Case Study.docx

While conficker and similar malware are not meant for

  • No School
  • AA 1
  • 7

This preview shows page 3 - 5 out of 7 pages.

longevity. While Conficker and similar malware are not meant for data theft, they infect the system, propagate, considerably hamper commands and eventually garble data. In most cases, it multiplies its appearance into many files, it engulfs the recycle bin and becomes more difficult to locate. In enumerates data and hampers operation. It has been noted that, “as a final step, it will perform a dictionary attack using a predefined password list on these accounts.” 1 The malware further opens up the system for more malware attacks. Payday loans system holds the key organizational assets. The core organizational asset is information document in form of customer profiles. Such include names, addresses, transaction statements, lending, and borrowing history. The information is vital and confidential as it consists of financial and personal data. For Payday Loans, codes distortion, account numbers enumeration, the multiplicity of names or addresses are more likely in the event of Conficker, and similar malware attack. 2 As much the as the information may not leak to a third party, Conficker and similar malware attack would spell discrepancies and inaccuracy of data between 1 Jai Vijayan, "Conficker: The Worm That Won't Die", Dark Reading, Last modified 2017, . Para. 13 2 Phillip Porras, Hassen Saidi and Vinod Yegneswaran, "An Analysis Of Conficker", Usenix.Org, Last modified 2009, .
Image of page 3

Subscribe to view the full document.

the company and the customers. In line with the Delphi Method, the malware attack would quantitatively translate into wrong lending and borrowing statements sent to the wrong customers – which would lead to loss of customers. Qualitatively Payday Loans may lose its reputation and further attract legal complaints as a result of info discrepancies: All that would amount to a loss of business and possibly a closure. Security Programs Every organization subscribes to policy statements that define high-level statements of security goals. The statements are designed by the IT teams to ensure the data security is a collective responsibility. For Payday Loans, both the customer and the company have the responsibility to avoid scenarios that can open up security gaps. Payday Loans subscribes to Federal Trade Consumer information that encompasses key areas such as regulating unsolicited calls or emails, understanding online data security policy and reporting identity theft. That includes the physical security of hardware and software. 3 The following are some of the most urgent threats that the above security statements are meant to cover. The most likely threats encompass wrong lending
Image of page 4
Image of page 5

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern