Free Essay

Two Hacker

In:

Submitted By lovemextasy1
Words 906
Pages 4
Case Study 2

Closing Case Two “Two Hacker Hunters”

1. What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?
There are couple thing that would help big retailers from identity thieves. One thing is the authentication and authorization technologies such as biometrics. Another way is detection multiple transactions from different location. There should be a red flag if unusually large order or purchases in a short time. Last, retailers could notify the customer directly if they found unusual transaction and verify with the real customer if they truly buying something big.

2. What can organizations do to protect themselves from hackers looking to steal account data?
Organizations can protect themselves from hackers by installing antivirus software for early detection and response. Have a content filtering, encryption and firewall. They must also have security people safeguarding against insiders or worker from stealing customer and clients information.

3. Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people’s email? Why or why not?
I personally don’t believe authorities have the right to go inside other people personal email to track down hackers. That mean we are losing our right of freedom. This is like spying on the very law abiding citizen’s personal space. I believe privacy is the right to be left alone and if the authorities want to look inside other email, data, etc., they should of first ask for permission. I don’t mind if they look into mind because I have nothing to hide. Also, law-abiding people should not be afraid if they don’t do anything wrong.

4. Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?
If it means to catch criminal and gang bangers, then I think it is ethical to do so. However, if the authorities become unethical then I think it is 100% wrong because who is innocent and who is the true criminal that breaking the law. I don’t believe catching small fry would help. They should only catch and prosecute the big timer.

5. In a team, research the internet and find the best ways to protect yourself from identity theft.
There is no guarantee to protect myself from identity theft because my credit card information and social security use often in this hectic world. Every time I purchase something over the internet or outside store, I have to punch in my credit card numbers and information. How can I trust big corporation and retailer from collecting my information and selling it to the government or someone else? Facebook is an example of collecting their member’s information and selling to other people and the governments. But safeguarding my information is one way to deter identity thieves. I check my bank account regularly to see any unusual transaction and notify the bank right away. This is detecting suspicious activity. I don’t give away any information over the phone and online unless I have too. http://www.consumer.gov/idtheft/

Closing Case Two “Turning Ewaste into Gold”

1. Why would the Olympics benefit from creating a strong environmental MIS infrastructure?
One benefit I could think of from MIS infrastructure with the Olympics is that it creates a strong infrastructure that reaches worldwide standards. A strong environmental waste would let the world know that country hosting the Olympics is doing their part for clean energy and clean environment. The MIS would take part in providing information and data for the people to manage the Olympics.

2. How can the Olympics help support ethical ewaste initiatives?
Olympics could give a helping hand by informing and showing the world that recycling is the right path for the future. Each country hosting the Olympic should inform their citizen to do their job by going green. Being ethical initiatives to save our planet from un-wanting waste and recycle pile of hazardous materials that could and would affect our children future. The Olympic need to do their part as a role model; this is for other to see, so other could follow.

3. Why would a sporting event like the Olympics be concerned with reducing its carbon footprint?
They are concerned because of the environmental groups. Some environmentalists are asking the Olympic to lower carbon emissions as much as possible. It would give a good reputation and making history all at the same time. Environmentalist and pressure groups insist that the Olympic does not prevent any harm to the environment.

4. What could the Olympics do to help shed light on global environmental MIS issues?
They could open up asking the world help out going green and being green initiative. They could also start recycling and reducing carbon emission so other could follow suit.

5. How could Moore’s Law enable future Olympic medals to be made from more ewaste?
Moore’s Law is the prediction number of transistors on a chip would double every 18 months. He later revised to every two years. By the early 21st century, the number of transistors on a typical memory chip had gone beyond 1 billion. With this staggering number of transistors, the Olympic could use recycle transistor into the medal medallion they giving away to the Olympic people. This could transform the recycle trend of metal into other useable objects.

Similar Documents

Free Essay

Hacking

...• 1960s – MIT AI Lab – Ken Thompson invented UNIX – Positive Meaning • 1980s – Cyberspace coined – 414s arrested – Two hacker groups formed – 2600 published • 2001 – In one of the biggest denial-of-service attack, hackers launched attacks against eBay, Yahoo!, CNN.com., Amazon and others. • 2007 – Bank hit by “biggest ever” hack. Swedish Bank, Nordea recorded nearly $1 Million has been stolen in three months from 250 customer account. Types of hackers Knowledge based: • Coders • Admins • Script kiddies Legality based: • Black hat hacker • White hat hacker • Grey hat hacker Script Kiddies: – who use scripts or programs developed by others to attack computer systems and networks and deface websites.[ Phreak – Person who breaks into telecommunications systems to [commit] theft Cyber Punk – Recent mutation of … the hacker, cracker, and phreak White hat hacker who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems. Black hat hacker A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat. Gray hat hacker A grey hat, in the hacking community, refers to a skilled hacker whose activities fall somewhere between white and black hat hackers on a variety of spectra Ethical hacking • It is Legal • Permission is obtained from the target • Part of an overall security...

Words: 383 - Pages: 2

Free Essay

Software

... HACKING SECRETS REVEALED Production of  S&C Enterprises T able of Contents Disclaimer Introduction i Trojans Joiners ICQ CHAPTER 1 1 Chapter 6 Access Granted CHAPTER 2 1 15 18 18 19 19 19 19 CHAPTER 7 42 43 44 45 49 55 59 Bank Account Information Email Pictures Resume Survellance Via Internet Connection 36 37 39 39 39 40 29 34 34 System Intrusion in 15 Seconds The Trojan Horse The Hack NewsGroups Grapevine Email Un-Safe Websites IRC ChatSites CHAPTER 3 20 20 Acceptable Files Readme & Text Files How To protect Yourself Firewalls Antivirus Software Tips & Tricks Protecting Shared Resources Disabling File and Printer Sharing Oh No My system's Infected Chapter 4 Who are Hackers Anarchist Hackers Hackers Crackers 24 24 25 26 Chapter 8 Every Systems Greatest Flaw Chapter 9 How to Report Hackers 65 60 Chapter 5 Tools of the Trade Portscanners 27 28 Chapter 10 Final Words 74 DISCLAIMER The authors of this manual will like to express our concerns about the misuse of the information contained in this manual. By purchasing this manual you agree to the following stipulations. Any actions and or activities related to the material contained within this manual is solely your responsibility. The misuse of the information in this manual can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this manual to break the law. (Note...

Words: 11585 - Pages: 47

Premium Essay

Ethical Hacking

...networking 11. Learn diassembler language (its the most basic language for understanding machine language and very useful to ubderstand when anything is disassembled and decoded) 12. Learn to use a Unix os. (a Unix system is generally loaded with networking tools as well as a few hacking tools) 13. Learn how to use Exploits and compile them. (Perl and c++ is must) ETHICAL HACKER Traditionally, a Hacker is someone who likes to play with Software or Electronic Systems. Hackers enjoy Exploring and Learning how Computer systems operate. They love discovering new ways to work electronically. Hacker is a word that has two meanings: 1-Recently, Hacker has taken on a new meaning someone who maliciously breaks into systems for personal gain. 2-Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious Intentions An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing...

Words: 2587 - Pages: 11

Premium Essay

Hacker

...Hacking Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it. Abstract Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects. Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found. The society response to hacking attacks lacks till this moment the ability to stop or completely prevent attacks from happening because as long as security tools are developed, more sophisticated hacking attacks are invented. That’s why we should start to think about hacker’s psychology as the main way to prevent and stop attacks by understanding their needs or desires. Introduction The Oxford English Dictionary defines hacking as “cut or chop roughly; mangle: cut (one’s way)”… to its present definition as “gain unauthorized access (to data in a computer)”. Banks (1997:11) defines hacking as “something that boring mainframe computer operators did to improve performance and battle boredom.” Here banks focuses on boredom as the reason of hacking. A more technical definition of hacking according...

Words: 4368 - Pages: 18

Free Essay

Chemistry

...White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they...

Words: 4683 - Pages: 19

Premium Essay

Issc 342

...Week 2 Assignment 6/13/16 EBay Cyber Attack It seems that no one and many companies are not safe any longer while on the internet numerous companies have been targeted by hackers as of late. One of these such global companies is EBay it was targeted between February and March of 2014. Hackers targeted EBay and were able to find loopholes in which information was able to be stolen from the global giant. Email addresses, birthdays, passwords physical addresses and phone numbers were some of the things stolen from the website. The company said that it did not find any issues with finances such as credit card information was not compromised during the attack. On the day that the attack happened stocks fell on the New York Stock Exchange down to 3.2 percent. EBay was not able to find out exactly how many accounts were compromised at the time of the attack and the aftermath of it. Hackers were able to get into the network through hacked employee accounts that allowed access into the network. EBay did not noticed this until two weeks after the attack actually took place. PayPal accounts that were linked to the accounts that were compromised were not breached in the attack. The police and many security analysts assisted in finding out more information about the attack and just how the hackers were able to get into the employee accounts. EBay recommended to the members of the site to change passwords immediately and verify PayPal. Information as soon as possible. During this attack...

Words: 639 - Pages: 3

Premium Essay

Ethical Hacking

...Jade McKinney Mrs. Kidd ITE 119-08 October 26, 2014 Ethical Hacking Ethical hacking is used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker works passed the system security to detect the vulnerabilities or weak points of a company’s network. Then this type of information is used to improve the company’s network from the bad hackers who exploit the company in a destructive way. In 1960s, U.S military began testing their own IT systems, but when Dan Farmer a security expert from San Francisco and a security programmer at the Netherlands University of Eindhoven had posted the techniques they used to gather information to the Usenet, that could have compromised the security of a number of target networks(Langely). Their goal was to raise the overall level of security on the internet. Dan farmer and Eindhoven were elected to share their work freely on the internet for others to learn. Eventually, they gather up the work they used and developed a program called Security Analysis Tool for Auditing Networks (Langely). This tool is used to perform an audit of the vulnerabilities of the system and how to eliminate the problem. The concept of ethical hacking started emerging in 1993 (Langely). According to some, ethical hacking does not exist and they feel hacking is just hacking, no matter how you put it. Therefore the one that is doing the hacking is a computer criminal. This is not the...

Words: 589 - Pages: 3

Premium Essay

Layout Design

...Automation Automation is the use of machines, control systems and information technologies to optimize productivity in the production of goods and delivery of services. The correct incentive for applying automation is to increase productivity, and/or quality beyond that possible with current human labor levels so as to realize economies of scale, and/or realize predictable quality levels. In the scope of industrialisation, automation is a step beyond mechanization. Whereas mechanization provides human operators with machinery to assist them with the muscular requirements of work, automation greatly decreases the need for human sensory and mental requirements while increasing load capacity, speed, and repeatability. Automation plays an increasingly important role in the world economy and in daily experience. Automation has had a notable impact in a wide range of industries beyond manufacturing (where it began). Once-ubiquitous telephone operators have been replaced largely by automated telephone switchboards and answering machines. Medical processes such as primary screening in electrocardiography or radiography and laboratory analysis of human genes, sera, cells, and tissues are carried out at much greater speed and accuracy by automated systems. Automated teller machines have reduced the need for bank visits to obtain cash and carry out transactions. In general, automation has been responsible for the shift in the world economy from industrial jobs to service jobs in the 20th...

Words: 1182 - Pages: 5

Premium Essay

Hacking

...Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type of cyber crime, a study showing that nearly 90% of attacks happen on the inside [1] raising concerns of how easy it is to be working on the inside to be able to infiltrate attacks. Has ethical hacking finally...

Words: 3982 - Pages: 16

Free Essay

Hackers: Scourge of the Internet, or Information Superhero?

...Hackers: Scourge of the Internet, or Information Superhero? Kyle Gonzalez ITT Technical Institute Introduction “And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencys is sought... a bored is found.” – Hackers Manifesto It can be seen all over the news. Visa and PayPal taken offline by hackers, Sony’s PlayStation Network brought to its knees, a cyber defense contractor named Stratfor had its servers hacked and corporate emails leaked. Everything that people know about hacking can be summed up in news articles written by the uninformed. Hacking is bad, and there is no arguing that… Or is there? Most of what people know of hacking comes from the news or Hollywood movies such as Hackers and Swordfish. What they see is only one facet of this fascinating, yet misunderstood world. Hacking is not the evil act that some make it out to be. Hacking can also be a good thing. Enter the White Hat, or Ethical Hackers. These are the network security professionals in which no movies are based. Ethical hacking is used to help analyze networks for security flaws, stop attacks in progress and help keep companies in compliance with government regulations such as PCI or SOX. What is Ethical Hacking? Ethical hacking sounds like an oxymoron, but it does exist and is a very handsomely paying career field. The average ethical hacker can make anywhere...

