SlideShare a Scribd company logo
1 of 2
Download to read offline
Identify the computer fraud and abuse technique by:
This computer fraud and abuse technique is called phishing. Its purpose is to get the information
need to commit identity theft. The perpetrator probably also used brand spoofing of Big Bank’s
web site
Actuvally the problem of This case is based on an actual attack. The solution represents the
actual events of the attack and the hospital's response
a. What could the hospital do to stop the attack and contain the damage?
By Monday afternoon, IT figured out which malware the bots were installing and wrote a script,
which was pushed out hourly, directing computers to remove the bad code. The script helped to
slow the bots down a bit.
The problem does not state how the problem was finally fixed. What actually happened is that on
Tuesday the hospital's antivirus vendor figured out which malware the hackers had used to get
into the network and wrote a virus signature that blocked new code from coming in. Together
with the code the internal IT staff wrote, the hospital was able to clean up its computers. All of
the infected computers had to have their hard drives wiped clean and their software reinstalled, at
an estimated cost of $150,000.
b. Which computer fraud and abuse technique did the hackers use in their attack on the
hospital?
The primary attack used was a Zero-day attack that exploited a newly found weakness in
Microsoft’s operating system that did not yet have a patch written to correct the weakness. The
perpetrators hacked into the hospital's network and used various forms of malware, including
adware (pop-up ads) and worms.
c. What steps should the hospital have taken to prevent the damage caused by the attack?
The hospital's network is now protected by Computer Associate's Pest Patrol, which blocks
adware and spyware, and Cisco MARS, an intrusion detection system. Northwest's I.T. staffers
no longer wait for vendors, particularly Microsoft, to certify software patches before applying
fixes—they evaluate and test patches themselves. In the case of the attack, the Windows flaw
that the attack slipped through had not yet been patched on the hospital's PCs. Fortunately, the
hospital's servers escaped the attack because they had been patched
Solution
Identify the computer fraud and abuse technique by:
This computer fraud and abuse technique is called phishing. Its purpose is to get the information
need to commit identity theft. The perpetrator probably also used brand spoofing of Big Bank’s
web site
Actuvally the problem of This case is based on an actual attack. The solution represents the
actual events of the attack and the hospital's response
a. What could the hospital do to stop the attack and contain the damage?
By Monday afternoon, IT figured out which malware the bots were installing and wrote a script,
which was pushed out hourly, directing computers to remove the bad code. The script helped to
slow the bots down a bit.
The problem does not state how the problem was finally fixed. What actually happened is that on
Tuesday the hospital's antivirus vendor figured out which malware the hackers had used to get
into the network and wrote a virus signature that blocked new code from coming in. Together
with the code the internal IT staff wrote, the hospital was able to clean up its computers. All of
the infected computers had to have their hard drives wiped clean and their software reinstalled, at
an estimated cost of $150,000.
b. Which computer fraud and abuse technique did the hackers use in their attack on the
hospital?
The primary attack used was a Zero-day attack that exploited a newly found weakness in
Microsoft’s operating system that did not yet have a patch written to correct the weakness. The
perpetrators hacked into the hospital's network and used various forms of malware, including
adware (pop-up ads) and worms.
c. What steps should the hospital have taken to prevent the damage caused by the attack?
The hospital's network is now protected by Computer Associate's Pest Patrol, which blocks
adware and spyware, and Cisco MARS, an intrusion detection system. Northwest's I.T. staffers
no longer wait for vendors, particularly Microsoft, to certify software patches before applying
fixes—they evaluate and test patches themselves. In the case of the attack, the Windows flaw
that the attack slipped through had not yet been patched on the hospital's PCs. Fortunately, the
hospital's servers escaped the attack because they had been patched

More Related Content

Similar to Identify the computer fraud and abuse technique byThis computer f.pdf

targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
*****Dominic A Ienco
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
audeleypearl
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
monroel
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 

Similar to Identify the computer fraud and abuse technique byThis computer f.pdf (20)

Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 
ID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelersID cuffs: Hackers targeting international travelers
ID cuffs: Hackers targeting international travelers
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
Hancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueHancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent technique
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docxModule 1 Discussion QuestionSearch scholar.google.com for a .docx
Module 1 Discussion QuestionSearch scholar.google.com for a .docx
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
How to Keep Hackers Out of Your Organisation
How to Keep Hackers Out of Your OrganisationHow to Keep Hackers Out of Your Organisation
How to Keep Hackers Out of Your Organisation
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer virus and cyber attack
Computer virus and cyber attackComputer virus and cyber attack
Computer virus and cyber attack
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 

More from venkt12345

To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdfTo insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
venkt12345
 
The physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdfThe physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdf
venkt12345
 
Purpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdfPurpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdf
venkt12345
 
Modern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdfModern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdf
venkt12345
 
Main components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdfMain components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdf
venkt12345
 
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdfINTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
venkt12345
 
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdfimport java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
venkt12345
 
Average.javaimport java.util.Scanner;public class Average{ .pdf
 Average.javaimport java.util.Scanner;public class Average{ .pdf Average.javaimport java.util.Scanner;public class Average{ .pdf
Average.javaimport java.util.Scanner;public class Average{ .pdf
venkt12345
 
