exercise #2 - rjs5125 - IST 454 Exercise#2 rjs5125 The...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
IST 454 Exercise #2 rjs5125 10/13/2010
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
The first video was Robert Muller talking about cyber threats. He starts by saying “The Internet has thrown wide the windows of the world, allowing us to learn and communicate and conduct business in ways that were unimaginable 20 years ago. The Internet has created virtual doors into our lives, our finances, our businesses, and our national security. Criminals, spies, and terrorists are testing our doorknobs every day, looking for a way in.” He explained how Cyber crime is a nebulous concept and that too little attention has been paid to cyber threats. Intruders are reaching into our networks every day, looking for valuable information. Most of us assume we will not be targets of cyber crime. He explained the he had received an e-mail purporting to be from his bank. It turned out to be a classic Internet “phishing” scam. He is someone who spends a good deal of his professional life warning others about the perils of cyber crime. He further told hoe in July 2008, a California oil and gas company contacted the FBI and the Long Beach Police to report a computer attack. Six computer servers had been rendered inoperable, disabling the critical leak-detection systems on three offshore oil platforms. Cyber cases can have costly, and potentially deadly, consequences. Whenever an intruder opens a door to a network, there is a clear risk to individual privacy and intellectual property. Economic and national security disasters are also a huge problem. Cliff Stoll, a systems manager at a Berkeley laboratory had tracked an unauthorized user who had repeatedly broken into the system and then used the lab’s computers to tap into military networks. He eventually traced the attacks to a German hacker who was part of an espionage ring. He explains that at the start of a cyber investigation, they do not know whether they are dealing with a spy, a company insider, or an organized criminal group. Cyber threats present a unique challenge to law enforcement because they have a tendency to compartmentalize their investigations. Criminal cases are usually kept separate from espionage cases, which in turn are kept separate from counter-terrorism cases. However, when it comes to cyber threats, there is usually some overlap. The FBI is both a law enforcement and national security agency, which means they must address every angle of a cyber case. What may start as a criminal investigation may lead to a national security threat. 2
Image of page 2
A group of cyber criminals orchestrated a highly sophisticated attack on a major financial institution. Hackers found their way into the network of this institution, and altered data to allow them to increase the funds available for a number of accounts. They also stole account data and created duplicate ATM cards.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern