...

/

Cyber Ethics

Cyber Ethics

Understand why computer security is a key consideration in system design and implementation.

We'll cover the following...

Given the scenario below, select the approach that you would choose from the options provided.

Press + to interact

Scenario

You’re a skilled and dedicated software engineer at a renowned bank, responsible for managing critical systems and ensuring their security. With hacking as your passion, you revel in finding vulnerabilities and uncovering hidden flaws. Though you’re working, you feel you aren’t really heard in the company. As time goes by, you grow discontent with the company’s policies and treatment of its employees. You believe you are more talented than you’re given credit for. Besides, you can do more on your own. The resentment builds up, and eventually, you decide to leave the company.

Months later, you come across a vulnerability in the systems of the company you previously worked for. This vulnerability could potentially expose sensitive customer data and financial information.

This could be your chance to display your potential by exploiting this vulnerability to breach the company’s systems. What do you do?


Case study

Below is a case study that demonstrates an actual incident of cybercrime.

Capital One

Capital One“Information on the Capital One cyber incident,” Capital One, last modified April 22, 2022, https://www.capitalone.com/digital/facts2019/. , one of the largest credit card issuers in the United States, was using Amazon Web Services (AWS) for its cloud infrastructure to store data and applications on AWS servers.

Press + to interact

In 2019, Capital One announced that the credit card application and customer data of about 100 million individuals in the United States and 6 ...