Recently a hacker was able to access the wireless carrier T-Mobile’s network and read the private emails and personal files of hundreds of customers. The government revealed that emails and other sensitive communications from the Secret Service agent investigating the incident were among those obtained by the hacker. The agent, Peter Caviccha, was apparently using his own personal handheld computer to view emails while travelling. His supervisors were apparently aware of this, since they frequently directed emails to his personal email address while he was travelling. The agency had a policy in place that disallowed agents from storing work-related files on personal computers. The hacker was able to view the names and Social Security numbers of 400 T-Mobile customers, and they were notified in writing regarding the security breach. T-Mobile has more than 63 million customers in the United States.

INSTRUCTIONS
Read the Case Study at the end of Chapter 10 and answer the following questions.
What role did the culture displayed by Caviccha and his supervisors play in the case?
Were additional charges warranted against the agent if agency rules were violated?
Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?
What additional security measures are required to prevent eavesdropping on wireless communications?

Recently a hacker was able to access the wireless carrier T-Mobile’s network and read the private emails and personal files of hundreds of customers. The government revealed that emails and other sensitive communications from the Secret Service agent investigating the incident were among those obtained by the hacker. The agent, Peter Caviccha, was apparently using his own personal handheld computer to view emails while travelling. His supervisors were apparently aware of this, since they frequently directed emails to his personal email address while he was travelling. The agency had a policy in place that disallowed agents from storing work-related files on personal computers. The hacker was able to view the names and Social Security numbers of 400 T-Mobile customers, and they were notified in writing regarding the security breach. T-Mobile has more than 63 million customers in the United States. The network attack occurred over a seven-month period and was discovered during a broad investigation by the Secret Service while studying several underground hacker organizations. Nicolas Lee Jacobson, a computer engineer from Santa Anna, California, was charged in the cyberattack after investigators traced his online activities to a hotel where he was staying. He was later arrested and then been released on a $25,000 bond.

1. What role did the culture displayed by Caviccha and his supervisors play in the case?
2. Were additional charges warranted against the agent if agency rules were violated?
3. Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?
4. What additional security measures are required to prevent eavesdropping on wireless communications? (Dhillon, 2017-11-17, p. 271)

Dhillon, G. (2017-11-17). Information Security: Text and Cases, 2nd Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781943153244
Messages

Needs help with your Homework? ORDER NOW

How Our Website Works

1. FILL IN OUR SIMPLE ORDER FORM

It has never been easier to place your order. Fill in the initial requirements in the small order form located on the home page and press “continue” button to proceed to the main order form or press “order” button in the header menu. Starting from there let our system intuitively guide you through all steps of ordering process.

2. PROCEED WITH THE PAYMENT

All your payments are processed securely through PayPal. This enables us to guarantee a 100% security of your funds and process payments swiftly.

3. WRITER ASSIGNMENT

Next, we match up your order details with the most qualified freelance writer in your field.

4. WRITING PROCESS

Once we have found the most suitable writer for your assignment, they start working on a masterpiece just for you!

5. DELIVERY

Once finished, your final paper will be available for download through your personal dashboard. You will also receive an email notification with a copy of your paper attached to it. Sometimes, the writer may leave a note for you about the order in case there is any additional information that they need to give you.

How Our Website Works

1. FILL IN OUR SIMPLE ORDER FORM

It has never been easier to place your order. Fill in the initial requirements in the small order form located on the home page and press “continue” button to proceed to the main order form or press “order” button in the header menu. Starting from there let our system intuitively guide you through all steps of ordering process.

2. PROCEED WITH THE PAYMENT

All your payments are processed securely through PayPal. This enables us to guarantee a 100% security of your funds and process payments swiftly.

3. WRITER ASSIGNMENT

Next, we match up your order details with the most qualified freelance writer in your field.

4. WRITING PROCESS

Once we have found the most suitable writer for your assignment, they start working on a masterpiece just for you!

5. DELIVERY

Once finished, your final paper will be available for download through your personal dashboard. You will also receive an email notification with a copy of your paper attached to it. Sometimes, the writer may leave a note for you about the order in case there is any additional information that they need to give you.

Leave a Reply

Your email address will not be published.