Date post: | 12-Jul-2015 |
Category: |
Business |
Upload: | fableeha-choudhury |
View: | 266 times |
Download: | 0 times |
HACKER
HUNTERS
Presented toMr. A.T.M. Jakaria Khan
Course Instructor
Management Information
Systems
Presented byGroup – 26
Fableeha Bushra Choudhury
RH-19
Saad Ashraf ZR-40
Section A
BBA Batch 20Institute of Business Administration
University of Dhaka
Date
Case overview
Case overview
Hacker hunters: New breed of crime fighters that track down
on internet criminals
ShadowCrew: Cybercrime group equivalent to an “eBay for the
underworld”
Operation Firewall: Took down the cybercrime group
ShadowCrew
Case focus
Case focusRole of online service
providers (OSP)
Importance of virtual identity
Need for central agencies
Case focus
1. Role of online service providers (osp)
OSPs consist of Internet service provider, email provider, news provider (press), entertainment provider (music, movies), search, e-shopping site (online stores), e-finance or e-banking site, e-health site, e-government site, Wikipedia, or Usenet
They store enormous amounts of data which can lead to damage of reputation and loss of business if security is breached
Example: iCloud
Case focus
2. Importance of Virtual identity
An interface between the physical person and virtual person other users see on their computer screen
Virtual Social World vs. Virtual Financial World
Case focus
3. Need for central agencies
Surging number of cybercrime incidents 78% increase in cost of cybercrime from 2006 to 2013 Extent of cybercrime networks New dimension of police ethics
Answers to case
questions
Question 1
What types of technology could big retailers
use to prevent identity thieves from purchasing
merchandise?
Identity theft is the forging of someone’s identity for the purpose of fraud
Two types of purchases that can be made with stolen identities:1. Online theft and online purchase2. Physical theft and physical purchase
Steps to prevent online purchases:
Requirement of a login pin and a purchase pin Biometric verification such as a voice signature or a
fingerprint taken by a bluetooth device Asking for verification codes that are on the back of
credit cards
Steps to prevent physical purchases:
Requirement of signature or fingerprint over certain amount of purchases
Photo identification-Policies for protection of customer pictures to prevent misuse. Example: No access without warrants-Erase all data from cameras to prevent data buildup
Question 2
What can organizations do to protect
themselves from hackers looking to steal
account data?
Set up information security policies and information
security plans Restrict access to only those necessary
-Content filtering-Encryption
Require passwords that -Are longer (10 characters or more)-Contain capital letters-Contain small letters-Contain numerical characters-Contain special characters
Invest in a higher quality firewall and security settings
Question 3
Do you think it Is ethical for authorities to tap
an online service provider and read people’s e-
mail? Why or why not?
Unethical because it may lead to:
Incorrect suspicions and wrongful convictions Bad repercussions for people who did not commit any
crime Racial profiling
But necessary because:
The potential damage that can be done is enormous The extent of crime networks is vast
Question 4
Do you think it was ethical for authorities to
use one of the high-ranking officials to trap
other gang members? Why or why not?
Ethical because:
ShadoCrew was a known criminal organization It was necessary to build a case and find witnesses to
take down the organization It is a traditional method for taking down criminal
organizations
Question 5
Find the best ways to protect yourself from
identity theft
Monitoring credit report Keeping track of bank and credit card records Not volunteering any private information via
email Shred any paperwork with personal
information Never using a credit card on a non-secure site Using a password with characteristics described
before
Thank you