What role did the culture displayed by caviccha

Assignment Help Management Information Sys
Reference no: EM132272070

Case Study: The T-Mobile Hack

Recently a hacker was able to access the wireless carrier T-Mobile's network and read the private emails and personal files of hundreds of customers.

The government revealed that emails and other sensitive communications from the Secret Service agent investigating the incident were among those obtained by the hacker. The agent, Peter Caviccha, was apparently using his own personal handheld computer to view emails while travelling. His supervisors were apparently aware of this, since they frequently directed emails to his personal email address while he was travelling.

The agency had a policy in place that disallowed agents from storing work-related files on personal computers. The hacker was able to view the names and Social Security numbers of 400 T-Mobile customers, and they were notified in writing regarding the security breach.

T-Mobile has more than 63 million customers in the United States. The network attack occurred over a seven-month period and was discovered during a broad investigation by the Secret Service while studying several underground hacker organizations. Nicolas Lee Jacobson, a computer engineer from Santa Anna, California, was charged in the cyberattack after investigators traced his online activities to a hotel where he was staying. He was later arrested and then been released on a $25,000 bond.

1. What role did the culture displayed by Caviccha and his supervisors play in the case?

2. Were additional charges warranted against the agent if agency rules were violated?

3. Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?

4. What additional security measures are required to prevent eavesdropping on wireless communications?

Reference no: EM132272070

Questions Cloud

Describe the difference between ips and ids : Describe the components of an ICS and a SCADA system. Provide examples of how each are configured and used in the industry.
What are some of the objectives of the nations : Why was it formed? In addition, what are some of the objectives of the nations that are joining the EU? why some countries have wanted to get out of the EU.
Discuss two media events that influence public opinion : Discuss two (2) media events (past or curent) that has positively and negatively influenced public opinion of one government agency.
Why the functional role of it is important to the business : Three New things you learned Two reasons why the functional role of IT is important to the business One Question you have about the presentation.
What role did the culture displayed by caviccha : Recently a hacker was able to access the wireless carrier T-Mobile's network and read the private emails and personal files of hundreds of customers.
Discuss either two civil liberties or civil rights events : Discuss either two (2) civil liberties or two (2) civil rights events. One event must be from within the last two years, and the other may be from the past.
Why did you select phd in information technology : Why did you select PhD in information technology? Why did you select this university?
Calculate the sustainable growth rate for xyz corporation : Calculate the sustainable growth rate for XYZ Corporation: Profit margin = 9.2%, Capital intensity ratio = .80, Debt-Equity Ratio = .70, Net Income = $80,000, D
Write about women issues in multicultural policing : Women Issues In Multicultural Policing. Your essay will consist of a 3-5 pages about the topic you chose. Your essay will have an APA formatted cover page.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Integrated global system modelthe integrated global system

integrated global system modelthe integrated global system model from the massachusetts institute of technology is

  What is business value how is business value and it success

what is business value? how is business value and it success interrelated? briefly summarize an article of an

  Create a cyber-security policy describing the principle

Project Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this delive..

  Determine the top five it assets

Determine the top five (5) IT assets to include in a risk assessment for a typical manufacturing facility. Justify your selection.

  How you would remain anonymous without blowing your cover

Assess the hurdles you expect and how you plan to overcome them. Determine how you would remain anonymous without blowing your cover.

  Explore the employers section

Explore the Employers section.Based on the information found here, create an apprenticeship proposal for a position in the company you work for.

  Discuss about the big data information security

Do you consider your research topic an "issue" as defined in the thread Developing a Research Question?

  Describe the major functions of the is department

In an IS department, the ____________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.

  Example of a business function or operation

Determine whether the relationships between each of the chosen entities are one-to-one, one-to-many, or many-to-many relationships. Justify your response.

  Mobile devices and outsourcing

Mobile devices and Outsourcing

  Develop a comprehensive plan for the systems architecture

The overall assignment is to develop a comprehensive plan for the systems architecture for this fictitious organization in a form that would be appropriate as a PowerPoint slideshow for management. You may consider this as the means of presenting ..

  Did anna commit fraud

find a code that matched the diagnosis made by the care provider exactly. Instead of looking up the proper code

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd