AllFreePapers.com - All Free Papers and Essays for All Students
Search

Hacker Case

Autor:   •  November 3, 2013  •  Essay  •  1,012 Words (5 Pages)  •  1,039 Views

Page 1 of 5

This is a distributed denial of service attack. That means that a hacker is trying to make her customer service website unavailable to our customers. If that happens of course we can do business online.

How does it happen

we get flooded with so many things from other services that all of our legitimate traffic was lost in the mess our customers probably saw a webpage not available screen and did not know what's happening.

When the backup site I put together a while ago I think I can pull the faults request into going there while running the actual human traffic to our real site I don't know if the work but I'll figure something out.

Other general cyber crimes, cyber bullying, cyber stalking, piracy, or other drug trafficking

cyber bullying: is where someone harasses someone online to the point where the victim is seriously suffering. We are talking about an occasional joke about a friend but real harassment. Maybe they" messages are spread rumors on a blog or create a Facebook page talking about what a horrible person the victim is. A bully might be up a kid physically but I can also beat them up emotionally and mentally online by cyber bullying. With social networking sites being all the rage it's far too common for this kind of thing to occur.

Cyber stalking: is where someone tries to find out personal information about someone else online. Basically most information about us is stored somewhere on the Internet. You can put anyone's name into Google and see whatever news there is about them. However cyber stalking is a is deeper than that it's more excessive. It can lead to harassment or even fraud and identity theft.

Piracy: is where someone is illegally downloading and distributing copyrighted data online. Usually this means music movies or TV shows. It's really common but it still theft. Now as a bank we don't have movies or music steel but we do have a policy that permits employees from committing piracy at work we have filters on the firewall to prevent certain types of data from coming through to the bank systems which helps a lot. However there have been people who have lost their jobs for violating the policy is a very serious liability issue for the bank.

Drug trafficking: basically people use the Internet to arrange drug deals. This can happen through email or chat services that often use coded messages.

phising: is where the criminal tries to steal personal information with the intent to use it for their own benefit. There are a lot of ways that this can happen and they don't all involve a computer. For example people tend to be naturally trusting of someone who they perceive to be in a position of authority. For example let's say a criminal poses as a member of your own IT staff and call the customer up saying 'there's a problem with your account

...

Download as:   txt (5.6 Kb)   pdf (86.4 Kb)   docx (12.1 Kb)  
Continue for 4 more pages »