Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Chapter 9 - 1 problem (10 points) Identify the specific computer fraud and abuse technique used in each the following actual examples of computer wrongdoing.

image text in transcribed
Chapter 9 - 1" problem (10 points) Identify the specific computer fraud and abuse technique used in each the following actual examples of computer wrongdoing. Your answer should be the specific type of fraud. (Do NOT give the general categories of hacking, social engineering, or malware) Description of Fraud Name of Fraud and Abuse Technique a. Daniel Baas was the systems administrator for a company that did business with Acxiom, who manages customer information for companies. Baas exceeded his authorized access and downloaded a file with 300 encrypted passwords, decrypted the password file, and downloaded Acxiom customer files containing personal information. The intrusion cost Acxiom more than $5.8 million b. Cyber-attacks left high-profile sites such as Amazon.com, eBay, Buy.com, and CNN Interactive staggering under the weight of tens of thousands of bogus messages that tied up the retail sites computers and slowed the news site's operations for hours c. Susan Gilmour-Latham got a call asking why she was sending the caller multiple adult text messages per day. Her account records proved the calls were not coming from her phone. Neither she nor her mobile company could explain how the messages were sent After finding no way to block the unsavory messages, she changed her mobile number to avoid further embarrassment by association d. A federal grand jury in Fort Lauderdale claimed that four executives of a rental car franchise modified a computer-billing program to add five gallons to the actual gas tank capacity of their vehicles. Over three years, 47.000 customers who retumed a car without topping it off ended up paying an extra $2 to SIS for gasoline e. MicroPatent, an intellectual property firm, was notified that their proprietary information would be broadcast on the Internet if they did not pay a S17 million fee. The hacker/blackmailer was caught by the FBI before any damage was done

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting And Auditing Practices In Africa

Authors: Mariaan Roos, Lesley Stainbank

1st Edition

1928357431, 978-1928357438

More Books

Students also viewed these Accounting questions