SlideShare une entreprise Scribd logo
1  sur  24
HACKER
HUNTERS
Presented to
Mr. A.T.M. Jakaria Khan
Course Instructor
Management Information
Systems
Presented by
Group – 26
Fableeha Bushra Choudhury
RH-19
Saad Ashraf ZR-40
Section A
BBA Batch 20
Institute of Business Administration
University of Dhaka
Date
Case overview
Case overview
Hacker hunters: New breed of crime fighters that track down
on internet criminals
ShadowCrew: Cybercrime group equivalent to an “eBay for the
underworld”
Operation Firewall: Took down the cybercrime group
ShadowCrew
Case focus
Case focus
Role of online service
providers (OSP)
Importance of virtual
identity
Need for central
agencies
Case focus
1. Role of online service providers (osp)
 OSPs consist of Internet service provider, email provider, news
provider (press), entertainment provider (music, movies), search,
e-shopping site (online stores), e-finance or e-banking site, e-
health site, e-government site, Wikipedia, or Usenet
 They store enormous amounts of data which can lead to damage
of reputation and loss of business if security is breached
 Example: iCloud
Case focus
2. Importance of Virtual identity
 An interface between the physical person and virtual person
other users see on their computer screen
 Virtual Social World vs. Virtual Financial World
Case focus
3. Need for central agencies
 Surging number of cybercrime incidents
 78% increase in cost of cybercrime from 2006 to 2013
 Extent of cybercrime networks
 New dimension of police ethics
Answers to case
questions
Question 1
What types of technology could big retailers
use to prevent identity thieves from purchasing
merchandise?
Identity theft is the forging of someone’s identity for the
purpose of fraud
Two types of purchases that can be made with stolen
identities:
1. Online theft and online purchase
2. Physical theft and physical purchase
Steps to prevent online purchases:
 Requirement of a login pin and a purchase pin
 Biometric verification such as a voice signature or a
fingerprint taken by a bluetooth device
 Asking for verification codes that are on the back of
credit cards
Steps to prevent physical purchases:
 Requirement of signature or fingerprint over certain
amount of purchases
 Photo identification
-Policies for protection of customer pictures to
prevent misuse. Example: No access without warrants
-Erase all data from cameras to prevent data buildup
Question 2
What can organizations do to protect
themselves from hackers looking to steal
account data?
 Set up information security policies and information
security plans
 Restrict access to only those necessary
-Content filtering
-Encryption
 Require passwords that
-Are longer (10 characters or more)
-Contain capital letters
-Contain small letters
-Contain numerical characters
-Contain special characters
 Invest in a higher quality firewall and security settings
Question 3
Do you think it Is ethical for authorities to tap
an online service provider and read people’s e-
mail? Why or why not?
Unethical because it may lead to:
 Incorrect suspicions and wrongful convictions
 Bad repercussions for people who did not commit any
crime
 Racial profiling
But necessary because:
 The potential damage that can be done is enormous
 The extent of crime networks is vast
Question 4
Do you think it was ethical for authorities to
use one of the high-ranking officials to trap
other gang members? Why or why not?
Ethical because:
 ShadoCrew was a known criminal organization
 It was necessary to build a case and find witnesses to
take down the organization
 It is a traditional method for taking down criminal
organizations
Question 5
Find the best ways to protect yourself from
identity theft
 Monitoring credit report
 Keeping track of bank and credit card records
 Not volunteering any private information via
email
 Shred any paperwork with personal
information
 Never using a credit card on a non-secure site
 Using a password with characteristics described
before
Thank you

Contenu connexe

Tendances

Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereum
nurhaniffah1
 

Tendances (20)

Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Sql Injection
Sql InjectionSql Injection
Sql Injection
 
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı TespitiMitre ATT&CK Kullanarak Etkin Saldırı Tespiti
Mitre ATT&CK Kullanarak Etkin Saldırı Tespiti
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Digital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereumDigital Certificate Verification based on blockchain ethereum
Digital Certificate Verification based on blockchain ethereum
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security Vulnerabilities
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
SQL Injection attack
SQL Injection attackSQL Injection attack
SQL Injection attack
 
Information security
Information security Information security
Information security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 

En vedette (7)

Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Case study Research
Case study Research Case study Research
Case study Research
 
