Monday, May 25, 2020
Pre Internet Rules Or New Rules - Free Essay Example
Sample details Pages: 12 Words: 3494 Downloads: 3 Date added: 2017/06/26 Category Internet Essay Type Narrative essay Did you like this example? In 1996 at a conference on cyber-law, Judge Frank Easterbrook of the US Court of Appeals gave a presentation on Property in Cyberspace in which he argued that cyber-law as a strand of law did not exist, for the same reasons that there was not a law of the horse. He argued that Teaching 100 per cent of the cases on people kicked by horses will not convey the law of torts very well He believed that existing law would be able to convey all the salient points of cyber-law, and therefore it would be better if it was not taught, or did not exist. I am going to use his Horse Law as the basis for this essay and outline the way that pre-internet laws work in cyberspace (if indeed they do); identifying where real-world analogies are brought into the law by the courts and seeing where the law now is terms of cyberspace regulation. I will focus mainly on the criminal law, as civil regulation online has grown up mostly around business practices, and criminal law has and nee ds to be addressed by the Government. Are laws technologically-neutral? Should they be? Lawrence Lessig wrote a replyà [3]à to Easterbrook, which argued that We see something when we think about the regulation of cyberspace that other areas would not show us. Lessig did not defend horse law, but defended cyber-law from being ejusdem generis with it. Lessig believed that The anonymity and multi-jurisdictionality of cyberspace makes control by government in cyberspace impossible, and that made cyber-law unique and worthy of study. Lessig concludes the essay by predicting the values of real-space sovereigns will at first lose out during the growth of the Internet, and that part of cyber-laws job is to monitor the interactions and inevitable growth and change of these sovereigns in cyberspace. It seems that if you build it, they will come. But academic debate on cyber-law as a subject did not end there. Sommerà [4]à argues, like Easterbrook, that cyberspace is not a new pl ace for new laws but a new place for old laws. He believes that it will take a while for new practices to develop that need new lawsà [5]à . He draws analogy with wire transfers referencing Article 4A of the Uniform Commercial Code, which codified over a century of wire transfer law, yet was built on no prior statute. So will cyber statutes or laws merely codify existing practices into a new arena? Or will they be new and different? In 1984, two hackers called Stephen Gold and Robert Schifreen gained access to BTs Prestel network and started series of (nearly) harmless pranks within the networkà [6]à . They were eventually caught and charged with an offence contrary to s.1 of the Forgery and Counterfeiting Act 1981, which states A person is guilty of forgery if he makes a false instrument, with the intention that he or another shall use it to induce somebody to accept it as genuine, and by reason of so accepting it to do or not to do some act to his own or any other perso ns prejudice. This seemed like the best charge that existed under the common law at the time, and on conviction the defendants appealed. Both the Court of Appealà [7]à and the House of Lordsà [8]à held that the instrument to which the offence referred to could not be forced to apply to electronic impulses, under s.8(1)(d) of the Act. Essentially, there was not an offence that existed that seemed to cater for the actions they pursued. The case of Gold and the increasing computerisation of important functions in numerous industries led to the Law Commission Report, Computer Misuseà [9]à where a new offence of unauthorised access was advocated. This eventually became law in the form of the Computer Misuse Act 1990 (CMA). The CMA was written in a deliberately ambiguous style. Murray says it is well designed, mainly due to the fact that it avoids colloquial terms,à [10]à which would be hard to define by anyone familiar with them, let alone a court. The CMA was desig ned to catch a broad variety of activity and define it as criminal. But is this a good thing? It needed a lot of definition when it came to its application. Before Croppà [11]à and the subsequent clarificationà [12]à it was not even clear if two separate computers are required for an offence. It was this clarification that led to spate of employee-access cases that defined what the majority of the CMA offences would be. It took several years for a case on the CMA to land at an appeal court, in the form of DPP v Bignell.à [13]à Like many that had preceded it,à [14]à Bignell involved access to the Police National Computer (PNC). But the defence raised by the defendants was interesting, and according to a literal interpretation of the CMA correct. The offence of which they were charged was s.1 of the CMA, which criminalised access but not unauthorised use of authorised access. This was held by Astill J to be the correct. The CMA and its ambiguous wording had failed in that it hadnt criminalised some extra-curricular behaviour. The defendant was authorised to access the PNC but did so on that occasion for an unauthorised purpose. It is worthy to note that Astill J thought that a charge under s.5 of the Data Protection Act 1984 (DPA) would have been more appropriate.à [15]à This seems to be why he was reluctant to make the offence fit the crime, similar to the approach in Gold. We have had two examples so far of cases failing against defendants because they were charged with offences that were either not intended to apply to computer misuse or lacked enough definition to be clear. One technologically-neutral and the other so generic that it could almost be construed as such. Is this a reluctance of the courts to evolve cyber-law themselves or the Crown trying to make do without proper cyber-law? Two years after Bignell, the House of Lords revisited the same point of law regarding s.1 of the CMA and overruled ità [16]à . Accessing a uthorised data for unauthorised purposes was found to be within the remit of s.1. But was this stretching the law too far? It seems to broaden the scope of the CMA to include the specific offences in s.5 of the DPA 1994. Is it just to have two offences for the same action? Despite the final success for the Crown with regards to employee access, the CMA was clearly lacking in one major, developing area: Denial of Service or Distributed Denial of Service (DoS or DDoS) attacks. Murray stated that those engaged in DDoS attacks would probably only be liable for the installation of the Trojan software not the attack itself Legally this meant the UK was failing in its duties under the Council of Europe Convention on Cybercrimeà [17]à .à [18]à This became one of the reasons behind the amendments of the CMA in s35-38 of the Police and Justice Act 2006. The amended CMA included provisions designed to catch DDoS attacks like s.3(2)(a) (guilty of an offence if he intends) to impair t he operation of any computer. But were these modifications necessary? It seems that one of the main victims of DDoS attacks were online gambling websitesà [19]à but beyond this industry, were there people in need of protection? DDoS attacks are hard to relate to any real-space offence or law, with would seem to weaken Easterbrooks argument. It is hard to reconcile any of these actions and crimes with a real-space offence. There have been many attempts by the judiciary to do so, but why? Is it to explain the offence and reasoning to those reading the judgement? To help make sense of the actions to themselves? Why do these unnecessary allegories exist? An act of computer misuse does not only become a crime when it can be compared to a real-space offence. If this were the case, then to apply the Horse Law theory, any cases involving horses would have to be compared with humans, or perhaps objects. In DPP v Lennonà [20]à an ex-employee of a company was charged with an o ffence under s.3 of the original CMA. Lennon had used a mail-bombing program to send 5,000,000 emails to the company server, causing it to crash. This is a form of DoS attack, and the amended section s.3 was written to deal exactly with this type of action. In defence, Lennon submitted that he had no case to answer as the sending of the emails was not unauthorised, as he the server was designed to receive emails, and that was all he had done the quantity was immaterial. This defence succeeded at first instance, and the Crown appealed to the High Court, arguing that there was a difference between spam and bona fide communication, and that difference was consent.à [21] Jack J upheld the appeal, and reasoned by comparing the sending of an email to that of a person walking up a garden path of a private house. There is an implied consent that a person can walk up a path if going to deliver a letter, or wants to speak to the person inside, but the homeowner does not consent to a bur glar on the path or the letterbox being stuffed with rubbish. Jack J likened this last point to the result of Lennons actions. A bona fide email would have been accepted, but not the spam. This raises two points, however. Would just sending one hoax email have been a crime? One email would have been less likely to be considered an offence under the CMA. So the correct analogy would surely be that of posting 5,000,000 letters in separate trips up a garden path. Secondly why was the analogy needed? It was likely needed to justify stretching s.3 to fit a DoS attack. This and the above cases like Gold and Bignell involving statute stretched to breaking point illustrate that the CMA, as vague as it was, desperately needed the update that the PCJA gave it. It is also worth asking if using a mail-bombing program from one machine would these days cause a slow-down of a company server. The increase in broadband speedsà [22]à could well mean that DDoS now has to be used rather than a DoS attack. The upload speed of connections still lags significantly behind download speeds and Lennons emails would be likely to have little effect on a modern server. So this case could be argued to be out of date both in its point of law (as the amended s.3 now caters for DoS attacks) and it now would be technologically unlikely that a single machine can slow down a server. So now where does Horse Law stand? In Lennon, a real-world analogy had to be drawn to make the offence fit the actions. This would support Easterbrooks theory, in that the offence had to have a real world basis to work. But the court should not have had to resort to that as the amendments were already on the way. The relevant addition for Lennon, was s.3(2)(a): to impair the operation of any computer Could this have a real world counterpart? Perhaps slowing down a postman? Removing a garden path? These analogies start to fall down when you continue the metaphor. If cyber-law were truly Horse Law they would sur ely stand up? So far this essay has concentrated mainly on criminal law, and since Easterbrooks original title was Property in Cyberspace civil law must be considered also. Contract law is an area that has had a great deal to do with the early computer age e-commerce and the larger technology companies that exist today could not have prospered as they have done without contract law. Murray argues that this is the cornerstone of a modern society, and remains true of todays information society.à [23]à Contract law and the Internet has been given a good overview in Murrays book, but more detailed analysis will be brought to the analogies that the courts have applied to bring contact law into the 20th century, decades before the Internet. As already mentioned in Sommers article, there have been rules and practices relating to instant communication, with the emphasis on money transfer or contract formation, for over a century. The courts have had ample time to develop the law on its use. The Postal Rule applies in contracts made by non-instantaneous means of communication, and means that as soon as the acceptance of an offer is posted, the contract is formed. For instant communication like telex, telephone or fax, the contract is concluded when the acceptance is received by the offeror.à [24]à Lord Dennings famous passage at 332-334 can be applied easily to contracts online. Email is a good example of the postal rule still functioning online email is not perfect, not instantaneous and there is no sure-fire way to confirm that an email was received or read. So, the postal rule applies. When purchasing products online, some online retailers specify in the terms and conditions that the contract is concluded only when a dispatch confirmation email is sent.à [25]à This seems a good example of Sommers idea that cyberspace didnt bring about new practices, so old law can still be used to regulate it. But what forms of instant communication exist on t he Internet that are used to conclude contracts? Instant Messaging (IM) is one of the first, and oldest,à [26]à methods of communication online, but is it ever used to conclude contracts? The author would suggest not, although lately there has been an increase in companies offering live help via a flash chatbox, as a form of customer support.à [27]à But to think of a contract being finalised over that medium would be a great leap. In any case, if it were, then it is likely that the rules applicable to Telex, confirmed in Brinkibon v Stahag Stahl und Stahlwarenhandels GmbHà [28]à would apply. So where is Horse Law now? What effects are technology and the Internet having on older areas of law? Easterbrook and Sommer would believe that Internet Law is just a new area in which old laws can fill, but what about the Internet changing old law? One area where the Internet has had a great effect is injunctions. This equitable remedy available to prevent damaging information being made public, which effectively restricts the press, cannot stand once the information is already out there.à [29]à This exception to injunctions has been used recently to bring about the end of injunctions in a unique way, usually using social networking sites such as Facebook and Twitterà [30]à . The Trafigura case broke because the MPs question in Parliament was being circulated on Twitter, so the information was out there. When allegations involving the private life of John Terry, the Captain of the England Football team surfaced, an injunction was not granted as the information was already out there and he would be unlikely to defeat the public interest defence.à [31] These cases show that Internet innovations can have a great bearing on areas of law once thought settled. It is not just old areas of law coming on to the Internet, but Internet phenomenon changing the way other areas of law act. How would it be best to study these interactions? The Internet def eating injunctions could be taught under Defamation, but where to tie all together as part of a larger debate about Internet governance? The social media cases have used the spotlight Lessig introduced to illuminate chinks in the armour of settled areas of law. Just as the Spycatcher book was for sale to commuters at train stations, the latest celebrity scandal arrives via an anonymous tweet. It is all but unstoppable, and at the very most, organisations seem to be only able to delay the information getting out. But where does legislation stand on cyber-law since the CMA amendments? In the wash-up of Parliament before the 2010 General Election, the government pushed forward the controversial Digital Economy Act 2010 (DEA). But recently Talk Talk and BT, two ISPs, have been granted a judicial review of the Act by the High Court.à [32]à What the most important provisions in the Act, though, are relating to punishments for copyright infringement. Section 9 deals with most of the se, and includes provisions that allow the Secretary of State to direct OFCOM to assess whether technical measures should be implemented in cases of persistent infringement. The fullest extend of the measures allows Ofcom to force ISPs to suspend the service provided to the subscriber.à [33]à Leaving aside the arguments about Internet access as a human right, this provision does not fit in well with the Horse Law theory. For Easterbrook to be correct, the provision would have to have some other application in real-space or a use away from cyber-law. This is not now just an analysis of an unruly horse damaging property, but an internet-only provision. There is no real world equivalent of cutting someone off from the Internet. People are not banned from using telephones, roads or public transport generally, yet here we have a provision which can restrict access to a vital part of a modern society. The author now argues that Horse Law has come full-circle and has ended. In contr ast with the vague terminology of the 1990 CMA, the DEA is explicit as to its technical terms and definitions. It uses phrases like internet service providers and requires information to be sent to the electronic or postal address held by the internet service provider for the subscriber.à [34]à Although the Act is careful not to mention email directly, the inclusion of a provision specifically allowing for contact electronically would have been unthinkable a decade ago. To show advances in understanding recently, he law has allowed contact via a variety of new mediums;à [35]à and these little inroads technology and Internet are making into the legal system are further evidence of cyber-law being an individual subject. The DEA was not technologically neutral. The language and definition make that clear, and despite virtuous arguments about the practicability of the measures themselves, this Act would find it hard to function correctly beyond cyber-law if it were technologi cally neutral. If it were technologically neutral, it would make no sense at all, perhaps having to refer to restriction of access to a series of network of services. It would be so generic and its language would refer to a looming elephant in the room. It would be make little sense. In recent years there has been an increase in laws surrounding the use of the Internet and computers. Some have related to civil law and some criminal. The initial civil provisions seem to have had more success that the criminal law, owing much to the fact that practices havent changed greatly with technology, but have increased in speed. A letter in the post may take two days and emailing to conclude a contract can take two minutes, but still get lost along the way. This supports part Sommers argument well, in that the Internet was not a place to develop new practices, just a place for old practices to move into. It also helps that the instant communication of the 20th century paved the way for civi l law online, with business developing practices that were adopted universally to promote certainty filling in the gaps. With regards to criminal actions and consequences, initially the CPS tried to shoe-horn new actions into old laws, and the courts seem stuck on the idea that computer crimes need to be compared to real-world crimes for them to make sense. But it is not known to whom the explanation is owed (the author hopes it is not the judiciary themselves). To many people today, even an offence as specific (and technically useless) as it is an offence to access the C: drive of anothers computer without permission would make sense and need no analogy to translate into the real world. Technologically neutral laws have been tried and failed; even widely generic laws havent worked properly until an update. It is now clear that the laws that do work are ones that take into account the exact purpose and authorisation of the people involved (Allison). Cyber-laws need to be techn ologically aware and precise, because that is part of the nature of computers themselves. But they also need to avoid slang in order to target people who would try and argue a defence on a definition of a word that doesnt exist outside of a message board. A description of the effects of the actions, as the CMA does, is a good idea place to start. This is how many criminal laws have worked for over a hundred years (Offences Against the Person Act 1861) and how computer laws should work. The CMA describes slowing down computer, which works. It would be wrong to talk about a botnet. Drafting legislation to know about computers and be technologically-aware is important, but at the same time it must not try and use static definitions likely to change. Donââ¬â¢t waste time! Our writers will create an original "Pre Internet Rules Or New Rules" essay for you Create order
Thursday, May 14, 2020
Greek Mythology And The Ancient Greek History - 935 Words
Greece caught my interest because it is a country with myths, traditions, history and living culture. This destination was chosen not only for its incomparable natural beauty, but because it is a magical place, full of discoveries, charm and secrets. I have always been interested in the ancient Greek history. The first time I learned about Greek mythology was in middle school. I enjoyed learning about the Greek Gods such as Zeus, Athena, and Poseidon, the tales would amaze me. Even watching the historical document and movies that recreate the Gods, pursued my interest more. So I wanted to travel to a place of history and myths. Greece contains numerous physical features, including mountains, lowlands, plains and coastal areas. Beaches, rivers and large tracts of open land cover the surface of Greece as do forests and lakes. Greece divides into three distinct geographical areas, and its islands contain differing topography and even climates, hosting various species of trees, plants and animals. Some of the Human and physical characteristic of Greece is Athens, which is the capital of Greece. It belongs to the Prefecture of Attica, located at the centre of the Greek territory. Attica is actually a peninsula surrounded by four high mountains that form a basin. In this basin, the city and suburbs of Athens have been constructed. The southernmost point of Attica is Cape Sounion, on top of which an ancient temple dedicated to god Poseidon is found. According to the myth, kingShow MoreRelatedThe Importance of Greek Mythology1650 Words à |à 7 PagesThe importance of Greek mythology Today, the ancient Greek myths still fascinate readers throughout the world. There are thousands of books written about the importance of Greek mythology in the formation of modern-time societies. There are hundreds of movies created about the adventures of Greek heroes. Apparently, the events, creatures, and people described in the ancient Greek myths were not real; however, their mythical nature does not undermine the importance of Greek mythology in defining theRead MoreThe Influence of Ancient Greek Mythology on Modern Society Essay1055 Words à |à 5 PagesAncient Greek society fell over 2000 years ago but despite this, its mythology still continues to influence our western society. References to Greek mythology can be found all through time and in our western culture. The influence of Greek mythology can be found in our science, arts and literature and our language. When Ancient Greece fell to the Roman Empire, Rome adapted its mythologies which still influence us today as th ey have through history. That is not to say that Greek mythology wasnââ¬â¢t influencedRead MoreAnnotated Bibliography On Ancient Greece1107 Words à |à 5 PagesAnnotated Bibliography Ancient Greece Annotated Bibliography Ancient Greece was the birth place of many sciences, famous philosophers and the arts. A time where humans where constantly discovering many different things, forming new ideas and opinions about life each and every day. Various gods ruled these different city states. Mythology was very huge in Ancient Greece. There are so many different folktales and myths from Ancient Greece. Do you ever wonder if any of those ancient Mythââ¬â¢s were true? EverRead MoreGreek And Roman Mythology881 Words à |à 4 PagesGreek and Roman Mythology Since the dawn of time, different societies have worshiped gods, believing in their power and being afraid of their fury. People have prayed and made sacrifices in order to achieve the gods mercy and generosity. They believed that, if the gods are in good mood, they will provide people with good weather conditions for growing crops. People needed explanations for different natural phenomena, such as rain, drought, lightning, thunder and earthquake. So, ancient people believedRead MoreGreek Mythology And Its Impact On Modern Culture1055 Words à |à 5 Pagesfrom Greek Mythology and has had a significant impact on our history and mythology helped shed light to itââ¬â¢s culture, religion, and government of ancient Greece. The Mediterranean has served as a vessel for the early civilizations., Greek mythology has influenced the life style and religion of the Greeks, especially because Greek mythology served as the primary basis of Greek belief, it became the nearest thing the Greeks had to a holy bible.1 These mythologies served as the center of Greek lifeRead MoreGreek Mythology Vs Roman Mythology1256 Words à |à 6 Pages Greek vs. Roman Mythology The line separating Greek and Roman mythology may seem very fine, but there are actually a few distinct differences between the two. For example, the Greeks and Romans both presented many of their stories orally, however, the Greeks were the first people to begin writing them down. Greek mythology is superior as it puts more emphasis on the role of mortals, the appearance of gods is more relevant, and its origin is more interesting as it was original and came before theRead MoreDid the Ancient Greek Gods Exist?1234 Words à |à 5 PagesDid the Ancient Greek Gods exist? The Ancient Greeks regarded their religion and mythology with much respect and loyalty. Although the Ancient Greek Gods are now seen as an explanation created by man, for natural forces and the world around us, there has been much evidence both for and against the debate that these Gods were real. The Greeks believed that the Earth was created with the birth of Gaia, or Mother Earth, from the dark void known as Chaos. It was believed that Gods were all-powerfulRead MoreThe Iliad And The Odyssey1693 Words à |à 7 Pagesââ¬Å"The ancient Greeks were a deeply religious people. They worshipped many gods whom they believed appeared in human form and yet were endowed with superhuman strength and ageless beauty. The Iliad and the Odyssey, our earliest surviving examples of Greek literature, record men s interactions with various gods and goddesses whose characters and appearances underwent little change in the centuries that followed. The Greeks attributed these epic narratives to Homer, a poet living at the end of the 8thRead MoreGreek Mythology and Its Effects on Civilization803 Words à |à 4 PagesGreek religion encompasses the collection of beliefs and rituals practiced in ancient Greece in the form of both popular public religion and cult practices. Many Greeks recognized the major gods and goddesses, such as Zeus, Poseidon, Hades and many others through philosophies such as Stoicism. The religious practices of the Greeks extended beyond mainland Greece to the islands and costs of Ionia in Asia Minor to Sicily and southern Italy, and scattered Greek colonies in the Western MediterraneanRead MoreThe Importance Of Greek Mythology1605 Words à |à 7 Pagespopular everyday items that we use in our life sometimes, are inspired by Greek mythology. Sports brands, movies and T.V shows, the most complicated technology, books and many more, are all examples of Greek Mythology. If you take modern day items that we use and compare it to Greek mythology, believe it o r not there is a big connection. But how come people today are inspired by Greek mythology? Also, why is Greek mythology important to us if they were just myths? It was such a while ago, so why do
Wednesday, May 6, 2020
The Freedmen s Bureau - 2615 Words
Chapter 14 Summative Paper Contreras, Jacob - HOUR 4 1. A) Describe the Freedmenââ¬â¢s Bureau, especially what its purpose was. B) Explain how Andrew Johnson became President of the United States. After the Civil War, Congress and the president set up a new government agency to help former freedmen. This new government agency was called by the name of the Freedmenââ¬â¢s Bureau. The Freedmen s Bureau also was an agency to help former slaves adjust to freedom after the 13th Amendment ended slavery. Their purpose for running this agency was to give out clothes, foods, and medicines, which reduced the death rate of many African Americans. They also did many other things like create schools for African Americans, like Atlanta University,â⬠¦show more contentâ⬠¦On the other hand, the army finally caught up to John Wilkes Booth and killed him. Since President Abraham Lincoln died, Vice President, Andrew Johnson from Tennessee became the new president of the United States. Radical republicans favored him because they thought he would be very harsh on pardoning the south back into the Union. 2. A) Describe ââ¬Å"Black Codesâ⬠in the South, and how Republicans did away with the codes. B) Describe the details of the Reconstruction Act of 1867. During 1866, even though the 13th Amendment ended slavery, Black Codes passed in the South, limited the rights of African Americans. Black codes had many affects on African Americans and the North itself. The Black Codes kept African Americans from owning any land or renting land. The South did not think of this as a new type of slavery. On the other hand, the North thought it was reinventing a new type of slavery. The Republicans got ride on slavery with the help of Congress and the Freedmenââ¬â¢s Bureau. Congress gave power to the Freemenââ¬â¢s Bureau to address the unlawful Black Codes. They punished anyone who did not give African Americans their rights by putting them on a special trial. Congress then passed laws that would take away Black Codes, but President Andrew Johnson vetoed the bill, which means the laws were rejected. Since there was so many Republicans in Congress, they were able to override the President s veto and the bills became
Tuesday, May 5, 2020
Cyber Security Attack On The Customers Of The Tesco Bank - Samples
Question: Discuss about the Cyber Security Attack On Tesco Bank. Answer: Information Security Incident Assessment Recently, there have been a large number of security attacks on the financial service providers. The bank has more than seven million bank customers and more than 4,000 staff members. The bank was founded in 2008, an initiated as a joint venture between Royal Bank of Scotland and Tesco Bank. It operates in various countries of Europe. In 2016, the bank observed suspicious activities and found that a significant amount of money is being transferred from the bank accounts of customers to Caribbean or accounts in Brazil and Argentina. As a result, about 40,000 bank accounts were frozen as the money was taken from 20,000 bank customers. In addition to it, total 2.400 pounds were taken from different accounts of the customers. The bank was victimized due to an online criminal activity. After the careful analysis of the security breach, it was identified that there were less chances of a remote security attack. The security stem of the organization is robust and there are minimal chances that a third party will intrude the organizations system. Moreover, the company as implemented a robust security system; therefore, it is not possible that the hackers were successful in obtaining the personal information and the account numbers of the account holders. Further investigation re vealed that the security breach was conducted by the staff members of the company (Amoroso, 2012). It was revealed that the intrusion attack was a result of process or management control where the information is shared in a negligent manner. It means that the organization neglected the privacy and the security of the members (Osborne, 2016). The company investigated its offshore or outsourcing operations as they may have resulted in the leakage of information. It might be a possibility that an offshore employee of the company might have been offered a large amount of money in lieu of customer data. However, the company needs to investigate whether the security breach was due to ill intent or incompetence of the employees. It can also be critiqued that most often security attacks were due to people. They are the most vulnerable link to an organization as a business organization cannot control them. It is very difficult to hack a system without any internal assistance. Most often, cus tomers also neglect their security and do things like reusing their passwords or clicking on random links which breach their privacy (BBC, 2016). The customers identified that there is some problem in their account as the current account holders were unable to make payment on online mediums. People were unable to login into their account. In addition, they were unable to login or make any sort of consumer compliant on the main website or the consumer platforms (Johnson, 2015). Incident Strategy When the company realized unusual activities in its banking system, it froze the bank accounts of about 40,000 customers. It also filed a case with the National Security Agency and tried to investigate the actual vulnerability which led to the intrusion. It was identified that the most vulnerable part of the security system of an organization is its human resources. An organization cannot control the behavior of its people and; therefore, it is important to control the information access to different people. In addition to the security audits, the company also made provision to compensate the customers. The Bank stated that it will refund all the money to the account holders as soon as possible. It has also made provisions to cover any financial loss resulting from the fraud. It has broadcasted the message that all the customers need to change their security passwords. As the security attack occurred due to third party intrusion, it is important to change the security passwords. The attackers may have the security passwords and use them for future attacks. The company should also assure that the people make strong security passwords (Rodger, 2016). The company also advised its customers that they should not use the same security details in other accounts. If a user has same passwords for different accounts, it increases the hacking risk by manifolds. In order to retain its current customers and increase customer loyalty, the company has also started giving a higher interest rate on its sales account. It has also assured its customers that no security breach will occur and the security system of the organization will be improved. As a precautionary measure, a large number of bank accounts were immediately locked. Conclusion It can be concluded that the cyber-crime is very prevalent today. A large number of business organizations are suffering cyber-attacks. In the same manner, Tesco suffered from a cyber-attack in which the login details and the privacy of several customers were compromised. The company undertook several measures to minimize the impact of the security breach. It immediately froze several of the accounts of the customers and filed a report with the National Security Agency. It should also minimize the access of the employees to the sensitive information of the organization so that no security breach occurs in the future. References Amoroso, E. (2012). Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. Elsevier. BBC. (2016). Tesco Bank customers lose money to 'fraudsters'. [Online]. Available at: https://www.bbc.com/news/business-37888327 [Accessed on: 30 July 2017]. Johnson, T.A. (2015). Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare. CRC Press. Osborne, H. (2016). Tesco Bank fraud: key questions answered. The Guardian. [Online]. Available at: https://www.theguardian.com/money/2016/nov/07/tesco-bank-fraud-key-questions-answered-suspicious-transactions-40000-accounts [Accessed on: 30 July 2017]. Rodger, J. (2016). Thousands of Tesco Bank customers lose money in hack - what to do if you are affected. Birmingham Mail. [Online]. Available at: https://www.birminghammail.co.uk/news/midlands-news/thousands-tesco-bank-customers-lose-12138742 [Accessed on: 30 July 2017].
Subscribe to:
Posts (Atom)