Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Key Logger Scam, Case Study Example

Pages: 3

Words: 889

Case Study

Computer based crimes are on the rise. Technological advancements and automation of services has brought about numerous advantages as well as limitations. For each technology created or implemented, it appears like there is a subsequent anti-operations program that is put in place. Despite the numerous computer crimes that the society, especially the financial institutions faces, there are measures that are put in place to curb or control the rate at which these crimes are committed.

One of the possible ways to ensure that the security systems of these programs are not interfered with is through thorough review and checking before installation. Before an institution embarks on a changeover strategy, it is necessary to ensure that the program is properly checked and diagnosed for any possible leakages. Any details that might provide the key loggers with hints relating to the passwords should be altered. The system should then be properly tested to compare its safety levels with the then operating program. Full installation of the program should only follow once all the testing and debugging has been done.

The tests conducted to these systems may however reveal 100% efficiency levels, but we still end up going through the same computer crimes as before. What this implies is that there is no full guarantee that the program security is provided. To control any possible crimes related to this, there should be security systems that respond to attempted crimes in a given system or institution. The government can put in place restrictions and penalties against those found guilty of the crimes. This can be done in order to reduce the level at which the crimes are committed. Levying heavy penalties on the criminals will help control the levels of computer crimes.

The other possible measured that the financial institutions can out in place to prevent these crimes is through education and training of the personnel. Some of the crimes usually arise from the use of restricted sites by the employees.

When the employees of institutions click on certain links that are created by the criminals, there may arise a situation whereby the criminals are in a position to access the vital information of the institution. Proper training would therefore limit the possibility of being faced with such crimes.

In the London case, where the criminals attempted to transfer $420 from a London branch of Japanese bank, the technique applied was password cracking. Through the use of Key loggers the criminals were in a position to get access to some of the key passwords to the bank system. The information that was obtained from the key logger programs was used to access some of the most important and restricted data areas, including access codes that were private the banking top managerial staff. This gave the criminals directs access to the bank information that led to the attempted crime.

It is also possible that the criminals also used session hijacking through the internet to enable them get into important accounts of the bank. A combination of these two techniques must have led to successful log in to the private accounts of the bank. These are some of the top most methods that the criminals always use in accessing private information from the banks. Recent crimes related to the same have been witnesses in various regions of the world. It has still been realized that password cracking is still the main method that is usually employed.

There are numerous measures that exist in order to control cybercrimes. One of these is the use of strong passwords or user ID. This should be frequently reviewed and changed to limit the extent to which the key logger programs can access the passwords. It may be able to detect the password, but in changing this password again and again, successful hacking may be limited.

The other technique that exists in controlling computer cries is securing the system through the installation and renewal of active firewalls, anti-viruses, and blocking spyware attacks. This would also limit the extent to which the systems are secured. Other measures include being social media savvy, securing mobile devices, installing latest operating system updates, data protection, securing wireless networks, protecting the e-identity,  avoiding being scammed, and calling relevant qualified persons for help. These methods could have been effective if all had been implemented in the London case, especially the one of constantly changing the access codes. The probability of getting to access the data of the bank would have been limited.

Case Study

Other than the example of the attempted London crime, it has been reported that there was recently a cyber-crime ting that targeted US bank accounts. This followed charges put against three foreigners- a Russian, a Latvian and a Romanian. They were accused of creating and distributing a computer program that infected more than 40, 000 workstations in the United States. This was aimed at stealing customers’ bank account numbers and other information. It was known as the Gozi virus led to theft of unspecified millions of dollars according to court documents. Measures put did not bear substantial success in preventing the crimes.

References

Broadhurst, R. G., & Grabosky, P. N. (2005). Cyber-crime: The challenge in Asia. Hong Kong;[Great Britain: Hong Kong University Press.

E-Week (2013). Police Foil $420 Million Keylogger Scam From   http://www.eweek.com/c/a/Security/Police-Foil-420-Million-Keylogger-Scam/

Los Angel’s Crimes (2013) URL: http://articles.latimes.com/2013/jan/23/business/la-fi-mo-cybercrime-ring-targeted-us-bank-accounts-feds-say-20130123

Vaughan, D. (1985). Controlling unlawful organizational behavior: Social structure and corporate misconduct. Chicago: University of Chicago Press.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Case Study Samples & Examples

New York Times Co. v. U.S., 403 U.S. 713 (1971), Case Study Example

Orders of Certiorari were granted in the case where the United States sought to enjoin the New York Times Co. and the Washington Post, from [...]

Pages: 2

Words: 603

Case Study

Guillain-Barre Syndrome, Case Study Example

Source (Full Citation): Level of Evidence: Findings: Relationship to Case: Hughes, R.A., Wijdicks, E.F., Benson, E., Cornblath, D.R., Hahn, A.F., Meythaler,  J.M., Sladky JT, Barohn, [...]

Pages: 6

Words: 1521

Case Study

Netflix: They Smartly Care, Case Study Example

Abstract Netflix began as a monthly DVD shipping subscription company via the internet but today increases its e-commerce through instant streaming  and downloadable rental videos [...]

Pages: 8

Words: 2176

Case Study

Mass Public Shooting’s Effects on Community Identity, Case Study Example

Purpose The purpose of this study is to investigate the effects of a mass public shooting on the development of a community’s unity and oneness. [...]

Pages: 1

Words: 177

Case Study

Module 2: Functions, Case Study Example

Answer the following questions and if required to do calculations please show your work: 1.  What is a function? A function is a relation of x to [...]

Pages: 3

Words: 832

Case Study

Apple’s Organizational Context, Case Study Example

Introduction In the simplest terms, context is understood as the environment or background in which an organization is based and operates in. The setting or [...]

Pages: 7

Words: 1888

Case Study

New York Times Co. v. U.S., 403 U.S. 713 (1971), Case Study Example

Orders of Certiorari were granted in the case where the United States sought to enjoin the New York Times Co. and the Washington Post, from [...]

Pages: 2

Words: 603

Case Study

Guillain-Barre Syndrome, Case Study Example

Source (Full Citation): Level of Evidence: Findings: Relationship to Case: Hughes, R.A., Wijdicks, E.F., Benson, E., Cornblath, D.R., Hahn, A.F., Meythaler,  J.M., Sladky JT, Barohn, [...]

Pages: 6

Words: 1521

Case Study

Netflix: They Smartly Care, Case Study Example

Abstract Netflix began as a monthly DVD shipping subscription company via the internet but today increases its e-commerce through instant streaming  and downloadable rental videos [...]

Pages: 8

Words: 2176

Case Study

Mass Public Shooting’s Effects on Community Identity, Case Study Example

Purpose The purpose of this study is to investigate the effects of a mass public shooting on the development of a community’s unity and oneness. [...]

Pages: 1

Words: 177

Case Study

Module 2: Functions, Case Study Example

Answer the following questions and if required to do calculations please show your work: 1.  What is a function? A function is a relation of x to [...]

Pages: 3

Words: 832

Case Study

Apple’s Organizational Context, Case Study Example

Introduction In the simplest terms, context is understood as the environment or background in which an organization is based and operates in. The setting or [...]

Pages: 7

Words: 1888

Case Study

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!