• Home
  • Blog
  • ITM 505 JNU Ethics in Information Technology Discussion

ITM 505 JNU Ethics in Information Technology Discussion

0 comments

Please answer the following two Parts 1 & 2 separately WORD document 

NOTE ::: Materials and instructions attached below please look carefully and do the task 

Session 2 Assignment Part 1 – Discussion Forum

Assignment Content

Discussion Topic

Answer the following questions:

Discussion Q1:

A successful DDoS attack requires the downloading of software that turns unprotected computers into zombies under the control of the malicious hacker. Should the owners of the zombie computers be tracked down, identified, and fined or otherwise punished as a means of encouraging people to better safeguard their computers? Why or why not?.

  • Assignment Format: Blackboard Discussion Board Thread
  • Submission Format: Paragraph format
  • Length: 300 words 
  • Citations Required: NA
    • Assignment Format: Answer Questions
    • Submission Format: MS Word
    • Length: Minimum 300 words per question
    • Citations Required: Only if citing a source

——————————————————————————————————————————————–

Session 2 Assignment Part 2 ::   

Assignment Content

Sony’s Response to North Korea’s Cyberattack

Answer the three Critical Thinking Questions for the Sony Case Study

These are the questions to be answered

Critical Thinking Questions 

1. Do you think that Sony’s response to the attack was appropriate? Why or why not? 

2. What might Sony and the U.S. government have done differently to discourage future such attacks on other U.S. organizations? 

3. Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}