It seems obvious that Miller is breaking at least a few laws in his attempt at revenge. Suppose that when his scanning efforts were detected, SLS not only added his IP address to the list of sites banned from connecting to the SLS network, but the system also triggered a response to seek out his computer and delete key files on it to disable his operating system. What if SLS were part of an industry consortium that shared IP addresses flagged by its IDPSs, and all companies in the group blocked all of the ISP's users for 10 minutes? These users would be blocked from accessing perhaps hundreds of company networks. Would that be an ethical response by members of the consortium? What if these users were blocked for 24 hours?

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter2: Compliance: Law And Ethics
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question

It seems obvious that Miller is breaking at least a few laws in his attempt at revenge. Suppose that when his scanning efforts were detected, SLS not only added his IP address to the list of sites banned from connecting to the SLS network, but the system also triggered a response to seek out his computer and delete key files on it to disable his operating system.



What if SLS were part of an industry consortium that shared IP addresses flagged by its IDPSs, and all companies in the group blocked all of the ISP's users for 10 minutes? These users would be blocked from accessing perhaps hundreds of company networks. Would that be an ethical response by members of the consortium? What if these users were blocked for 24 hours?

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,