Search⌘ K
AI Features

Cyber Ethics

Explore key concepts of cyber ethics, including respecting privacy and organizational values. Learn from the Capital One data breach case study the importance of secure system design, responsible behavior, and timely breach notification. Understand how to uphold ethical standards and avoid harm in computing practices.

We'll cover the following...

Given the scenario below, select the approach that you ...

Scenario

You’re a skilled and dedicated software engineer at a renowned bank, responsible for managing critical systems and ensuring their security. With hacking as your passion, you revel in finding vulnerabilities and uncovering hidden flaws. Though you’re working, you feel you aren’t really heard in the company. As time goes by, you grow discontent with the company’s policies and treatment of its employees. You believe you are more talented than you’re given credit for. Besides, you can do more on your own. The resentment builds up, and eventually, you decide to leave the company.

Months later, you come across a vulnerability in the systems of the company you previously worked for. This vulnerability could potentially expose sensitive customer data and financial information.

This could be your chance to display your potential by exploiting this vulnerability to breach the company’s systems. What do you do?


Case

...