16 Mar The T-Mobile Hack Case Study
6415Read the Case Study at the end of Chapter 10 and answer the following questions.
What role did the culture displayed by Caviccha and his supervisors play in the case?
Were additional charges warranted against the agent if agency rules were violated?
Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?
What additional security measures are required to prevent eavesdropping on wireless communications?
Recently a hacker was able to access the wireless carrier T-Mobile’s network and read the private emails and personal files of hundreds of customers. The government revealed that emails and other sensitive communications from the Secret Service agent investigating the incident were among those obtained by the hacker. The agent, Peter Caviccha, was apparently using his own personal handheld computer to view emails while travelling. His supervisors were apparently aware of this, since they frequently directed emails to his personal email address while he was travelling. The agency had a policy in place that disallowed agents from storing work-related files on personal computers. The hacker was able to view the names and Social Security numbers of 400 T-Mobile customers, and they were notified in writing regarding the security breach. T-Mobile has more than 63 million customers in the United States. The network attack occurred over a seven-month period and was discovered during a broad investigation by the Secret Service while studying several underground hacker organizations. Nicolas Lee Jacobson, a computer engineer from Santa Anna, California, was charged in the cyberattack after investigators traced his online activities to a hotel where he was staying. He was later arrested and then been released on a $25,000 bond.
1. What role did the culture displayed by Caviccha and his supervisors play in the case?
2. Were additional charges warranted against the agent if agency rules were violated?
3. Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges against the agent?
4. What additional security measures are required to prevent eavesdropping on wireless communications? (Dhillon, 2017-11-17, p. 271)
Dhillon, G. (2017-11-17). Information Security: Text and Cases, 2nd Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781943153244
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.