Perform an ethical analysis on the case

Assignment Help Other Subject
Reference no: EM133478320

Problem: Tech Company vs Tech Company Ethical Analysis

Introduction

The debate over "responsible" disclosure of software vulnerabilities has been a mainstay in the cyber security industry. In 2015, new fuel was added to the fire as Google disclosed a Microsoft Windows vulnerability, along with exploit code, two days before the scheduled patch. [Note: Exploit code is the section of code that hackers can exploit to hack software.]

Company v. Company Disclosure Debate

In 2015, the bug was found by Google's in-house security research team, which searches for vulnerabilities in Google software, as well as that of other vendors, including Microsoft. Upon finding a vulnerability, Google adheres to a strict 90-day policy: Vendors are notified of the bug, and a public disclosure is automatically released 90 days after, regardless of whether the bug has been addressed.

Microsoft initially asked for an extension beyond the 90 days, which was denied by Google, as was a request to extend the disclosure date to the first "Patch Tuesday" of the month (the second Tuesday of the month, and preferred release date for patches for developers).

Microsoft criticized Google in a blog post, accusing the company's decision of being a "gotcha" opportunity, and at the expense of the users, who were at risk for the two days between the disclosure and the patch release. Microsoft reiterated its support for "Coordinated Vulnerability Disclosure," which calls for security researchers to work closely with developers in ensuring a fix is released before the public disclosure.

Google, and supporters of similar disclosure policies, argue that firm disclosure dates prevent developers from sweeping vulnerabilities under the rug, and should strike a balance between the public's right to know and providing the developer a chance to fix the problem. Many take an even harder stance and propose that immediate public disclosure is the best policy.

Perform an ethical analysis on this case. Analyze it from the perspective of Google and assess their decision. During your analysis, cite an ethical standard you feel best suits the most ethical decision that could be made (there are several standards that were part of the content or you can describe your own). Use this standard to prescribe a course of action that Google should have taken in this case (your course of action may or may not match what Google actually did). Be as thorough as possible.

Reference no: EM133478320

Questions Cloud

How does one go about achieving an architecture : what this book is all about: How does one go about achieving an architecture and an architectural design that represent the security needs for a system?
Compare one major difference between each of the products : Compare one major difference between each of the products as it pertains to this article (i.e.: online resources, online training, tutorials, etc.).
What are the attributes of a successful project manager : Discuss the different techniques for project management and the most important characteristics that define a good project manager.
Secret key cryptography cannot assure non-reputation : Explain why secret key cryptography cannot assure non-reputation? What is the block size used currently in AES?
Perform an ethical analysis on the case : Perform an ethical analysis on this case. Analyze it from the perspective of Google and assess their decision.
Describe the algorithm for decryption using Caesar cipher : How many distinct keys are there for a Caesar cipher with the given alphabet? Describe the algorithm for decryption using the Caesar cipher.
Identify the social determinants of health in a community : NURS 6218- Analyze the environmental factors affecting population health in a community. Identify the social determinants of health in a community.
Identify and clearly define the relevant law : Identify and clearly define the relevant law, either defining a legal doctrine, provisions of law, or elements of a specific cause of action
Concepts of cybersecurity : You have learned many concepts of cybersecurity and begun forging your path into the field.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd