Computer Secutity
Stakeholders and Potential Harms/Benefits (1%):1.a. Who are the stakeholders whose interests Zolder researchers (Wesley and Rik) needed to consider in giving their DefCon presentation, and what potential harms/benefits to those various stakeholders did they need to consider and weigh?1.b. Who are the stakeholders whose interests Salesforce researchers (Josh and John) needed to consider in giving their DefCon presentation, and what potential harms/benefits to those various stakeholders did they need to consider and weigh?Question 2 () Ethical Considerations:2.a. Do you think the 2020 Wesley & Rik presentation was ethical, all things considered? Why or why not?2.b. Do you think the 2017 Josh & John presentation (including its planned code release) was ethical, all things considered? Why or why not? Was Salesforce right to block the open-source code release attempt and stop their public talk?Task 3 Similarities and Differences: What are the most important ethical similarities and differences between two case studies? Task 4 (Professional Reputations: Assume that you are looking to hire a security researcher for your team. Would you prefer the researchers of Zolder or Salesforce? What ethical considerations would need to be evaluated in your decision?Task 5 (Legal Issues:What are the relevant laws in Qatar and GCC related to cyber security and what implications would the laws be on the presented cases?
RECOMMENDED: [SOLVED] Computer Secutity
With us, you are either satisfied 100% or you get your money back-No monkey business