Michael Fiola Case Study: Inadequate Corporate Security Policies

The information suggests that MA DIA made mistakes in providing Fiola with a laptop that was not properly configured, lacked proper security measures, and did not have updated antivirus software. Computer forensics expert Tami Loehrs identified MA DIA’s inadequate security practices in the Michael Fiola Case: “Fiola was handed a laptop that had belonged to a previous user... The laptop was given a new username but changed nothing else. The software that manages the computers was never changed, so the [security] updates weren't being maintained. He was sent out into the field with a laptop that was unprotected” (Aubuchon, 2023). The information suggests that the shortcomings in MA DIA’s IT practices and security policies contributed to the presence of malware and trojans on Fiola's laptop, resulting in the automated, malicious downloading of inappropriate images without Fiola’s knowledge. While MA DIA should be held liable, it is important to recognize that this was a very serious incident that should have been reported to the police. While the MA DIA is responsible for inflicting harm upon Michael for outdated and inadequate security practices, the District Attorney should also be held liable. A simple case that verifies if a virus navigated to inappropriate content should have been resolved in a matter of weeks. This information suggests that the court system took an inappropriate amount of time to resolve this case. During the legal process, the primary focus is on determining the guilt or innocence of the alleged perpetrator through the examination of evidence. Efforts should be made to identify and protect the child victims involved. Locating and identifying minor victims can be challenging and must be treated with care by specially trained investigation teams.


Reference:

Aubuchon, K. (2023). Week 1 | Case Study: Michael Fiola [Course Material]. https://maryville.instructure.com/courses/73142/pages/week-1-%7C-case-study-michael-fiola?module_item_id=6100785


Comments

Popular posts from this blog

SalonAboutBeauty: Less Integration for Consistent Styling Across Components

Why “Human Error” Is Usually a System Design Problem

Challenges in Prosecuting Deep Web and Darknet Crimes: The Case of Ross Ulbricht and the Silk Road