hacker hunters case study

24
HACKER HUNTERS

Upload: fableeha-choudhury

Post on 12-Jul-2015

267 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Hacker Hunters Case Study

HACKER

HUNTERS

Page 2: Hacker Hunters Case Study

Presented toMr. A.T.M. Jakaria Khan

Course Instructor

Management Information

Systems

Presented byGroup – 26

Fableeha Bushra Choudhury

RH-19

Saad Ashraf ZR-40

Section A

BBA Batch 20Institute of Business Administration

University of Dhaka

Date

Page 3: Hacker Hunters Case Study

Case overview

Page 4: Hacker Hunters Case Study

Case overview

Hacker hunters: New breed of crime fighters that track down

on internet criminals

ShadowCrew: Cybercrime group equivalent to an “eBay for the

underworld”

Operation Firewall: Took down the cybercrime group

ShadowCrew

Page 5: Hacker Hunters Case Study

Case focus

Page 6: Hacker Hunters Case Study

Case focusRole of online service

providers (OSP)

Importance of virtual identity

Need for central agencies

Page 7: Hacker Hunters Case Study

Case focus

1. Role of online service providers (osp)

OSPs consist of Internet service provider, email provider, news provider (press), entertainment provider (music, movies), search, e-shopping site (online stores), e-finance or e-banking site, e-health site, e-government site, Wikipedia, or Usenet

They store enormous amounts of data which can lead to damage of reputation and loss of business if security is breached

Example: iCloud

Page 8: Hacker Hunters Case Study

Case focus

2. Importance of Virtual identity

An interface between the physical person and virtual person other users see on their computer screen

Virtual Social World vs. Virtual Financial World

Page 9: Hacker Hunters Case Study

Case focus

3. Need for central agencies

Surging number of cybercrime incidents 78% increase in cost of cybercrime from 2006 to 2013 Extent of cybercrime networks New dimension of police ethics

Page 10: Hacker Hunters Case Study

Answers to case

questions

Page 11: Hacker Hunters Case Study

Question 1

What types of technology could big retailers

use to prevent identity thieves from purchasing

merchandise?

Page 12: Hacker Hunters Case Study

Identity theft is the forging of someone’s identity for the purpose of fraud

Two types of purchases that can be made with stolen identities:1. Online theft and online purchase2. Physical theft and physical purchase

Page 13: Hacker Hunters Case Study

Steps to prevent online purchases:

Requirement of a login pin and a purchase pin Biometric verification such as a voice signature or a

fingerprint taken by a bluetooth device Asking for verification codes that are on the back of

credit cards

Page 14: Hacker Hunters Case Study

Steps to prevent physical purchases:

Requirement of signature or fingerprint over certain amount of purchases

Photo identification-Policies for protection of customer pictures to prevent misuse. Example: No access without warrants-Erase all data from cameras to prevent data buildup

Page 15: Hacker Hunters Case Study

Question 2

What can organizations do to protect

themselves from hackers looking to steal

account data?

Page 16: Hacker Hunters Case Study

Set up information security policies and information

security plans Restrict access to only those necessary

-Content filtering-Encryption

Require passwords that -Are longer (10 characters or more)-Contain capital letters-Contain small letters-Contain numerical characters-Contain special characters

Invest in a higher quality firewall and security settings

Page 17: Hacker Hunters Case Study

Question 3

Do you think it Is ethical for authorities to tap

an online service provider and read people’s e-

mail? Why or why not?

Page 18: Hacker Hunters Case Study

Unethical because it may lead to:

Incorrect suspicions and wrongful convictions Bad repercussions for people who did not commit any

crime Racial profiling

Page 19: Hacker Hunters Case Study

But necessary because:

The potential damage that can be done is enormous The extent of crime networks is vast

Page 20: Hacker Hunters Case Study

Question 4

Do you think it was ethical for authorities to

use one of the high-ranking officials to trap

other gang members? Why or why not?

Page 21: Hacker Hunters Case Study

Ethical because:

ShadoCrew was a known criminal organization It was necessary to build a case and find witnesses to

take down the organization It is a traditional method for taking down criminal

organizations

Page 22: Hacker Hunters Case Study

Question 5

Find the best ways to protect yourself from

identity theft

Page 23: Hacker Hunters Case Study

Monitoring credit report Keeping track of bank and credit card records Not volunteering any private information via

email Shred any paperwork with personal

information Never using a credit card on a non-secure site Using a password with characteristics described

before

Page 24: Hacker Hunters Case Study

Thank you