A martial arts expert applies cyber forensics to identifying sexual predators who run or work at martial arts schools. He worries about the implications of publishing his findings.
A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm’s assistance in paying the ransom. How should the company proceed?
A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly adept at identifying malware traffic. Now he ponders how the project might move forward, given that cybersecurity is entirely outside of his domain of …
A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is not the first time this has happened. How should he recover?
After the successful launch of a DBA program for working executives, the program’s academic director ponders whether or not there might be an opportunity to create a cybersecurity doctoral program based on the existing program’s research core.
A firm that specializes in setting up computer systems is asked by a potential client to guarantee 100% security. Knowing that is an impossible request, the owner considers what he might offer as a counter proposal that would make sense.
JVAB, an elite small business that specializes in cybersecurity penetration testing has more demand for its services than it can handle. The skill set required for its activities is very specialized, however. It is also hard to find. How should it go about seeking new employees?
A supplier of marketing and logistics web sites has been approached by a customer wanting to incorporate multifactor authentication. What approach should be taken and how should it be configured so as not to disrupt existing customers?
A small consulting business has the opportunity to work with a new age company interested in moving its proprietary psychological software to the cloud. But if the security of that software is compromised, it could seriously damage the client. Should he proceed?
Does it make sense for the University of South Florida to acquire cyber insurance? This case study explores the issues involved and the nature of the cyber insurance product.