Phishing Attacks

Improved Essays
In “The state of phishing”, Aaron examines phishing attacks conducted by a group called Avalanche in 2009 (2010). He analyzes data from the Global Phishing Survey, published by the Anti-Phishing Working Group (APWG). His analysis of the data reveals that Avalanche attacks started in 2008 and spiked in the first half of 2009, diminishing in the second half of 2009 as Top Level Domain (TLD) registers took down Avalanche domains. He briefly covers how Avalanche combined a malware called Zeus with their phishing attack to steal victims, personal information, intercepting passwords and online transaction information. Aaron covers Automated Clearing House (ACH) systems, an electronic network used for financial transactions commonly used for debit, …show more content…
They utilize surveys with interview requests from the UK and tie that data into Casual Loop Diagrams (CLD) to give the reader a visualization of cause and effect of the effect of cyber-crime on financial institutions. The authors hypothesize from their analysis of the surveys that financial institutions see customer trust and loyalty as a priority. The majority of cost associated with cyber-crime is not influence by the amount successful incidents, but rather how the financial institutions go about dealing with cyber-crimes. Over spending on IT security and underreporting of incidents are mentioned as a possibly increasing the cost of cyber-crime (Lagazio., Sherif, and Cushman, 2014). Though specific monetary losses and specific examples of successful cyber-crimes are not mentioned, the survey results do add value to the theory that cyber-crime is underreported and public image is important to financial industry. This article would be useful for a literature review on the effects of cyber-hacking of US financial institutions/banks on the US …show more content…
He covers various tactics used by IOC groups to take from financial institutions i.e. money laundering, insiders, fraud, high-tech intrusions and interceptions of financial data. Ott then goes on to examine US Department of justice efforts to counter IOC threats. Some examples of these efforts are prioritizing and target the most significant IOC threats, intelligence, foreign partnerships and non-law enforcement measures. This research would be of limited use for a literature review on effects of cyber-hacking of US financial institutions/Banks on the US economy’. The only mention of financial loss to a financial institution is a 2009 case of two Russian citizens who were indicted in New Jersey for running an international scheme, that stole the information from millions of credit and debit cards from five companies, which demonstrates the after effect of the loss of so many card numbers (ott,

Related Documents

  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Target Executive Summary

    • 1564 Words
    • 7 Pages

    In 2013, in the days prior to Black Friday, hackers stole credit card information for millions of Target customers. The hackers set their traps and planned the data’s escape course. They uploaded exfiltration malware to move stolen credit card numbers. To cover their tracks, they first moved the stolen numbers to staging points spread around the United States. The information was then moved into the hackers’ computers in Russia.…

    • 1564 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Did you know that the average cost of a typical data breach is $5.4 million in the United States? A data breach can take a toll on a company of any size and consumers alike, which is why it is so important for both consumers and companies to take necessary precautions to reduce the risk of breaches. Data security breaches have a compound impact on both consumers and businesses. Once data breaches have been detected consumers must find a way to protect their personal information, and businesses have to find a way to recover along with implementing preventative measures and regaining consumer’s trust. Consumers shop with companies under the faith that their personal information will be protected.…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Healthcare Overview This industry is vulnerable in many different facets, the main one being private health information (PHI). This type of information is protected by the Health Insurance Portability and Accountability Act, more commonly known as HIPAA, which sets the national standard for how the information is handled. HIPAA makes it imperative for healthcare organizations to meet these aforementioned standards. PricewaterhouseCoopers (PwC) made cyber security as one of the key issues facing the healthcare industry in 2016.…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Phishing is one of the assaults that have become famous these days. it's far an identity robbery try with the intention to obtain exclusive and private data of people or companies for monetary or other profits. inside the latest component there had been many reports on phishing assault in lots of financial domains such as banking. It has emerge as a severe threat to establishments that deal with monetary transactions. If those threats aren't addressed thoroughly, people can’t trust on-line transactions that contain due authentication through credentials.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    United States cybersecurity is arguably as important, if not more so, than the US Military. The private sector, civilian businesses and personnel, lost more than $1 trillion in 2008 as a result of cyberattacks. The $4.5 million Predator military drone, had its camera feed hacked by a $26 dollar piece of software widely available on the Internet (Marshall,1). Neither the government nor the private sector is immune to security breaches, but which group is better equipped to protect America’s interests?…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Website Deacement Analysis

    • 1102 Words
    • 5 Pages

    Nearly every page has a picture captioned with a real case related to what is being discussed on the page. Also, it discusses the real life damages cybercrimes cause. Many of the cybertheft examples were accompanied by the amount of money that was lost or stolen through the illegal transactions. This helped put the severity of these crimes into perspective. Then, the book provides readers with ways the government has been combating these crimes.…

    • 1102 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Statistically, about 40,000,000 credit cards have ever been accessed by hackers in addition to other 350,000 credit cards which were accessed by a hacker in Neiman Marcus’ Computer system (McCutcheon 1). According to the author, this trend has also been witnessed in government structures where sensitive government information is not longer safe unless very comprehensive protection tools put in place (1). According to the author, recent government reports have indicated that the incidence of online insecurity has increased by 100 percent (doubled) (McCutcheon 1). This led to exposure of customer’s private data after access to company’s information system is breached.…

    • 1133 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Credit cards are becoming truly popular in today 's society; therefore, the avenue for criminals to take advantage is great and more criminals are creating ingenious ways to take a part of this industry. Criminals are awaiting to find a small window to interact and send attacks to business organizations such as retail stores that store consumers ' data into a secure database. Attacks will continue to affect society and organizations are losing billions of dollars trough these types of attacks. Not everyone knows, consumers will eventually cover some of the cost, financial organizations lose on these attacks (Segal et al, 2011).…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The recent computer advancements and Internet technologies have enabled people to conduct financial activities and store personal information on their computers. However, many cyber criminals can conduct hacking activities to access the private information, use the information to harm the victim or achieve financial gains, and this technological trend has caused the rates of identity theft crimes to increase exponentially in the recent years. The identity theft crimes often entail offenders using the information of victims to commit criminal activities or fulfill financial transactions, the victims are often confronted with severe losses and legal complications, and the offenders can be punished with financial penalties or prison sentences. As a result, people should avoid placing private information on risky Internet websites and diligently check their information to maximize the security of their personal data and minimize their vulnerability to becoming victimized by identity…

    • 1439 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    For instance, hackers use online gambling websites to their advantage by creating software to obtain other people’s winnings (Woollaston). The action of hacking shows an example of cybercrime. Criminals also launder money across distant locations through the websites (Pataki). They can do this transition by the poker “money mule” method (Pataki). Pataki illustrates the idea of a money mule as “a person hired by a terror or criminal organization to open a bank account and Internet poker account under a legitimate identity.”…

    • 1211 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays

Related Topics