2. Presented to
Mr. A.T.M. Jakaria Khan
Course Instructor
Management Information
Systems
Presented by
Group – 26
Fableeha Bushra Choudhury
RH-19
Saad Ashraf ZR-40
Section A
BBA Batch 20
Institute of Business Administration
University of Dhaka
Date
4. Case overview
Hacker hunters: New breed of crime fighters that track down
on internet criminals
ShadowCrew: Cybercrime group equivalent to an “eBay for the
underworld”
Operation Firewall: Took down the cybercrime group
ShadowCrew
6. Case focus
Role of online service
providers (OSP)
Importance of virtual
identity
Need for central
agencies
7. Case focus
1. Role of online service providers (osp)
OSPs consist of Internet service provider, email provider, news
provider (press), entertainment provider (music, movies), search,
e-shopping site (online stores), e-finance or e-banking site, e-
health site, e-government site, Wikipedia, or Usenet
They store enormous amounts of data which can lead to damage
of reputation and loss of business if security is breached
Example: iCloud
8. Case focus
2. Importance of Virtual identity
An interface between the physical person and virtual person
other users see on their computer screen
Virtual Social World vs. Virtual Financial World
9. Case focus
3. Need for central agencies
Surging number of cybercrime incidents
78% increase in cost of cybercrime from 2006 to 2013
Extent of cybercrime networks
New dimension of police ethics
11. Question 1
What types of technology could big retailers
use to prevent identity thieves from purchasing
merchandise?
12. Identity theft is the forging of someone’s identity for the
purpose of fraud
Two types of purchases that can be made with stolen
identities:
1. Online theft and online purchase
2. Physical theft and physical purchase
13. Steps to prevent online purchases:
Requirement of a login pin and a purchase pin
Biometric verification such as a voice signature or a
fingerprint taken by a bluetooth device
Asking for verification codes that are on the back of
credit cards
14. Steps to prevent physical purchases:
Requirement of signature or fingerprint over certain
amount of purchases
Photo identification
-Policies for protection of customer pictures to
prevent misuse. Example: No access without warrants
-Erase all data from cameras to prevent data buildup
15. Question 2
What can organizations do to protect
themselves from hackers looking to steal
account data?
16. Set up information security policies and information
security plans
Restrict access to only those necessary
-Content filtering
-Encryption
Require passwords that
-Are longer (10 characters or more)
-Contain capital letters
-Contain small letters
-Contain numerical characters
-Contain special characters
Invest in a higher quality firewall and security settings
17. Question 3
Do you think it Is ethical for authorities to tap
an online service provider and read people’s e-
mail? Why or why not?
18. Unethical because it may lead to:
Incorrect suspicions and wrongful convictions
Bad repercussions for people who did not commit any
crime
Racial profiling
19. But necessary because:
The potential damage that can be done is enormous
The extent of crime networks is vast
20. Question 4
Do you think it was ethical for authorities to
use one of the high-ranking officials to trap
other gang members? Why or why not?
21. Ethical because:
ShadoCrew was a known criminal organization
It was necessary to build a case and find witnesses to
take down the organization
It is a traditional method for taking down criminal
organizations
23. Monitoring credit report
Keeping track of bank and credit card records
Not volunteering any private information via
email
Shred any paperwork with personal
information
Never using a credit card on a non-secure site
Using a password with characteristics described
before