Should isps be required to notify a customer

Assignment Help Management Information Sys
Reference no: EM131302513

Before doing this assignment, be sure you are familiar with the General Instructions for Discussion Assignments found in the Course Information Module.

For this discussion we are staying with the theme of negative externalities in cybersecurity. But this time, it's personal!

We haven't talked much at all about cybersecurity in the home this quarter. From a perspective of cyberwar or cyberterrorism, most of what you worry about at home is not a serious concern. Ransomware or spyware or a file deletion virus on your personal computer isn't a national security issue.

But there is one way in which the cybersecurity of your personal computer does potentially become a national security issue - if attackers are using your computer as part of an attack on someone else, for instance, on critical infrastructure. This happens in three ways:

The attacker may use your computer as an interim step in an attack, for the purpose of making attribution difficult.

The attacker may use your computer as a C2 server to direct an attack

Your computer may be part of a botnet.

The first two of these are not actually a significant issue for a home computer, because attackers want to use computers that are connected to the internet 24 hours a day, and home computers often are not. They are much more likely to use compromised web servers than personal computers for those purposes.

But for botnets, they just want to control as many computers as possible, whether those computers are online 24/7 or not.

If you haven't noticed already, this is another perfect example of a negative externality. You pay very little price if your computer is part of a botnet. It may slow your internet connection occasionally, but otherwise you won't even know anything is happening. But the victims of the attack will. Your lack of cybersecurity is a negative externality - the cost of your failure to protect your computer is paid by someone else.

Now you probably will never know that your computer is part of a botnet. And most computers users don't have a clue what a botnet even is.

But your ISP does know, or at least, they can usually easily identify when a customer's computer is part of a botnet. If ISPs did this, the power of botnets could be dramatically diminished.

So here's the question:

Should ISPs be required to notify a customer if their computer is part of a botnet? And if they do, should they disconnect the customer from the internet until the customer can have their computer "cleaned"?

By the way, you may think that your ISP doesn't have the right to monitor your internet traffic or disconnect your service, but they almost certainly do. It's in the contract that you, like the rest of us, agreed to without reading.

As always, one initial post is due on the date shown in Canvas. The following day, instructions for responses will be posted.

Reference no: EM131302513

Questions Cloud

Disclosures and legal procedures : The purpose of this assignment is to compare legal principles, disclosures and legal procedures. Accounting of disclosures specific to the ARRA and HITECH regulations are also introduced.
What would be the present value of the same annuity : What is the present value of an annuity that pays $15,000 at the end of each year for the next ten years if the discount rate is 7.2%? What would be the present value of the same annuity if the payments were made on the first day of each year?
What are the expected benefits to those countries : How much debt was forgiven during that year in each of the countries involved? What are the expected benefits to those countries?
Each of the housing development projects : How many other real estate firms will also be competing for sales in each of the housing development projects.-
Should isps be required to notify a customer : Should ISPs be required to notify a customer if their computer is part of a botnet? And if they do, should they disconnect the customer from the internet until the customer can have their computer "cleaned"?
Does the paper fully address all aspects of the assignment : Does the paper fully address all aspects of the assignment? Is the assignment addressed accurately and precisely using sound logic? Does the paper meet minimum length requirements?
Determine the state-transition matrix : Consider a channel constrained to have at least one zero between every one, and runs of zero no longer than 3.
Explain discrimination complaint or civil litigation process : Prepare a 750-word paper in which you analyze and explain the discrimination complaint and civil litigation processes as it would potentially apply to John and his employer.
Compute the least-squares solution : One solution to Ax = b 1s x = [l. 2. 3,4IT Compute the least-squares solution using the SVD, and compare Why was the solution chosen?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is the purpose of the business impact analysis

What is the purpose of the business impact analysis (BIA)? What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)?

  Describe functional and non-functional requirements

Practice elicitation techniques, define functional and non-functional requirements, write use case scenarios, explore user interface alternatives, learn how to analyze and model the requirements, and develop a requirements traceability matrix that..

  Discuss the financial statement presentation and disclosures

Discuss the financial statement presentation and disclosures associated with consolidations related to Off balance sheet transactions, Variable-Interest Entities, and Noncontrolling Interest.

  Writing a business plancan you help me get started with

writing a business plancan you help me get started with this project?imagine writing a business plan for a music

  What are the benefits of using facial recognition technology

What are some of the benefits of using facial recognition technology? Describe some current and future applications of this technology? How does facial recognition technology threaten the protection of individual privacy? Give several examples?

  Interactions of global organizationsglobal organizations

interactions of global organizationsglobal organizations interact with many countries and cultures. how might one

  Ethical conduct of the business spectrum

How will each respective law attribute to the ethical conduct of the business spectrum? Subsequently, did you find a law that condones ethical behavior? Please explain

  Network switching upgrade for star hub amp spoke

network switching upgrade for star hub amp spoke topologyyou are the it manager of an elementary school. the school is

  Write a memo to the ceo of the company

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..

  Explain in detail why you believe it will be a major issue

Predict what the major issue discussed in this course will be 20 years from now. Explain in detail why you believe it will be a major issue.

  What is disaster recovery planning

What prompted the cause? What steps the organization could have taken to avoid disaster and data loss. What you feel are the bright sides of having Disaster recovery planning and data backup?

  Differences between java and other languageswhat are the

differences between java and other languageswhat are the major differences between java programming language and any

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd