exercise #2 - rjs5125

exercise #2 - rjs5125 - IST 454 Exercise #2 rjs5125...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
IST 454 Exercise #2 rjs5125 10/13/2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The first video was Robert Muller talking about cyber threats. He starts by saying “The Internet has thrown wide the windows of the world, allowing us to learn and communicate and conduct business in ways that were unimaginable 20 years ago. The Internet has created virtual doors into our lives, our finances, our businesses, and our national security. Criminals, spies, and terrorists are testing our doorknobs every day, looking for a way in.” He explained how Cyber crime is a nebulous concept and that too little attention has been paid to cyber threats. Intruders are reaching into our networks every day, looking for valuable information. Most of us assume we will not be targets of cyber crime. He explained the he had received an e-mail purporting to be from his bank. It turned out to be a classic Internet “phishing” scam. He is someone who spends a good deal of his professional life warning others about the perils of cyber crime. He further told hoe in July 2008, a California oil and gas company contacted the FBI and the Long Beach Police to report a computer attack. Six computer servers had been rendered inoperable, disabling the critical leak-detection systems on three offshore oil platforms. Cyber cases can have costly, and potentially deadly, consequences. Whenever an intruder opens a door to a network, there is a clear risk to individual privacy and intellectual property. Economic and national security disasters are also a huge problem. Cliff Stoll, a systems manager at a Berkeley laboratory had tracked an unauthorized user who had repeatedly broken into the system and then used the lab’s computers to tap into military networks. He eventually traced the attacks to a German hacker who was part of an espionage ring. He explains that at the start of a cyber investigation, they do not know whether they are dealing with a spy, a company insider, or an organized criminal group. Cyber threats present a unique challenge to law enforcement because they have a tendency to compartmentalize their investigations. Criminal cases are usually kept separate from espionage cases, which in turn are kept separate from counter-terrorism cases. However, when it comes to cyber threats, there is usually some overlap. The FBI is both a law enforcement and national security agency, which means they must address every angle of a cyber case. What may start as a criminal investigation may lead to a national security threat. 2
Background image of page 2
A group of cyber criminals orchestrated a highly sophisticated attack on a major financial institution. Hackers found their way into the network of this institution, and altered data to allow them to increase the funds available for a number of accounts. They also stole account data and created duplicate ATM cards.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

exercise #2 - rjs5125 - IST 454 Exercise #2 rjs5125...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online