Words: 2096 - Pages: 9

Free Essay

Computer Ethics

...computer network without their knowledge or permission. There are several different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various cellular phones. For this process to work the phone that is targeted to be hacked must be able to support JSR-82, this is the official Java Bluetooth Application Programming Interface. The best way to prevent your phone from being hacked using a bluetooth is to set your bluetooth security level to Security Level 3. In this mode an authorization and authentication is required in order to be used. Hackers comes in all different forms. Most of them are college students, mobsters, vandals, protesters, corporate spies, and even journalist. (Dysart, 2011). White hat hacking is when a person hacks or breaks security to test their own security. White hat hackers...

Words: 1560 - Pages: 7

Premium Essay

Network Security and Ethical Hacking

...security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper management” Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network) as the two go hand in hand. It is possible to not only have an attack from the Internet but also internally. The moment any form of computer device becomes network capable or dependent of some form of network function, there is a given need for protection to safeguard the flow of information to and from the said device on a given network whether public or private and/or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for someone or a team to administrate this. Eventually you would reach a point where it becomes impossible for the end-user to work due to the security practices in place. There has to be a fine balance between the two whilst still safeguarding the network and the information it contains. This section of the report will delve into “Security Principles” and will hopefully produce a thorough guide as to the best practice based on time availability, finance constraints and knowledge within the company to fulfil this...

Words: 5261 - Pages: 22

Free Essay

The World of Cybercrimes

...by the Pomemon Institute states that 83 percent of multinational companies feel that within the past 12 months they have been a target of a cybercrime. Price Water House Coopers states that the number of businesses having a security breach is more along the lines of 92 percent. Cybercrimes are attacks on computer hardware and software, downloading illegal movies and music, online fraud involving financial crimes and corruption with an organization, crimes against children and the elderly, cyber bullying and fraudulent telemarketing events for charitable donations. What was once something only “hackers” did is now something anyone can do. The term hacker was originally described as “any technical effort to manipulate the normal behavior of network connections and connected systems.” The managing director of Accenture’s security practice, Alastair MacWillson, notes that hackers have changed a lot over the past decade. What was a crime with little to no victimization simply to prove their worth and ability has now become a crime whereas there are many different types of victims. Some...

Words: 8856 - Pages: 36

Premium Essay

Target Attack Case Study

...Assignment How was target attacked? Target gave access to third party retailer Fazio Mechanical services to access its network but did not take measures to properly secure that access to the systems handling sensitive data. They did not follow proper network segmentation to protect cardholder data. Hackers compromised the third party vendor Fazio Mechanical Services which is refrigeration contractor works for target at many locations. Hackers sent phishing email containing malware to one of the employees of Fazio, which allowed citadel which is password stealing bot program to be installed on the computer. They stole the login credentials which was the first step to access the target network. Fazio Mechanical Services did not had appropriate...

Words: 466 - Pages: 2

Free Essay

Home Networking

...Computer Memory Hacking Professor Dima Salman February 15, 2015 Hackers was a term associated with computer programmers and geeks or intellectual people, mostly men exploring the advancement of technology. Hacking of memory is illegally accessing a computer for malicious gain. The hacker’s dictionary refer to hacking as unauthorized access to computer systems, either for fun or for malicious or fraudulent purposes (Hutchison, 2011). Technology is evolving on a daily basis. The need to protect your computer is at an all-time high. With the right tools, breaking into a computer’s encrypted data is very easy. Princeton did a study of low level tech hackers can access the most well protected computer (Roberton, 2008). The most popular tools the hackers use are Back door remote administrative programs and Denial of Service (DoS) Back door remote works through an uploaded exe file on a website that seems to be trusted. This software is usually spread between pcs. The infected pc communicates with someone via email at a work computer. The infected pc infects the work pc and the virus spread. This is similar to the situation at JP Morgan Chase. The hackers where able to get through via an employee. The FBI is involved because as the writers says the attempted hacking should have stopped but they believe other holes in the system were left unprotected (Goldstein, 2014). The type of breach at Chase was a simple backdoor process which gained the hacker’s access to approximately...

Words: 1203 - Pages: 5