Ethical Analysis Background Template

You are to complete this worksheet for your specific selected technology as background work for the Ethical Analysis Deliverable.  You will need to develop three primary ethical arguments made about the current state or situation(s) surrounding your technology. The goal of this exercise is to broadly consider the views of stakeholders. You can include more than three arguments, but three is a minimum.

How can you concisely state the ethical case or belief?

phishing attacks is illegal and unethical

Phishing is a social engineering technique where an attacker poses as a trusted entity and dupes victims into clicking malicious emails, text messages or links which leads to the installation of malware and exposure of sensitive information.

Phishing attacks are unethical since they involve duping victims into revealing their personal data and passwords.

Phishing attacks are also illegal because they aim to steal sensitive and personal information to commit identity theft, leading to financial and data loss.

What claims would a person that SUPPORTS the belief make?

Attackers in this instance send messages including links to phishing websites while posing as businesses or friends
Attackers would pose as legitimate businesses or friends to convince people into clicking malicious emails and links that lead to malicious websites.

Attackers can also pose as businesses and send offers such as vouchers and discounts to their victims, where they are required to click on links to claim these offers.

Google and Facebook were duped $100 million by a phisher who impersonated Quanta company and sent fake invoices to the two companies, which they both paid in full. This is a classic example of a phishing attack.

What claims would a person that REJECTS the belief make?

To increase awareness and decrease successful assaults, businesses could educate their staff members about phishing scams

Attackers are always looking for new ways to dupe their victims. This means phishing techniques are always changing and it would require a company to regularly train their workers. Regularly training becomes expensive in the long-term.

The effectiveness of the security awareness training varies and it cannot always guarantee protection from phishing attacks. The training must cover different phishing trends and techniques which cannot all be covered effectively within the short period allocated.

Some employees may fail to take security training seriously and make efforts to understand phishing because they may find it to be the responsibility of the organization or IT department. These employees often fail to take their time to analyze and evaluate whether a link or email is authentic.

 

How can you concisely state the ethical case or belief?

It is type of social engineering assault that attempt to persuade the user sensitive data

Phishing is a social engineering technique that aims to steal user data such as credit card numbers and login credentials.

Phishing uses social engineering that uses malicious emails, links and websites to persuade users into revealing personal and sensitive information.

Phishing is an unethical act that creates a sense of fear, urgency or curiosity to encourage victims to open attachments or click on links to steal sensitive information

What claims would a person that SUPPORTS the belief make?

In the US, phishing assaults caused losses of about $100 million (Sadiq et al., 2021). in the aviation, educational, and healthcare industries

74% of US organizations across all industries experienced successful phishing attacks in 2020 (Egharevba, n.d.), leading to significant losses.

The average cost of successful phishing attacks among large organizations in the US about $15 million annually. This value has tripled in the past three years across multiple industries.

American Airlines, Megallen Health Inc. and Buffalo Public Schools also experienced phishing attacks leading to heavy losses.

What claims would a person that REJECTS the belief make?

Effective anti-phishing, anti-malware, and anti-spam software should also be used to stop malicious messages from reaching staff members

Most security software have vulnerabilities and it is thus important to train employees on identifying and avoiding cyberattacks.

Companies should train employees on how they should use anti-phishing, anti-spam and anti-malware effectively to detect and avoid cyberattacks.

 Employees can also open emails through their phones which renders organizational security software ineffective

 

How can you concisely state the ethical case or belief?

Phishing is a sort of cyberattack where in a spoof email is sent to the receiver in an attempt to press them into divulging personal information, downloading malware, or doing other desired actions.

Phishing is a software engineering attack that uses a fake email that encourages users to click on links and enter personal information. This leads to revealing personal information that can be used for malicious purposes.

Phishing is a cyberattack technique where tech-savvy criminals use fake emails and websites that appear legitimate to trick users into downloading malware or releasing sensitive information.

Phishing is an attack where users receive fake emails requiring them to enter sensitive information such as login credentials and social security numbers.

What claims would a person that SUPPORTS the belief make?

Employee login information and personal information were stolen by attackers using email phishing

Phishing attackers use emails that appear legitimate that contain links directing employees to malicious websites where they will be required to provide personal information such as login information and passwords.

Phishing scams involve using fake emails that trick employees into revealing sensitive information such as employee IDs and login credentials.

Data acquired through email phishing scams can be used to make purchases, steal sensitive information, withdraw funds and blackmail.

What claims would a person that REJECTS the belief make?

Web extensions can also alert users when they try to access harmful websites through hacked URLs

Web users can download web extensions from untrusted sources that fail to warn them when they attempt to perform dangerous events such as visiting malicious websites.

Malicious web extensions have permission to fully access user data and run on all websites, including the harmful ones.

Ineffective web extensions can mistakenly direct users to malicious websites containing malware and viruses.


References

Egharevba, T. Phishing Attack-A Challenge in Cybersecurity. https://www.researchgate.net/profile/Terry-Egharevba-2/publication/357826193_Phishing_Attack-A_Challenge_in_Cybersecurity/links/61e1333470db8b034c91ad93/Phishing-Attack-A-Challenge-in-Cybersecurity.pdf

  

Comments

Popular posts from this blog