Kelogger Scam Police Foil 420 Million Keylogger Case Study

PAGES
3
WORDS
961
Cite

Kelogger Scam Police Foil $420 Million Keylogger Scam

Measures to deter these types of crimes

Categorize the type of modern attack(s) or computer crime(s)

Technologies to deter the threat

Summary of similar success stories

Measuresto deterthese types of crimes:

The white color and computer crimes can be tacked using sophisticated measures and appropriate controls. The cyber security is notably related to the virtual control of the computing services and IT infrastructure but at the same time it also requires that that the physical premises and controls are also in place. The effectiveness of IT infrastructure and security measures requires any institution including the financial services providers to act in accordance with the legal requirements. The security policy of the corporation should incorporate physical and virtual measures of control. In case of keylogger scam it is observed that the act is not possible only through an outsider's job. It required an inside access along with the loose external IT security controls.

The government, enterprises, and individuals should ensure that the IT policy is developed and implemented. After implementing the IT security policy it should also be regularly audited and the flaws should be removed. Along with the passage of time it is required to update the system according to the latest requirements and security threats. The periodic audit of the IT infrastructure will enable the system to be updated and respond to the latest threats of security breach. The personnel...

...

The attack used to capture information about the usernames and passwords. The attack used was the attempt to gain access to the classified information that is later used to transfer money form the bank accounts. The Keylogger attacks can be made through hardware and software installation. These are two unique ways to access information from the victim computers. The software keyloggers are a part of the system that is related to the spyware. The hardware keyloggers are based on the physical attachments and requires inspection in order to detect. The popular and most common keylogger is the keyghost. It resides between the keyboard connector and the computer. The attackers access the information form the keyloggers through retrieving them form the victims and installing on their own system. Then information is accessed and key sequences are denoted. The hardware surveillance is essential along with the software updating of the antivirus systems. The agreement offered by various software services provides enables the users to place high value for the ports and these values are later used to access the information stored in the computer. Spyware is used to continuously access the information and in combination with the keylogger it provides access to the classified information such as…

Sources Used in Documents:

References:

Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. USA: Elsevier.

Easttom, C., Taylor, J., & Hurley, H. (2010). Computer crime, investigation, and the law.USA: Cengage Learning.

Graves, K. (2007). CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50. USA: John Wiley and Sons Inc.

Holz, T., Engelberth, M., & Freiling, F. (2009). Learning more about the underground economy: A case-study of keyloggers and dropzones (pp. 1-18).Springer Berlin Heidelberg.


Cite this Document:

"Kelogger Scam Police Foil 420 Million Keylogger" (2013, July 21) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/kelogger-scam-police-foil-420-million-keylogger-97644

"Kelogger Scam Police Foil 420 Million Keylogger" 21 July 2013. Web.20 April. 2024. <
https://www.paperdue.com/essay/kelogger-scam-police-foil-420-million-keylogger-97644>

"Kelogger Scam Police Foil 420 Million Keylogger", 21 July 2013, Accessed.20 April. 2024,
https://www.paperdue.com/essay/kelogger-scam-police-foil-420-million-keylogger-97644

Related Documents

Port Security "Describe the framework for Managing and Leading a Security Force." Management is a "process of working with and through individuals and groups and other resources to accomplish organizational goals." ( Christopher, 2009 P. 180). The central challenges within the port security management is the ability to effectively manage changing worker's demand, government and legal requirement as well as managing the issue of workforce diversity. Thus, port security must develop a

Port Security Collaborations between port security and enforcement operations Port security is the defense, law as well as treaty enforcement to counter terrorism activities that are within a port or even a maritime domain. This is inclusive of seaports protection, the inspection and protection of cargo that are moving through ports as well as maritime security. Enforcement operations on the other hand enforce immigrations laws within a nation in a manner that

Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a

Thirdly, it will be a challenge in ensuring that there is coordination and cooperation from all the stakeholders. Hecter explains that achieving the much-needed cooperation is not easy as anticipated by many. There are many conflicts of interests deterring from working towards a common objective. There is no port in the United States that is similar to another in all regards. However, most of them have similarities that make them

Assessment, however, has proven far easier than implementation. A large part of the problem in implementing security measures has been the conflicts and simple lack of organization that exist between the many different interests and operators involved in any given port. In the near-decade since the passage of the Homeland Security Act, port control for many ports has become more standardized both federally and internationally (Beisecker 2006). Perhaps this is

International Ship and Port Security (Isps) Code on Maritime Security Impact of the International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security