In your copious spare time during your senior year at GMU, you develop an application that...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
In your copious spare time during your senior year at GMU, you develop an application that allows its users to check their credit ratings hassle-free. The application quickly takes off, and after graduating (and you WILL graduate - unlike other billionaire CEOS who couldn't be bothered to earn their degree) you find investors to expand the company to an online credit reporting company which you name Credit Where It's Due. You are the CEO, and have hired several dozen employees to expand the business. The first year is so successful that in your first 18 months your business has taken over about 45% of the credit reporting business, and is working to gain a larger share. Soon after, you are approached by one of your developers whom you have tasked to make some tweaks to the online application. After looking through the code and making the changes, your employee noticed that there is a security hole in the software. It doesn't appear that the vulnerability has been exploited yet, but you are told it is only a matter of time. (The employee learned about this vulnerability a few weeks earlier when attending a computer security conference.) Because of this vulnerability, hackers could potentially download credit card information, bank account numbers, social security numbers, and other information that they can use to steal billions of dollars from unknowing consumers. An unfortunate aspect of this vulnerability is that there is no quick patch that can be applied to the software. It will need to be rewritten from scratch, a process that could take over 9 months. You realize that if the database program is taken offline (to protect the consumer information), it would be the death- knell for your company. It would go out of business before the replacement program could be written. If you decide to keep the program up and running, there is a chance that the vulnerability can be repaired before the original program is exploited. However, if a hacker breaks into the system before it is fixed, there will be great damage to consumers, and it will likely bring the end of your company since you will be blamed by the public at large for not shutting down the application when there was a chance to protect consumer information. Part 1- Come up with an answer to how would you handle this situation. Will you take the system offline or try to fix the problem before the flaw is exploited? What are the factors on which you are basing your decision? Note: Make a decision and defend it. Do NOT waffle! You can make some assumptions to come to your decision, but be sure to state them, and explain why they matter to your final decision. Are you comfortable with your final decision? Once you have made your decision, pick one of the five main ethical theories (not principles from the SECEPP - although you may wish to refer to them for Part I) discussed during previous weeks and apply it to your decision. How does the chosen theory apply to this situation? Is your decision ethical? Write a posting that describes the thought process you went through to make your decision, and also your analysis of your decision using the chosen ethical theory. Your posting may be read by others who disagree with you, so make sure you make the strongest arguments you can, and your best analysis of the ethical theory. In your copious spare time during your senior year at GMU, you develop an application that allows its users to check their credit ratings hassle-free. The application quickly takes off, and after graduating (and you WILL graduate - unlike other billionaire CEOS who couldn't be bothered to earn their degree) you find investors to expand the company to an online credit reporting company which you name Credit Where It's Due. You are the CEO, and have hired several dozen employees to expand the business. The first year is so successful that in your first 18 months your business has taken over about 45% of the credit reporting business, and is working to gain a larger share. Soon after, you are approached by one of your developers whom you have tasked to make some tweaks to the online application. After looking through the code and making the changes, your employee noticed that there is a security hole in the software. It doesn't appear that the vulnerability has been exploited yet, but you are told it is only a matter of time. (The employee learned about this vulnerability a few weeks earlier when attending a computer security conference.) Because of this vulnerability, hackers could potentially download credit card information, bank account numbers, social security numbers, and other information that they can use to steal billions of dollars from unknowing consumers. An unfortunate aspect of this vulnerability is that there is no quick patch that can be applied to the software. It will need to be rewritten from scratch, a process that could take over 9 months. You realize that if the database program is taken offline (to protect the consumer information), it would be the death- knell for your company. It would go out of business before the replacement program could be written. If you decide to keep the program up and running, there is a chance that the vulnerability can be repaired before the original program is exploited. However, if a hacker breaks into the system before it is fixed, there will be great damage to consumers, and it will likely bring the end of your company since you will be blamed by the public at large for not shutting down the application when there was a chance to protect consumer information. Part 1- Come up with an answer to how would you handle this situation. Will you take the system offline or try to fix the problem before the flaw is exploited? What are the factors on which you are basing your decision? Note: Make a decision and defend it. Do NOT waffle! You can make some assumptions to come to your decision, but be sure to state them, and explain why they matter to your final decision. Are you comfortable with your final decision? Once you have made your decision, pick one of the five main ethical theories (not principles from the SECEPP - although you may wish to refer to them for Part I) discussed during previous weeks and apply it to your decision. How does the chosen theory apply to this situation? Is your decision ethical? Write a posting that describes the thought process you went through to make your decision, and also your analysis of your decision using the chosen ethical theory. Your posting may be read by others who disagree with you, so make sure you make the strongest arguments you can, and your best analysis of the ethical theory. In your copious spare time during your senior year at GMU, you develop an application that allows its users to check their credit ratings hassle-free. The application quickly takes off, and after graduating (and you WILL graduate - unlike other billionaire CEOS who couldn't be bothered to earn their degree) you find investors to expand the company to an online credit reporting company which you name Credit Where It's Due. You are the CEO, and have hired several dozen employees to expand the business. The first year is so successful that in your first 18 months your business has taken over about 45% of the credit reporting business, and is working to gain a larger share. Soon after, you are approached by one of your developers whom you have tasked to make some tweaks to the online application. After looking through the code and making the changes, your employee noticed that there is a security hole in the software. It doesn't appear that the vulnerability has been exploited yet, but you are told it is only a matter of time. (The employee learned about this vulnerability a few weeks earlier when attending a computer security conference.) Because of this vulnerability, hackers could potentially download credit card information, bank account numbers, social security numbers, and other information that they can use to steal billions of dollars from unknowing consumers. An unfortunate aspect of this vulnerability is that there is no quick patch that can be applied to the software. It will need to be rewritten from scratch, a process that could take over 9 months. You realize that if the database program is taken offline (to protect the consumer information), it would be the death- knell for your company. It would go out of business before the replacement program could be written. If you decide to keep the program up and running, there is a chance that the vulnerability can be repaired before the original program is exploited. However, if a hacker breaks into the system before it is fixed, there will be great damage to consumers, and it will likely bring the end of your company since you will be blamed by the public at large for not shutting down the application when there was a chance to protect consumer information. Part 1- Come up with an answer to how would you handle this situation. Will you take the system offline or try to fix the problem before the flaw is exploited? What are the factors on which you are basing your decision? Note: Make a decision and defend it. Do NOT waffle! You can make some assumptions to come to your decision, but be sure to state them, and explain why they matter to your final decision. Are you comfortable with your final decision? Once you have made your decision, pick one of the five main ethical theories (not principles from the SECEPP - although you may wish to refer to them for Part I) discussed during previous weeks and apply it to your decision. How does the chosen theory apply to this situation? Is your decision ethical? Write a posting that describes the thought process you went through to make your decision, and also your analysis of your decision using the chosen ethical theory. Your posting may be read by others who disagree with you, so make sure you make the strongest arguments you can, and your best analysis of the ethical theory. In your copious spare time during your senior year at GMU, you develop an application that allows its users to check their credit ratings hassle-free. The application quickly takes off, and after graduating (and you WILL graduate - unlike other billionaire CEOS who couldn't be bothered to earn their degree) you find investors to expand the company to an online credit reporting company which you name Credit Where It's Due. You are the CEO, and have hired several dozen employees to expand the business. The first year is so successful that in your first 18 months your business has taken over about 45% of the credit reporting business, and is working to gain a larger share. Soon after, you are approached by one of your developers whom you have tasked to make some tweaks to the online application. After looking through the code and making the changes, your employee noticed that there is a security hole in the software. It doesn't appear that the vulnerability has been exploited yet, but you are told it is only a matter of time. (The employee learned about this vulnerability a few weeks earlier when attending a computer security conference.) Because of this vulnerability, hackers could potentially download credit card information, bank account numbers, social security numbers, and other information that they can use to steal billions of dollars from unknowing consumers. An unfortunate aspect of this vulnerability is that there is no quick patch that can be applied to the software. It will need to be rewritten from scratch, a process that could take over 9 months. You realize that if the database program is taken offline (to protect the consumer information), it would be the death- knell for your company. It would go out of business before the replacement program could be written. If you decide to keep the program up and running, there is a chance that the vulnerability can be repaired before the original program is exploited. However, if a hacker breaks into the system before it is fixed, there will be great damage to consumers, and it will likely bring the end of your company since you will be blamed by the public at large for not shutting down the application when there was a chance to protect consumer information. Part 1- Come up with an answer to how would you handle this situation. Will you take the system offline or try to fix the problem before the flaw is exploited? What are the factors on which you are basing your decision? Note: Make a decision and defend it. Do NOT waffle! You can make some assumptions to come to your decision, but be sure to state them, and explain why they matter to your final decision. Are you comfortable with your final decision? Once you have made your decision, pick one of the five main ethical theories (not principles from the SECEPP - although you may wish to refer to them for Part I) discussed during previous weeks and apply it to your decision. How does the chosen theory apply to this situation? Is your decision ethical? Write a posting that describes the thought process you went through to make your decision, and also your analysis of your decision using the chosen ethical theory. Your posting may be read by others who disagree with you, so make sure you make the strongest arguments you