Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Key Logger Scam, Case Study Example
Hire a Writer for Custom Case Study
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Computer based crimes are on the rise. Technological advancements and automation of services has brought about numerous advantages as well as limitations. For each technology created or implemented, it appears like there is a subsequent anti-operations program that is put in place. Despite the numerous computer crimes that the society, especially the financial institutions faces, there are measures that are put in place to curb or control the rate at which these crimes are committed.
One of the possible ways to ensure that the security systems of these programs are not interfered with is through thorough review and checking before installation. Before an institution embarks on a changeover strategy, it is necessary to ensure that the program is properly checked and diagnosed for any possible leakages. Any details that might provide the key loggers with hints relating to the passwords should be altered. The system should then be properly tested to compare its safety levels with the then operating program. Full installation of the program should only follow once all the testing and debugging has been done.
The tests conducted to these systems may however reveal 100% efficiency levels, but we still end up going through the same computer crimes as before. What this implies is that there is no full guarantee that the program security is provided. To control any possible crimes related to this, there should be security systems that respond to attempted crimes in a given system or institution. The government can put in place restrictions and penalties against those found guilty of the crimes. This can be done in order to reduce the level at which the crimes are committed. Levying heavy penalties on the criminals will help control the levels of computer crimes.
The other possible measured that the financial institutions can out in place to prevent these crimes is through education and training of the personnel. Some of the crimes usually arise from the use of restricted sites by the employees.
When the employees of institutions click on certain links that are created by the criminals, there may arise a situation whereby the criminals are in a position to access the vital information of the institution. Proper training would therefore limit the possibility of being faced with such crimes.
In the London case, where the criminals attempted to transfer $420 from a London branch of Japanese bank, the technique applied was password cracking. Through the use of Key loggers the criminals were in a position to get access to some of the key passwords to the bank system. The information that was obtained from the key logger programs was used to access some of the most important and restricted data areas, including access codes that were private the banking top managerial staff. This gave the criminals directs access to the bank information that led to the attempted crime.
It is also possible that the criminals also used session hijacking through the internet to enable them get into important accounts of the bank. A combination of these two techniques must have led to successful log in to the private accounts of the bank. These are some of the top most methods that the criminals always use in accessing private information from the banks. Recent crimes related to the same have been witnesses in various regions of the world. It has still been realized that password cracking is still the main method that is usually employed.
There are numerous measures that exist in order to control cybercrimes. One of these is the use of strong passwords or user ID. This should be frequently reviewed and changed to limit the extent to which the key logger programs can access the passwords. It may be able to detect the password, but in changing this password again and again, successful hacking may be limited.
The other technique that exists in controlling computer cries is securing the system through the installation and renewal of active firewalls, anti-viruses, and blocking spyware attacks. This would also limit the extent to which the systems are secured. Other measures include being social media savvy, securing mobile devices, installing latest operating system updates, data protection, securing wireless networks, protecting the e-identity, avoiding being scammed, and calling relevant qualified persons for help. These methods could have been effective if all had been implemented in the London case, especially the one of constantly changing the access codes. The probability of getting to access the data of the bank would have been limited.
Case Study
Other than the example of the attempted London crime, it has been reported that there was recently a cyber-crime ting that targeted US bank accounts. This followed charges put against three foreigners- a Russian, a Latvian and a Romanian. They were accused of creating and distributing a computer program that infected more than 40, 000 workstations in the United States. This was aimed at stealing customers’ bank account numbers and other information. It was known as the Gozi virus led to theft of unspecified millions of dollars according to court documents. Measures put did not bear substantial success in preventing the crimes.
References
Broadhurst, R. G., & Grabosky, P. N. (2005). Cyber-crime: The challenge in Asia. Hong Kong;[Great Britain: Hong Kong University Press.
E-Week (2013). Police Foil $420 Million Keylogger Scam From http://www.eweek.com/c/a/Security/Police-Foil-420-Million-Keylogger-Scam/
Los Angel’s Crimes (2013) URL: http://articles.latimes.com/2013/jan/23/business/la-fi-mo-cybercrime-ring-targeted-us-bank-accounts-feds-say-20130123
Vaughan, D. (1985). Controlling unlawful organizational behavior: Social structure and corporate misconduct. Chicago: University of Chicago Press.
Stuck with your Case Study?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee