In order to complete Assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.
Please read the Time Bomb Case (Box 3.6) found on page 64 in Chapter 3.
Which theory do you believe applies to this case? Please explain the reasons why the theory you picked applies.
BOX 3.6 Time Bomb Attacks by an Insider
William Carl Shea, aged 39, was hired around August 2001 as a programmer and manager for Bay Area Credit Services, Inc., in San Jose, California. Shea’s position gave him administrative access to and familiarity with the company’s computer systems, including the database server. He was notified of poor job performance in 2002 and was given an improvement plan in 2003. He was fired on January 17, 2003, when he failed to show up at work. Around this period, a malicious code “time bomb” was placed on the company network that was set to delete and change data at the end of the month. This malicious software caused financial records to be altered and removed and disrupted the computer networks within the company, affecting more than 50,000 debtor accounts. Shea was sentenced to 12 months and 1 day in prison, 6 months of home confinement with electronic monitoring, and 3 years of supervised release for his jury conviction.
Which theory do you think applies best to this case?
Source: www.justice.gov/criminal/cybercrime/
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more