Should isps be required to notify a customer

Assignment Help Management Information Sys
Reference no: EM131302513

Before doing this assignment, be sure you are familiar with the General Instructions for Discussion Assignments found in the Course Information Module.

For this discussion we are staying with the theme of negative externalities in cybersecurity. But this time, it's personal!

We haven't talked much at all about cybersecurity in the home this quarter. From a perspective of cyberwar or cyberterrorism, most of what you worry about at home is not a serious concern. Ransomware or spyware or a file deletion virus on your personal computer isn't a national security issue.

But there is one way in which the cybersecurity of your personal computer does potentially become a national security issue - if attackers are using your computer as part of an attack on someone else, for instance, on critical infrastructure. This happens in three ways:

The attacker may use your computer as an interim step in an attack, for the purpose of making attribution difficult.

The attacker may use your computer as a C2 server to direct an attack

Your computer may be part of a botnet.

The first two of these are not actually a significant issue for a home computer, because attackers want to use computers that are connected to the internet 24 hours a day, and home computers often are not. They are much more likely to use compromised web servers than personal computers for those purposes.

But for botnets, they just want to control as many computers as possible, whether those computers are online 24/7 or not.

If you haven't noticed already, this is another perfect example of a negative externality. You pay very little price if your computer is part of a botnet. It may slow your internet connection occasionally, but otherwise you won't even know anything is happening. But the victims of the attack will. Your lack of cybersecurity is a negative externality - the cost of your failure to protect your computer is paid by someone else.

Now you probably will never know that your computer is part of a botnet. And most computers users don't have a clue what a botnet even is.

But your ISP does know, or at least, they can usually easily identify when a customer's computer is part of a botnet. If ISPs did this, the power of botnets could be dramatically diminished.

So here's the question:

Should ISPs be required to notify a customer if their computer is part of a botnet? And if they do, should they disconnect the customer from the internet until the customer can have their computer "cleaned"?

By the way, you may think that your ISP doesn't have the right to monitor your internet traffic or disconnect your service, but they almost certainly do. It's in the contract that you, like the rest of us, agreed to without reading.

As always, one initial post is due on the date shown in Canvas. The following day, instructions for responses will be posted.

Reference no: EM131302513

Questions Cloud

Disclosures and legal procedures : The purpose of this assignment is to compare legal principles, disclosures and legal procedures. Accounting of disclosures specific to the ARRA and HITECH regulations are also introduced.
What would be the present value of the same annuity : What is the present value of an annuity that pays $15,000 at the end of each year for the next ten years if the discount rate is 7.2%? What would be the present value of the same annuity if the payments were made on the first day of each year?
What are the expected benefits to those countries : How much debt was forgiven during that year in each of the countries involved? What are the expected benefits to those countries?
Each of the housing development projects : How many other real estate firms will also be competing for sales in each of the housing development projects.-
Should isps be required to notify a customer : Should ISPs be required to notify a customer if their computer is part of a botnet? And if they do, should they disconnect the customer from the internet until the customer can have their computer "cleaned"?
Does the paper fully address all aspects of the assignment : Does the paper fully address all aspects of the assignment? Is the assignment addressed accurately and precisely using sound logic? Does the paper meet minimum length requirements?
Determine the state-transition matrix : Consider a channel constrained to have at least one zero between every one, and runs of zero no longer than 3.
Explain discrimination complaint or civil litigation process : Prepare a 750-word paper in which you analyze and explain the discrimination complaint and civil litigation processes as it would potentially apply to John and his employer.
Compute the least-squares solution : One solution to Ax = b 1s x = [l. 2. 3,4IT Compute the least-squares solution using the SVD, and compare Why was the solution chosen?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd