Should isps be required to notify a customer

Assignment Help Management Information Sys
Reference no: EM131302513

Before doing this assignment, be sure you are familiar with the General Instructions for Discussion Assignments found in the Course Information Module.

For this discussion we are staying with the theme of negative externalities in cybersecurity. But this time, it's personal!

We haven't talked much at all about cybersecurity in the home this quarter. From a perspective of cyberwar or cyberterrorism, most of what you worry about at home is not a serious concern. Ransomware or spyware or a file deletion virus on your personal computer isn't a national security issue.

But there is one way in which the cybersecurity of your personal computer does potentially become a national security issue - if attackers are using your computer as part of an attack on someone else, for instance, on critical infrastructure. This happens in three ways:

The attacker may use your computer as an interim step in an attack, for the purpose of making attribution difficult.

The attacker may use your computer as a C2 server to direct an attack

Your computer may be part of a botnet.

The first two of these are not actually a significant issue for a home computer, because attackers want to use computers that are connected to the internet 24 hours a day, and home computers often are not. They are much more likely to use compromised web servers than personal computers for those purposes.

But for botnets, they just want to control as many computers as possible, whether those computers are online 24/7 or not.

If you haven't noticed already, this is another perfect example of a negative externality. You pay very little price if your computer is part of a botnet. It may slow your internet connection occasionally, but otherwise you won't even know anything is happening. But the victims of the attack will. Your lack of cybersecurity is a negative externality - the cost of your failure to protect your computer is paid by someone else.

Now you probably will never know that your computer is part of a botnet. And most computers users don't have a clue what a botnet even is.

But your ISP does know, or at least, they can usually easily identify when a customer's computer is part of a botnet. If ISPs did this, the power of botnets could be dramatically diminished.

So here's the question:

Should ISPs be required to notify a customer if their computer is part of a botnet? And if they do, should they disconnect the customer from the internet until the customer can have their computer "cleaned"?

By the way, you may think that your ISP doesn't have the right to monitor your internet traffic or disconnect your service, but they almost certainly do. It's in the contract that you, like the rest of us, agreed to without reading.

As always, one initial post is due on the date shown in Canvas. The following day, instructions for responses will be posted.

Reference no: EM131302513

Questions Cloud

Disclosures and legal procedures : The purpose of this assignment is to compare legal principles, disclosures and legal procedures. Accounting of disclosures specific to the ARRA and HITECH regulations are also introduced.
What would be the present value of the same annuity : What is the present value of an annuity that pays $15,000 at the end of each year for the next ten years if the discount rate is 7.2%? What would be the present value of the same annuity if the payments were made on the first day of each year?
What are the expected benefits to those countries : How much debt was forgiven during that year in each of the countries involved? What are the expected benefits to those countries?
Each of the housing development projects : How many other real estate firms will also be competing for sales in each of the housing development projects.-
Should isps be required to notify a customer : Should ISPs be required to notify a customer if their computer is part of a botnet? And if they do, should they disconnect the customer from the internet until the customer can have their computer "cleaned"?
Does the paper fully address all aspects of the assignment : Does the paper fully address all aspects of the assignment? Is the assignment addressed accurately and precisely using sound logic? Does the paper meet minimum length requirements?
Determine the state-transition matrix : Consider a channel constrained to have at least one zero between every one, and runs of zero no longer than 3.
Explain discrimination complaint or civil litigation process : Prepare a 750-word paper in which you analyze and explain the discrimination complaint and civil litigation processes as it would potentially apply to John and his employer.
Compute the least-squares solution : One solution to Ax = b 1s x = [l. 2. 3,4IT Compute the least-squares solution using the SVD, and compare Why was the solution chosen?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Routing protocols and criteriarouting protocols operate at

routing protocols and criteriarouting protocols operate at the network layer layer 3 of the tcpip and osi protocol

  Describe the application architecture and process design

Include a high-level description of the security controls that you recommend for the design of this HR system. Apply the tools of systems analysis to describe the information system's architecture in terms of data, processes, interfaces, and netwo..

  Advantages and disadvantages of erp package

Advantages and disadvantages of ERP package and What are the advantages and disadvantages of ERP package or specific manufacturing production planning utilities?

  Reasons why the customer should be collecting data

In this writing assignment, you will create a brochure advertising your services as a data repository. Research commercial data repositories. Provide at least three reasons why the customer should be collecting data

  Compare the amount of safety stock in two systems

To reduce safety stock, should the cross-dock facility be closer to the factory or the retail outlets? For this purpose, analyzed the impact of increasing L1, and therefore decreasing L2, on total safety stock.

  Explain information security threats and vulnerabilities

Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software.

  Protect and safeguard information provided by the government

In order to begin work on the contract you must ensure you can protect and safeguard information provided by the government.

  Improve and maintain effective security management

The best tools to improve and maintain effective security management operations do not necessarily involve the latest, most expensive commercial products or overly-complex systems

  What is being done to address the issues you identified

What is the Americans with Disabilities Act (ADA)? How does the ADA address issues for the aging population?   What is being done to address the issues you identified

  Write paper on tables and queries in relational databases

Write paper on Tables and Queries in Relational Databases

  Create a system wide clinical documentation program

Write a 2 page report (paper) on your plan to create and implement a system wide clinical documentation program at your organization

  How do cloud threats differ from traditional threats

How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? You are opening an online store in a cloud environment. What are three security controls you might use to prot..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd