Hacker Hunters Case Study

Post on 12-Jul-2015

264 views 0 download

Tags:

Transcript of Hacker Hunters Case Study

HACKER

HUNTERS

Presented toMr. A.T.M. Jakaria Khan

Course Instructor

Management Information

Systems

Presented byGroup – 26

Fableeha Bushra Choudhury

RH-19

Saad Ashraf ZR-40

Section A

BBA Batch 20Institute of Business Administration

University of Dhaka

Date

Case overview

Case overview

Hacker hunters: New breed of crime fighters that track down

on internet criminals

ShadowCrew: Cybercrime group equivalent to an “eBay for the

underworld”

Operation Firewall: Took down the cybercrime group

ShadowCrew

Case focus

Case focusRole of online service

providers (OSP)

Importance of virtual identity

Need for central agencies

Case focus

1. Role of online service providers (osp)

OSPs consist of Internet service provider, email provider, news provider (press), entertainment provider (music, movies), search, e-shopping site (online stores), e-finance or e-banking site, e-health site, e-government site, Wikipedia, or Usenet

They store enormous amounts of data which can lead to damage of reputation and loss of business if security is breached

Example: iCloud

Case focus

2. Importance of Virtual identity

An interface between the physical person and virtual person other users see on their computer screen

Virtual Social World vs. Virtual Financial World

Case focus

3. Need for central agencies

Surging number of cybercrime incidents 78% increase in cost of cybercrime from 2006 to 2013 Extent of cybercrime networks New dimension of police ethics

Answers to case

questions

Question 1

What types of technology could big retailers

use to prevent identity thieves from purchasing

merchandise?

Identity theft is the forging of someone’s identity for the purpose of fraud

Two types of purchases that can be made with stolen identities:1. Online theft and online purchase2. Physical theft and physical purchase

Steps to prevent online purchases:

Requirement of a login pin and a purchase pin Biometric verification such as a voice signature or a

fingerprint taken by a bluetooth device Asking for verification codes that are on the back of

credit cards

Steps to prevent physical purchases:

Requirement of signature or fingerprint over certain amount of purchases

Photo identification-Policies for protection of customer pictures to prevent misuse. Example: No access without warrants-Erase all data from cameras to prevent data buildup

Question 2

What can organizations do to protect

themselves from hackers looking to steal

account data?

Set up information security policies and information

security plans Restrict access to only those necessary

-Content filtering-Encryption

Require passwords that -Are longer (10 characters or more)-Contain capital letters-Contain small letters-Contain numerical characters-Contain special characters

Invest in a higher quality firewall and security settings

Question 3

Do you think it Is ethical for authorities to tap

an online service provider and read people’s e-

mail? Why or why not?

Unethical because it may lead to:

Incorrect suspicions and wrongful convictions Bad repercussions for people who did not commit any

crime Racial profiling

But necessary because:

The potential damage that can be done is enormous The extent of crime networks is vast

Question 4

Do you think it was ethical for authorities to

use one of the high-ranking officials to trap

other gang members? Why or why not?

Ethical because:

ShadoCrew was a known criminal organization It was necessary to build a case and find witnesses to

take down the organization It is a traditional method for taking down criminal

organizations

Question 5

Find the best ways to protect yourself from

identity theft

Monitoring credit report Keeping track of bank and credit card records Not volunteering any private information via

email Shred any paperwork with personal

information Never using a credit card on a non-secure site Using a password with characteristics described

before

Thank you