This letter relates to the neutralization theory in which the hacker or hackers know it’s morally wrong to breach an organization’s servers. However, the information is of value, and it incentivizes hackers to stop at nothing to obtain the desired data. Since the platform provider for glasswasherparts.com found out about the breach in November, the chances that the denial of victim has been employed is highly likely. Thus, it took some time for the platform provider to discover a breach and will eventually find the vulnerability that has opened this organization to a data breach.
Additionally, this letter may relate to the personality theory of openness in which the intruder is likely to be curious about the information stored on the organization’s servers. Thus, the intruder only has knowledge about exploiting vulnerabilities and skillfully placing malware on the victim’s servers. By placing malware on the organization’s servers, the intruder or intruders were able to breach the security measures to learn about the information stored on the servers.
With regards to economics, payment information was shared with the organization in exchange for a product or service. Furthermore, the payment information of customers was most likely stored in a database where that information can be retrieved in the event a customer wants to make a purchase without having to pull out the credit card on every transaction. By saving the customers’ payment information, this creates convenience, but that information is stored online where hackers are trying to exploit vulnerabilities to steal that information. Thus, this letter is most likely related to the Classical economic theory.
Lastly, the Laissez-fare economic theory is used in which the platform provider for this organization has contacted federal law enforcement and is willing to cooperate as required. Since the threat actors have access to personal identifiable information like the customer’s first and last name, address and phone number, these customers are no longer promised privacy as compromised information can be bought and sold by other cyber criminals that make way for identity theft. Thus, it makes sense to involve federal authorities to intervene due to stolen personal identifiable information and to reduce the impacts of this event.