The T-Mobile Hack Case Study
Read the Case Study at the end of Chapter 10 and answer the following questions.
What role did the culture displayed by Caviccha and his supervisors play in the case?
Were additional charges warranted against the agent if agency rules were violated?
Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?
What additional security measures are required to prevent eavesdropping on wireless communications?
Recently a hacker was able to access the wireless carrier T-Mobile’s network and read the private emails and personal files of hundreds of customers. The government revealed that emails and other sensitive communications from the Secret Service agent investigating the incident were among those obtained by the hacker. The agent, Peter Caviccha, was apparently using his own personal handheld computer to view emails while travelling. His supervisors were apparently aware of this, since they frequently directed emails to his personal email address while he was travelling. The agency had a policy in place that disallowed agents from storing work-related files on personal computers. The hacker was able to view the names and Social Security numbers of 400 T-Mobile customers, and they were notified in writing regarding the security breach. T-Mobile has more than 63 million customers in the United States. The network attack occurred over a seven-month period and was discovered during a broad investigation by the Secret Service while studying several underground hacker organizations. Nicolas Lee Jacobson, a computer engineer from Santa Anna, California, was charged in the cyberattack after investigators traced his online activities to a hotel where he was staying. He was later arrested and then been released on a $25,000 bond.
1. What role did the culture displayed by Caviccha and his supervisors play in the case?
2. Were additional charges warranted against the agent if agency rules were violated?
3. Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?
4. What additional security measures are required to prevent eavesdropping on wireless communications? (Dhillon, 2017-11-17, p. 271)
Dhillon, G. (2017-11-17). Information Security: Text and Cases, 2nd Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781943153244
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.