can, and your best analysis of the ethical theory. In your copious spare time during your senior year at GMU, you develop an application that allows its users to check their credit ratings hassle-free. The application quickly takes off, and after graduating (and you WILL graduate - unlike other billionaire CEOS who couldn't be bothered to earn their degree) you find investors to expand the company to an online credit reporting company which you name Credit Where It's Due. You are the CEO, and have hired several dozen employees to expand the business. The first year is so successful that in your first 18 months your business has taken over about 45% of the credit reporting business, and is working to gain a larger share. Soon after, you are approached by one of your developers whom you have tasked to make some tweaks to the online application. After looking through the code and making the changes, your employee noticed that there is a security hole in the software. It doesn't appear that the vulnerability has been exploited yet, but you are told it is only a matter of time. (The employee learned about this vulnerability a few weeks earlier when attending a computer security conference.) Because of this vulnerability, hackers could potentially download credit card information, bank account numbers, social security numbers, and other information that they can use to steal billions of dollars from unknowing consumers. An unfortunate aspect of this vulnerability is that there is no quick patch that can be applied to the software. It will need to be rewritten from scratch, a process that could take over 9 months. You realize that if the database program is taken offline (to protect the consumer information), it would be the death- knell for your company. It would go out of business before the replacement program could be written. If you decide to keep the program up and running, there is a chance that the vulnerability can be repaired before the original program is exploited. However, if a hacker breaks into the system before it is fixed, there will be great damage to consumers, and it will likely bring the end of your company since you will be blamed by the public at large for not shutting down the application when there was a chance to protect consumer information. Part 1- Come up with an answer to how would you handle this situation. Will you take the system offline or try to fix the problem before the flaw is exploited? What are the factors on which you are basing your decision? Note: Make a decision and defend it. Do NOT waffle! You can make some assumptions to come to your decision, but be sure to state them, and explain why they matter to your final decision. Are you comfortable with your final decision? Once you have made your decision, pick one of the five main ethical theories (not principles from the SECEPP - although you may wish to refer to them for Part I) discussed during previous weeks and apply it to your decision. How does the chosen theory apply to this situation? Is your decision ethical? Write a posting that describes the thought process you went through to make your decision, and also your analysis of your decision using the chosen ethical theory. Your posting may be read by others who disagree with you, so make sure you make the strongest arguments you can, and your best analysis of the ethical theory. In your copious spare time during your senior year at GMU, you develop an application that allows its users to check their credit ratings hassle-free. The application quickly takes off, and after graduating (and you WILL graduate - unlike other billionaire CEOS who couldn't be bothered to earn their degree) you find investors to expand the company to an online credit reporting company which you name Credit Where It's Due. You are the CEO, and have hired several dozen employees to expand the business. The first year is so successful that in your first 18 months your business has taken over about 45% of the credit reporting business, and is working to gain a larger share. Soon after, you are approached by one of your developers whom you have tasked to make some tweaks to the online application. After looking through the code and making the changes, your employee noticed that there is a security hole in the software. It doesn't appear that the vulnerability has been exploited yet, but you are told it is only a matter of time. (The employee learned about this vulnerability a few weeks earlier when attending a computer security conference.) Because of this vulnerability, hackers could potentially download credit card information, bank account numbers, social security numbers, and other information that they can use to steal billions of dollars from unknowing consumers. An unfortunate aspect of this vulnerability is that there is no quick patch that can be applied to the software. It will need to be rewritten from scratch, a process that could take over 9 months. You realize that if the database program is taken offline (to protect the consumer information), it would be the death- knell for your company. It would go out of business before the replacement program could be written. If you decide to keep the program up and running, there is a chance that the vulnerability can be repaired before the original program is exploited. However, if a hacker breaks into the system before it is fixed, there will be great damage to consumers, and it will likely bring the end of your company since you will be blamed by the public at large for not shutting down the application when there was a chance to protect consumer information. Part 1- Come up with an answer to how would you handle this situation. Will you take the system offline or try to fix the problem before the flaw is exploited? What are the factors on which you are basing your decision? Note: Make a decision and defend it. Do NOT waffle! You can make some assumptions to come to your decision, but be sure to state them, and explain why they matter to your final decision. Are you comfortable with your final decision? Once you have made your decision, pick one of the five main ethical theories (not principles from the SECEPP - although you may wish to refer to them for Part I) discussed during previous weeks and apply it to your decision. How does the chosen theory apply to this situation? Is your decision ethical? Write a posting that describes the thought process you went through to make your decision, and also your analysis of your decision using the chosen ethical theory. Your posting may be read by others who disagree with you, so make sure you make the strongest arguments you can, and your best analysis of the ethical theory.
Expert Answer:
Answer rating: 100% (QA)
To find potential vulnerabilities thirdparty tools can scan code in real time to highlight potential security issues while more complex tools can analyze an entire codebase or the execution of the res... View the full answer
Posted Date:
Students also viewed these accounting questions
-
In this exercise, you create an application that allows the user to enter the gender (either F or M) and GPA for any number of students. The application should calculate the average GPA for all...
-
During their senior year at West College, two business students, Curtis Rimes and Erica Woods, began a part-time business making personal computers. They bought the various components from a local...
-
During their senior year at Clarkson College, two business students, Gerry Keating and Louis Lamont, began a part-time business making personal computers. They bought the various components from a...
-
can you complete this concept map that reviews some key ideas about species and speciation logy with Lab Connecting the Concepts: Species and Speciation oncepts: Species and Speciation oncept map...
-
Does the sale of the property interest of one-fourth of the property destroy the joint tenancy of the others and reduce it to a tenancy in common?
-
Two concentric spheres 0.2 m and 0.3 m in diam, with the space between them evacuated, are to be used to store liquid air (133 K). If the surfaces of the spheres have been flashed with aluminum and...
-
What factors that are important to Gen Z individuals may influence entrepreneurial firms priorities in the future?
-
Roman Products Inc., has two divisions, Milan and Venice. For the month ended March 31, Milan had sales and variable costs of $500,000 and $225,000, respectively, and Venice had sales and variable...
-
a) A financial institution is a financial intermediary (FI'S) that facilitates the transfer of funds between suppliers and users of funds. Briefly explain the benefits that FI's provide to the...
-
A 5-kg uniform square plate is supported by two identical 1.5-kg uniform slender rods AD and BE and is released from rest in the position = 45?. Knowing that the angular velocity of AD as it passes...
-
Lanark Ltd is a stationary retail business in the Melbourne market. Recently, Lanark Ltd expand the market to the office equipment market and decided to take over Shibuca Ltd, of medium size business...
-
Can you think of an example of O-ring production from everyday life? Do you think your example is a good metaphor for development problems?
-
What is the meaning of a colonial legacy? Discuss any disadvantages and possible advantages.
-
Compare and contrast the nature of peasant or small-scale traditional agriculture in Asia, Africa, and Latin America. How do overall agricultural systems differ among these regions? What are the...
-
For all of their diversity, many less developed countries are linked by a range of common problems. What are these problems? Which do you think are the most important? Why?
-
Given the COVID-19 pandemics trajectory, how have recent developments affected organizational efforts to protect minoritized populations in intercollegiate athletics? What are some of the recent...
-
Article Summary : read the article "Arbitration pros and cons" and summarize two (2) pros and two (2) cons https://www.nolo.com/legal-encyclopedia/arbitration-pros-cons-29807.html
-
Identify the most stable compound:
-
Which of the following statements best describes corporate governance with respect to fraud? 1. Auditors are primarily responsible for the detection of fraud, the Board of Directors for the...
-
Which of the following is not a reason that the prevention and detection of fraud resulting from management override and collusion presents a significant challenge for the antifraud community? 1....
-
Which of the following is not an inherent part of Statement on Auditing Standards, No. 99/113? 1. Greater scrutiny of the chief executive and chief financial officers personal financial condition 2....
Study smarter with the SolutionInn App