Sunday 3 February 2013

Discuss briefly TWO(2) TYPES of active threats Creatively and Innovatively.

Assalamualaikum...

This time, I would like to explain to you all about the active threats. As this is our project topics for week 6. First of all, the active threats was a method that an individual might use to perpetrate an information system fraud. Active threats consists of a few methods such as input manipulation, program alteration, direct-file alteration, data theft, sabotage and misappropriation or theft of information resources. So, for this topic, I choose to explain about the data theft and misappropriation or theft of information resources.

     1. DATA THEFT

    • Theft of important data is a serious problem in business today. In many highly competitive industries, both quantitative and qualitative information about one's competitors is constantly being sought. The courts have long upheld that data stored in a company's computers are private and cannot be used without the company's permission. A considerable amount of information is transmitted between companies via the internet. This information is vulnerable to theft while en route. It may be intercepted or tapped. It also may be possible to steal an optical disk or diskette by smuggling it out of the firm in the pocket or briefcase. Further, individuals with access to e-mail simply might copy or attach proprietary information and then transmit it out over the internet. Using this method, a perpetrator could steal very large amounts of information in only a few minutes time.



     2. MISAPPROPRIATION OR THEFT OF INFORMATION RESOURCES
    • One type of misappropriation of information resources exists when employees use company computer's resources for their own business. For example, five employees were accused of using their employer's mainframe computer during slack hours to operate their own data processing firm. The employees used the computer so heavily that their employer almost inadvertently upgraded the system to keep up their demand.
    • To extent of this problem, like others type of computer fraud, is not well known. However, it is very likely that this problem occurs to some degree in many companies. For an example, several employees stole their company's mainframe computer over a period of days, smuggling it out the back door a piece at a time.





VIDEO
# data theft prevention story

# trade secrets and theft of information resources

Briefly explain TWO(2) TYPES of INTRUDERS Creatively and Innovatively

Assalamualaikum and hye everyone!

For this topic, as u can see that our lecturer, Sir Noreffendy asked us to explain two types of intruders. As we know, INTRUDERS were a persons who accesses equipment, electronic data, or files without proper authorization. Besides that, intruders who attack information system for fun and challenge are known as HACKERS.






There were also a few types of intruders such as unnoticed intruders, wiretappers, piggybackers, impersonating intruders and eavesdroppers. But for this topic, i will only explain to u just two types of intruders that is piggybackers and eavesdroppers.


     1. PIGGYBACKERS
    • It was the most sophisticated type of wire tapping is called piggybacking. With this method, the penetrator intercepts legitimate information and substitutes fraudulent information in its place.





     2. EAVESDROPPERS
    • Was a Standard Cathode-ray tubes (CRTs) that used in common video display units emit electromagnetic interference (EMI) on a frequency capable of being picked up by an ordinary television set. Wim Van Eck, a Dutch electronics researcher, proved to a number of banks that it was possible to read the information on their CRTs almost a mile away using an ordinary television, a directional antenna, and an external sync generator. Anyone with this equipment can monitor sensitive information as it appears on the company's CRTs. Any information that passes through any public communication network is vulnerable to eavesdropping and piggybacking. For example, simply removing one wire from a Tandy (Radio Shack) scanner will allow one to monitor analog cellular telephone communications. There are clubs of individuals who make a regular habit of recording telephone conversations involving celebrities and public figures.






VIDEO

# this video shows us how to identify the piggybackers.

# eavesdropping on bluetooth handset.