Preview

What Would You Do in a Blackmail Situation?

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Would You Do in a Blackmail Situation?
GAYOLA, Brent Julian S.
BSCS-CS I-1

What Would You Do No.4
You are the CFO of a sporting goods manufacturer and distributor. Your firm has annual sales exceeding $500 million, with roughly 25 percent of your sales coming from online purchases. Today your firm’s Web site was not operational for about an hour. The IT group informed you that the site was the target of a distributed denial-of-service attack. You are shocked by an anonymous call later in the day in which a man tells you that your site will be attacked unmercifully unless you pay him $250,000 to stop the attacks. What do you say to the blackmailer?

In some situations, the blackmailer may just be a cheap bluff. This is where honest self-evaluation comes into play. Is there really a ground for the blackmail? Is the blackmail really damaging; and can it hold water? These are some of the questions you should ask yourself and answer truthfully. Of the purpose of this article, we will assume that there is ground for blackmail. This singular step could end the blackmailer’s game. The leverage the blackmailer has over you is the information that he has on you; which has the potential of having some damaging effects on your person or those close to you. When you disclose this information yourself, you not only take away the blackmailers leverage but allow the story or blackmail claims to flow in your own tide.

Contact the law. This is a way of getting the blackmailer to pay for his / her acts. When you contact the law enforcement agent they will work hand in hand with you to catch the blackmailer in the act, so they can have evidence to prosecute him / her. Giving in to the blackmailer. Well, this is another option but the last I would want you to consider taking. This is usually taken by those who don’t want to involve the police or a lawyer. They want things to remain between them and the blackmailer. In this situation, you might want to believe that the blackmailer will not come again and again

You May Also Find These Documents Helpful

  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    Fourth, in the aftermath of the attack, the risks and threats that the company is exposed are further security breaches that could expose critical and private secret trading information of the company. This could lead to financial loses since hackers can…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    BugUSA, Inc. - Case ScenarioThis scenario presents the case of BugUSA, Inc.; as a team, we endeavor to address the legal ramifications of each company's activities. BugUSA, Inc. has legal rights to intellectual property protection, and this paper explores the options available within that realm. WIRETAP, Inc. will face civil liability claims if caught in its underhanded measures, and possibly a civil RICO suit; BugUSA's security guard Walter, however, has also created a case against its own interests. When another company owns the rights to a web domain that suits BugUSA's needs, it faces the challenge of how to acquire the domain with as little hassle and as much protection as possible. A robbed vendor may present new tort liabilities for BugUSA, and we explore potential defenses. Finally, an injured police officer may have further claims against BugUSA in light of the company's manufacturing decisions.…

    • 2109 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    One of the effective ways to minimize the poor communication among each other consists of the capability of self-disclosure. The self-disclosure theory is a tenacity revelation of particular info to other individual (Howard, 2011). Disclosure might consist of allocation both high-risk and low-risk info as well as individual involvements thoughts and assertiveness, approaches and principles, historical realities and life stories, and even forthcoming expectations, visions, goals, and aims. In sharing data about yourself, you make decisions about what to share and using whom to share it.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Plutonium, an Internet start-up company founded in 1988, was in the midst of a massive project to improve integration and internal data quality of its disparate information systems. At the heart of this project was an endeavor to implement a complex billing system called Gateway. Gateway, working with Visa, would automate billing for Plutonium’s large customer base; however, once implemented, Gateway had thousands of corrupt accounts that needed to be resolved in order to improve the system’s data integrity. Jonathan, Plutonium’s operations manager, was tasked to fix these corrupt accounts. After six to nine months, Jonathan noticed that his top and most trusted performer on the task, Chris, was acting suspiciously and had recently acquired several high dollar electronic items. Unbeknownst to Jonathan, Chris was committing employee fraud right under his nose.…

    • 1449 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Throughout this semester of Paideia, I have read several books in which one or more of the characters know the truth about a certain matter and the others do not. The characters that know the truth then have to decide what to do with the truth. Do they keep it to themselves or share it with others? When both options have advantages and disadvantages, the person who has to make the choice is in a tough spot. This scenario has happened in two separate readings this semester: one in The Return of Martin Guerre and the other in The Allegory of the Cave. Using those two texts, I will be able to provide evidence that knowing the truth sometimes involves personal consequences or obligations.…

    • 1539 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    If I had the opportunity to advise Gregg Steinhafel and Target on actions to take to better handle a crisis like the cyber attack they experienced in 2013 I would focus on policy and training development. It seemed alarming to me that a CEO and his top executives disagreed on the best strategy and moved forward without reaching a consensus (Kinicki, 2016). Discrepancies between team members, especially at such a high level, would indicate to me an inconsistent or poorly established culture. Identifying the company's actual values and goals is imperative to then detail the ethical standards, proper course of action, appropriate communications, and resulting training (LeClair, 2000). Establishing these policies would lead to standard expectations in behavior and choices, and uniform culture (LeClair, 2000).…

    • 422 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    H. Explains the process that people use to manage the relationship between concealing and revealing private information…

    • 898 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This novel uncovers how deceitful and reliable a person can be. It shows that you really can’t trust anyone entirely no matter how charismatic, charming or trustworthy you may think they…

    • 329 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Despite the fact that there are numerous state and federal reporting agencies, an incredible amount of businesses and regular personal computer users do not report incidents. Among businesses, specifically, ninety percent of cyber crime goes unreported while only two percent of those that are reported end in a conviction. Because businesses have so much of the population 's personal information, and their validity depends on the consumer 's ability to depend on and trust the business, the businesses find a larger risk in revealing that their computer systems are susceptible breaching than the actual loss from a cyber attack. Succinctly, the economic loss from consumer 's mistrust would create a financial loss more damaging than the cyber attack…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    2. R, Riva. (2011). What to Do If Your Business Gets Hacked. Available: http://businessonmain.msn.com/browseresources/articles/onlinebusiness.aspx?cp-documentid=31726409#fbid=vputcsjXLR_?comments. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    What would you recommend to the CEO given your analysis of his approach thus far…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Police Brutality

    • 2788 Words
    • 12 Pages

    obtain a confession). This is a very effective way to get a confession out of…

    • 2788 Words
    • 12 Pages
    Powerful Essays

Related Topics