Access Millions of academic & study documents

After many months of solicitation by your bank’s representative, you

Content type
User Generated
Showing Page:
1/5
After many months of solicitation by your banks
representative, you finally agree to use their online
banking services. One day, you log into your banks
website and are immediately prompted for your drivers
license number, social security number, and other
sensitive information. After a moments hesitation, you
comply and your bank account information is displayed.
Once you finish your transactions, you logoff.
A week later, you receive a phone call from a member of
the banks IT department. She is calling to inform you that
they have just fixed a security breach and that your
information might have been compromised. She explains
that their Internet service provider (ISP) was hacked the
previous week and that requests sent to their server were
redirected to another server located overseas. This hostile
server requested users to enter sensitive information.
Once users complied, the hostile server likely recorded
their information before redirecting them to the banks
server. Before hanging up, she apologizes and assures
you that your money is safe.
A month later, you are visited by detectives who inform you
that there are at least three yous in other states that are
wanted for fraud. After satisfying themselves that you are
not one of the suspects and listening to your explanation of
how your personal information was stolen, they explain
that your information was likely sold on the black market.
You are a victim of identity theft.
To prepare for this Assignment, read the Unit 1 Notes
located in this units Learning Resources before
proceeding.
For this Assignment, write a 5- to 7-page paper that:
Analyzes the motivations behind hacking by tracing the
evolution of hacking from its origins to its current form.
Analyzes the evolution of hacking tools and techniques
with respect to innovation. In other words, how have the

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
bad guys managed to stay ahead of the good guys?
Evaluates the malware life cycle both from a defensive
perspective (i.e., the good guys who patch vulnerabilities
when they become known) and from an offensive
perspective (i.e., the bad guys who find vulnerabilities,
develop exploits, and monetize those exploits). Which
areas have seen great positive progress? Which areas
remain unaddressed?
Evaluates the moral issues faced by white-hat hackers by
contrasting responsible disclosure with full disclosure for
the greater good of society.
Integrate your analyses and evaluations with the
components of the malware life cycle.
Unit 1 Notes
The current state of insecurity is in part due to the
emergence of a market for the trade of stolen electronic
goods. In 2010, the FBI announced that a typical
cybercrime ring consisted of 10 different specializations
ranging from programmers, to techies, to hackers,
fraudsters, cashiers, mules, and of course, leaders
(Chabinsky, 2010). One of the reasons for such diversity of
job duties is that the field of cybercrime has evolved over
time, and people have gotten the chance to specialize. The
maturity level displayed by the underground market for
stolen goods in many ways rivals that of real, open
markets.
Nearly every piece of information has value. For many
years, Symantec has tracked the cost of goods bought and
sold on the black market. In 2008, the most traded items
were credit cards, at just under $5 for a valid U.S. credit
card; however, many other types of goods also were for
sale: $20 for someones full identity (i.e., all of the pieces
of data necessary to perform identity theft), and about five
cents on the dollar for valid bank account credentials
(Symantec, 2009). More disturbing in many ways is the
recent trend of attacks not targeted at financial data (which

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
After many months of solicitation by your bank’s representative, you finally agree to use their online banking services. One day, you log into your bank’s website and are immediately prompted for your driver’s license number, social security number, and other sensitive information. After a moment’s hesitation, you comply and your bank account information is displayed. Once you finish your transactions, you logoff. A week later, you receive a phone call from a member of the bank’s IT department. She is calling to inform you that they have just fixed a security breach and that your information might have been compromised. She explains that their Internet service provider (ISP) was hacked the previous week and that requests sent to their server we re redirected to another server located overseas. This hostile server requested users to enter sensitive information. Once users complied, the hostile server likely recorded their information before redirecting them to the bank’s server. Before hanging up, she apologizes and assures you that your money is safe. A month later, you are visited by detectives who inform you that there are at least three “you’s” in other states that are wanted for fraud. After satisfying themselves that you are not one of the suspects and listening to your explanation of how your personal information was stolen, they explain that your information was likely sold on the black market. You are a victim of identity theft. To prepare for this A ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4