Growth Hacking Belgium (kick-off)
Growth Hacking Belgium (kick-off)Growth Hacking Belgium (kick-off)
Growth Hacking Belgium (kick-off)
 
Closing case ups
Closing case upsClosing case ups
Closing case ups
 
Cybercrime in nowadays businesses - A real case study of targeted attack
Cybercrime in nowadays businesses - A real case study of targeted attackCybercrime in nowadays businesses - A real case study of targeted attack
Cybercrime in nowadays businesses - A real case study of targeted attack
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similaire à Hacker Hunters Case Study

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 

Similaire à Hacker Hunters Case Study (20)

Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Cyber security
Cyber securityCyber security
Cyber security
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15Cybersecurity Presentation 6-11-15
Cybersecurity Presentation 6-11-15
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
India Legal 17 June 2019
India Legal 17 June 2019India Legal 17 June 2019
India Legal 17 June 2019
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 

Dernier

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Dernier (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

Hacker Hunters Case Study

  • 2. Presented to Mr. A.T.M. Jakaria Khan Course Instructor Management Information Systems Presented by Group – 26 Fableeha Bushra Choudhury RH-19 Saad Ashraf ZR-40 Section A BBA Batch 20 Institute of Business Administration University of Dhaka Date
  • 4. Case overview Hacker hunters: New breed of crime fighters that track down on internet criminals ShadowCrew: Cybercrime group equivalent to an “eBay for the underworld” Operation Firewall: Took down the cybercrime group ShadowCrew
  • 6. Case focus Role of online service providers (OSP) Importance of virtual identity Need for central agencies
  • 7. Case focus 1. Role of online service providers (osp)  OSPs consist of Internet service provider, email provider, news provider (press), entertainment provider (music, movies), search, e-shopping site (online stores), e-finance or e-banking site, e- health site, e-government site, Wikipedia, or Usenet  They store enormous amounts of data which can lead to damage of reputation and loss of business if security is breached  Example: iCloud
  • 8. Case focus 2. Importance of Virtual identity  An interface between the physical person and virtual person other users see on their computer screen  Virtual Social World vs. Virtual Financial World
  • 9. Case focus 3. Need for central agencies  Surging number of cybercrime incidents  78% increase in cost of cybercrime from 2006 to 2013  Extent of cybercrime networks  New dimension of police ethics
  • 11. Question 1 What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?
  • 12. Identity theft is the forging of someone’s identity for the purpose of fraud Two types of purchases that can be made with stolen identities: 1. Online theft and online purchase 2. Physical theft and physical purchase
  • 13. Steps to prevent online purchases:  Requirement of a login pin and a purchase pin  Biometric verification such as a voice signature or a fingerprint taken by a bluetooth device  Asking for verification codes that are on the back of credit cards
  • 14. Steps to prevent physical purchases:  Requirement of signature or fingerprint over certain amount of purchases  Photo identification -Policies for protection of customer pictures to prevent misuse. Example: No access without warrants -Erase all data from cameras to prevent data buildup
  • 15. Question 2 What can organizations do to protect themselves from hackers looking to steal account data?
  • 16.  Set up information security policies and information security plans  Restrict access to only those necessary -Content filtering -Encryption  Require passwords that -Are longer (10 characters or more) -Contain capital letters -Contain small letters -Contain numerical characters -Contain special characters  Invest in a higher quality firewall and security settings
  • 17. Question 3 Do you think it Is ethical for authorities to tap an online service provider and read people’s e- mail? Why or why not?
  • 18. Unethical because it may lead to:  Incorrect suspicions and wrongful convictions  Bad repercussions for people who did not commit any crime  Racial profiling
  • 19. But necessary because:  The potential damage that can be done is enormous  The extent of crime networks is vast
  • 20. Question 4 Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?
  • 21. Ethical because:  ShadoCrew was a known criminal organization  It was necessary to build a case and find witnesses to take down the organization  It is a traditional method for taking down criminal organizations
  • 22. Question 5 Find the best ways to protect yourself from identity theft
  • 23.  Monitoring credit report  Keeping track of bank and credit card records  Not volunteering any private information via email  Shred any paperwork with personal information  Never using a credit card on a non-secure site  Using a password with characteristics described before