IT 6 Exercise 1 (Updated)
IT 6 Exercise 1 (Updated)
Fraudsters: Victim/s:
Breach of: E – Current/ Where it PI – Private
Penalty
Article Title/ Press Description of Computer C - Confidentiality Former happened? Individual
Motives of Fraudster/s F – Fine Other Facts of the Case
Release Date Fraud I - Integrity Employee L – Local BE – Business
I – Imprisonment
A - Availability O – Outsider I – International Establishments
S – Syndicate G – Government
On March 15, 2017, the
FBI officially charged the
Hacking 2014 breach to four men,
The Great Yahoo Breach C O Conflict of Interest. I PI, BE, G F
Stealing Identities including two that work for
Russia's Federal Security
Service (FSB).
The attacks were labeled
as Chinese in origin,
Titan Rain
Hacking Political Motives although their precise
Breaking Security C&I S Steal Information for I G N/A nature, e.g., state-
(https://en.wikipedia.org/wi
Code Espionage sponsored espionage, cor
ki/Titan_Rain)
porate espionage, or
random hacker attacks,
Stuxnet has three
modules: a worm that
executes all routines
related to the main
payload of the attack;
a link file that
Stuxnet
Hacking automatically executes the
Breaking Security C&I S Political Motives I G N/A propagated copies of the
(https://en.wikipedia.org/wi
Code worm; and
ki/Stuxnet)
a rootkit component
responsible for hiding all
malicious files and
processes, preventing
detection of the presence
of Stuxnet.
The scope of major
corporations affected is
somewhat mind-
boggling. Krebs on
The Epsilon Breach
Security warned, "Among
Unauthorized Access
C&A O Conflict of Interest I BE N/A Epsilon's clients are three
https://krebsonsecurity.co Trojan Horse
of the top ten U.S. banks
m/tag/epsilon-breach/
– JP Morgan
Chase, Citibank and U.S.
Bank - as well as Barclays
Bank and Capital One.
Nine People Charged in
Largest Known Computer
Five of the nine
Hacking and Securities
defendants were arrested:
Fraud Scheme
Arkadiy Dubovoy, Igor
Dubovoy, Momotok, and
August 11, 2015 Hacking
C, I, & A S Financial Gain I BE I Garkusha were all
Cyber Theft
arrested at their homes in
(https://www.justice.gov/us
Georgia; Korchevsky was
ao-nj/pr/nine-people-
arrested at his home in
charged-largest-known-
Glenn Mills, Pennsylvania.
computer-hacking-and-
securities-fraud-scheme)
Woman to be first charged
under PH cyber crime law She was indicted by a
prosecutor in Las Piñas
June 15, 2015 City and is set to be
Hacking I&A O Financial Gain L BE I charged under the
(https://www.rappler.com/ Philippines’ Cybercrime
nation/60649-woman-first- Prevention Act.
charged-ph-cybercrime-
law)
Lee v. PMSI, Inc
In May 2011 District Judge
Merryday held that Lee's
January 13, 2011
conduct did not exceed
Unauthorized Access A E Conflict of Interest. I BE N/A
authorized access to her
employer's computer in
(https://en.wikipedia.org/wi
violation of the CFAA.
ki/Lee_v._PMSI,_Inc.)
A Hacker is Indicted in
Computer Fraud Case Mr. Mitnick is also wanted
by state and Federal
Unauthorized Access
(https://www.nytimes.com/ I&A O Financial Gain I PI N/A authorities for a parole
Stealing Identities
1995/03/11/business/a- violation in California and
hacker-is-indicted-in- could face charges in
computer-fraud-case.html) other states.
US vs Aaron Swartz
Swartz, at the age of 26,
July 2011 Unauthorized Access committed suicide on 11
Breaking Security I O Conflict of Interest I PI F&I January 2013 No charges
(http://fija.org/document- Code were filed
library/case-info/aaron-
swartz/)
US vs Fidel Salinas
C - Confidentiality
I - Integrity
A - Availability
The evidence from this pie chart shows that the most
interest harmed is integrity in which most of the
fraudsters’ breach the quality of being honest and
moral uprightness. The second interest harmed is
availability wherein fraudster’s took the opportunity of
the information for personal gains. Lastly is the
confidentiality which the fraudsters’ breach the privacy
of their victims.
C. Who are computer fraudsters/ criminals? (Current/ Former
Employees, Outsiders, Syndicate)
From the information shown in this pie
chart, majority of fraudsters’ are Outsiders
E – Current/ Former while there are only few Current/Former
Employee
Employee(s) involved.
O – Outsider
S – Syndicate
Conflict of Interest.
Extortion
Financial Gain
Personal matters
Political Motives
Steal Information for Espionage
Majority of the fraudsters committing these
crimes are for financial gains and conflict of
interest while some are for political motives
and stealing information for espionage.
E. Who are victim/s of computer fraudsters/ criminals?
L – Local
I – International
1. Lack of securities 1. Businesses should have stronger securities specially for the government and corporations. They
2. Lack of management responsibility should have a regular check or scan or monitor to their previous transactions, accounting records and
3. Assets being theft also to their customer’s informations.
4. Exposure of informations 2. To prevent breaches to internal system (such as hackings), some confidential informations should be
5. Irregular monitoring treated as if they were gems of the company and should not be announced to public. Information that
6. Lack of supervision would destroy the company should be also hidden to employees to prevent leakages
7. Conflicts of interest 3. Companies must strengthen their attention regarding the data on their customer sales, information etc
in order to detect such errors and fraud.
4. Companies should establish ethical standards and policies in which they can minimize conflict of
interest between employees, with that, we can avoid fraudulent acts
6. Companies should have a back up activities in every possible situations such as theft of assets,
leakage of informations etc.
7. Companies should publicize their vision as well as mission in order for the customers to understand
their goals in a long run. (to avoid bashers)
REFERENCES
https://www.lbahs.com/blog/bid/397513/10-common-internal-control-deficiencies-found-in-small-
businesses
https://www.bartleby.com/essay/Internal-Control-Weakness-and-Corrective-Actions-F3JCYM43TC
http://smallbusiness.chron.com/weakness-financial-management-internal-controls-66503.html