer. They want things to remain between them and the blackmailer. In this situation, you might want to believe that the blackmailer will not come again and again

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    BugUSA, Inc. - Case ScenarioThis scenario presents the case of BugUSA, Inc.; as a team, we endeavor to address the legal ramifications of each company's activities. BugUSA, Inc. has legal rights to intellectual property protection, and this paper explores the options available within that realm. WIRETAP, Inc. will face civil liability claims if caught in its underhanded measures, and possibly a civil RICO suit; BugUSA's security guard Walter, however, has also created a case against its own interests. When another company owns the rights to a web domain that suits BugUSA's needs, it faces the challenge of how to acquire the domain with as little hassle and as much protection as possible. A robbed vendor may present new tort liabilities for BugUSA, and we explore potential defenses. Finally, an injured police officer may have further claims against BugUSA in light of the company's manufacturing decisions.…

    • 2109 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    One of the effective ways to minimize the poor communication among each other consists of the capability of self-disclosure. The self-disclosure theory is a tenacity revelation of particular info to other individual (Howard, 2011). Disclosure might consist of allocation both high-risk and low-risk info as well as individual involvements thoughts and assertiveness, approaches and principles, historical realities and life stories, and even forthcoming expectations, visions, goals, and aims. In sharing data about yourself, you make decisions about what to share and using whom to share it.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Plutonium, an Internet start-up company founded in 1988, was in the midst of a massive project to improve integration and internal data quality of its disparate information systems. At the heart of this project was an endeavor to implement a complex billing system called Gateway. Gateway, working with Visa, would automate billing for Plutonium’s large customer base; however, once implemented, Gateway had thousands of corrupt accounts that needed to be resolved in order to improve the system’s data integrity. Jonathan, Plutonium’s operations manager, was tasked to fix these corrupt accounts. After six to nine months, Jonathan noticed that his top and most trusted performer on the task, Chris, was acting suspiciously and had recently acquired several high dollar electronic items. Unbeknownst to Jonathan, Chris was committing employee fraud right under his nose.…

    • 1449 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Throughout this semester of Paideia, I have read several books in which one or more of the characters know the truth about a certain matter and the others do not. The characters that know the truth then have to decide what to do with the truth. Do they keep it to themselves or share it with others? When both options have advantages and disadvantages, the person who has to make the choice is in a tough spot. This scenario has happened in two separate readings this semester: one in The Return of Martin Guerre and the other in The Allegory of the Cave. Using those two texts, I will be able to provide evidence that knowing the truth sometimes involves personal consequences or obligations.…

    • 1539 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The relationships we build when we share information makes a connection with the speaker and the listener. Theses relationships often can turn personal rather than professional. There is an art to sharing and being aware of what we share and how we say it. In disclosing information I learned that is also has to be done with interest in the others feelings and an interest in what the others will disclose(Stewart,2012)…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    H. Explains the process that people use to manage the relationship between concealing and revealing private information…

    • 898 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Best Essays

    2. R, Riva. (2011). What to Do If Your Business Gets Hacked. Available: http://businessonmain.msn.com/browseresources/articles/onlinebusiness.aspx?cp-documentid=31726409#fbid=vputcsjXLR_?comments. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    What would you recommend to the CEO given your analysis of his approach thus far…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Police Brutality

    • 2788 Words
    • 12 Pages

    obtain a confession). This is a very effective way to get a confession out of…

    • 2788 Words
    • 12 Pages
    Powerful Essays

Related Topics