Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Let’s say that you work for a small company and you have some concerns regarding

ID: 3728306 • Letter: L

Question

Let’s say that you work for a small company and you have some concerns regarding the infrastructure. You believe it could be easily compromised. You have raised your concerns a number of times to management, but they have done nothing. Would you then exploit the vulnerabilities that you know are there in order to demonstrate the fragility of the infrastructure? Is it ethical to perform this exploitation given that you work at the company, have some responsibility for security at the company and you have the best interests of the customers and the company’s data in mind? Provide at least 2 references to support your response.

Explanation / Answer

In the above stated case the variability of the cause and effect of all the security mesaurement should be initialised with all the concerns reagarding the comprimising of the infrstructure and data.

It is only non ethical only if not intimidated prior to the management,but in this case i do not intend to expose this vulnerability for my benefits.This vital piece of information should be well documented.

The document with all the vital pieces of information should be shared with each and every high ranked officers in the organization.The concern of the officers will state the seriousness of the infrastructure.

But if the management doesnt intend to care about the infrastructre,there are not much available options rather than to make the best use of the situation.

Perform unethical exploitation in constrained environment only if it is very much necessary concerning the risk.

Provide well documented report to every person responsible.

sharpen your skill if this kind of environment enganges any kind of learning

it professional from mastek reported an error with the system that costed around 2 million(link cannot be posted as a part of chegg rules)

ongoing process of bounty from different i.t companies regarding their security measures and protocols.