Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Identify the computer fraud and abuse technique used in each of the following actual examples of computer wrongdoing. a . A teenage gang known as
Identify the computer fraud and abuse technique used in each of the following actual examples of computer wrongdoing.
aA teenage gang known as the s broke into the Los Alamos National Laboratory, SloanKettering Cancer Center, and Security Pacific Bank. One gang member appeared in Newsweek with the caption Beware: Hackers at play.
bDaniel Baas was the systems administrator for a company that did business with Acxiom, who manages customer information for companies. Baas exceeded his authorized access and downloaded a file with encrypted passwords, decrypted the password file, and downloaded Acxiom customer files containing personal information. The intrusion cost Acxiom more than $ million.
cCyberattacks left highprofile sites such as Amazon.com, eBay, Buy.com, and CNN Interactive staggering under the weight of tens of thousands of bogus messages that tied up the retail sites computers and slowed the news sites operations for hours.
dSusan GilmourLatham got a call asking why she was sending the caller multiple adult text messages per day. Her account records proved the calls were not coming from her phone. Neither she nor her mobile company could explain how the messages were sent. After finding no way to block the unsavory messages, she changed her mobile number to avoid further embarrassment by association.
eA federal grand jury in Fort Lauderdale claimed that four executives of a rentalcar franchise modified a computerbilling program to add five gallons to the actual gas tank capacity of their vehicles. Over three years, customers who returned a car without topping it off ended up paying an extra $ to $ for gasoline.
fA mailorder company programmer truncated odd cents in salescommission accounts and placed them in the last record in the commission file. Accounts were processed alphabetically, and he created a dummy salescommission account using the name of Zwana. Three years later, the holders of the first and last salescommission accounts were honored. Zwana was unmasked and his creator fired.
gMicroPatent, an intellectual property firm, was notified that their proprietary information would be broadcast on the Internet if they did not pay a $ million fee. The hacker was caught by the FBI before any damage was done.
hWhen Estonia removed a Russian World War II war memorial, Estonian government and bank networks were knocked offline in a distributed DoS attack by Russian hackers. A counterfeit letter of apology for removing the memorial statue was placed on the website of Estonias prime minister.
ieBay customers were notified by email that their accounts had been compromised and were being restricted unless they reregistered using an accompanying hyperlink to a web page that had eBays logo home page design, and internal links. The form had a place for them to enter their credit card data, ATM PINs, Social Security number, date of birth, and their mothers maiden name. Unfortunately, eBay hadnt sent the email.
jA teenager hijacked the eBay.de domain name and several months later the domain name for a large New York ISP. Both hijacked websites pointed to a site in Australia.
kTravelers who logged into the Alpharetta, Georgia, airports Internet service had personal information stolen and picked up as many as viruses. A hacker had set up a rogue wireless network with the same name as the airports wireless access network.
lCriminals in Russia used a vulnerability in Microsofts server software to add a few lines of Java code to users copies of Internet Explorer. The code recorded the users keyboard activities, giving the criminals access to usernames and passwords at many banking websites. The attacks caused $ million in damage.
mAmerica Online subscribers received a message offering free software. Users who opened the attachments unknowingly unleashed a program hidden inside another program that secretly copied the subscribers account name and password and forwarded them to the sender
nRajendrasinh Makwana, an Indian citizen and IT contractor who worked at Fannie Maes Maryland facility, was terminated at : PM on October Before his network access was revoked, he created a program to wipe out all of Fannie Maes servers on the following January
o A man accessed millions of ChoicePoint files by claiming in writing and on the phone to be someone he was not.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started