The short answer is no. The reason why you cant p.pdf
                     The short answer is no. The reason why you cant p.pdf                     The short answer is no. The reason why you cant p.pdf
The short answer is no. The reason why you cant p.pdf
venkt12345
 
First, lets start with naming binary ionic comp.pdf
                     First, lets start with naming binary ionic comp.pdf                     First, lets start with naming binary ionic comp.pdf
First, lets start with naming binary ionic comp.pdf
venkt12345
 

More from venkt12345 (20)

To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdfTo insert value X into a B-tree, there are 3 stepsIf there are M .pdf
To insert value X into a B-tree, there are 3 stepsIf there are M .pdf
 
The physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdfThe physical protection of knowledge, assets and personnel is key to.pdf
The physical protection of knowledge, assets and personnel is key to.pdf
 
The function has 11 zeros , since the degree of function is 11So.pdf
The function has 11 zeros , since the degree of function is 11So.pdfThe function has 11 zeros , since the degree of function is 11So.pdf
The function has 11 zeros , since the degree of function is 11So.pdf
 
Purpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdfPurpose of cashflow statements are to analyse the different cashflow.pdf
Purpose of cashflow statements are to analyse the different cashflow.pdf
 
O,S as they belong to same groupSolutionO,S as they belong to .pdf
O,S as they belong to same groupSolutionO,S as they belong to .pdfO,S as they belong to same groupSolutionO,S as they belong to .pdf
O,S as they belong to same groupSolutionO,S as they belong to .pdf
 
Modern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdfModern Times is one of the greatest movies in the history of film. T.pdf
Modern Times is one of the greatest movies in the history of film. T.pdf
 
Main components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdfMain components of a computerMultimedia devicesOther peripheral .pdf
Main components of a computerMultimedia devicesOther peripheral .pdf
 
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdfINTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
INTRODUCTION TO COAL MINING INDUSTRYEconomic growth world over is .pdf
 
Include time header file#includetime.hWrite main method like t.pdf
Include time header file#includetime.hWrite main method like t.pdfInclude time header file#includetime.hWrite main method like t.pdf
Include time header file#includetime.hWrite main method like t.pdf
 
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdfimport java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
import java.awt.Color;import java.awt.Insets;import java.awt.Con.pdf
 
Given A fund that starts with a zero balance with time zero. Fund .pdf
Given  A fund that starts with a zero balance with time zero. Fund .pdfGiven  A fund that starts with a zero balance with time zero. Fund .pdf
Given A fund that starts with a zero balance with time zero. Fund .pdf
 
Average.javaimport java.util.Scanner;public class Average{ .pdf
 Average.javaimport java.util.Scanner;public class Average{ .pdf Average.javaimport java.util.Scanner;public class Average{ .pdf
Average.javaimport java.util.Scanner;public class Average{ .pdf
 
Your equation is correct. Double replacement reac.pdf
                     Your equation is correct. Double replacement reac.pdf                     Your equation is correct. Double replacement reac.pdf
Your equation is correct. Double replacement reac.pdf
 
well while idenitfying aldehydeketone u must kee.pdf
                     well while idenitfying aldehydeketone u must kee.pdf                     well while idenitfying aldehydeketone u must kee.pdf
well while idenitfying aldehydeketone u must kee.pdf
 
The short answer is no. The reason why you cant p.pdf
                     The short answer is no. The reason why you cant p.pdf                     The short answer is no. The reason why you cant p.pdf
The short answer is no. The reason why you cant p.pdf
 
Since it gets in equilibrium when dissolved at sa.pdf
                     Since it gets in equilibrium when dissolved at sa.pdf                     Since it gets in equilibrium when dissolved at sa.pdf
Since it gets in equilibrium when dissolved at sa.pdf
 
phosphite ion .pdf
                     phosphite ion                                    .pdf                     phosphite ion                                    .pdf
phosphite ion .pdf
 
First, lets start with naming binary ionic comp.pdf
                     First, lets start with naming binary ionic comp.pdf                     First, lets start with naming binary ionic comp.pdf
First, lets start with naming binary ionic comp.pdf
 
dFdy=dFdu dudy +dFdv dvdy =e^(u+v) 0 +e.pdf
                     dFdy=dFdu  dudy +dFdv dvdy =e^(u+v)  0 +e.pdf                     dFdy=dFdu  dudy +dFdv dvdy =e^(u+v)  0 +e.pdf
dFdy=dFdu dudy +dFdv dvdy =e^(u+v) 0 +e.pdf
 
At STP22.4 L Is Equivalent to 1 moleThereforeNo. of Moles = 31.pdf
At STP22.4 L Is Equivalent to 1 moleThereforeNo. of Moles = 31.pdfAt STP22.4 L Is Equivalent to 1 moleThereforeNo. of Moles = 31.pdf
At STP22.4 L Is Equivalent to 1 moleThereforeNo. of Moles = 31.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 

Identify the computer fraud and abuse technique byThis computer f.pdf

  • 1. Identify the computer fraud and abuse technique by: This computer fraud and abuse technique is called phishing. Its purpose is to get the information need to commit identity theft. The perpetrator probably also used brand spoofing of Big Bank’s web site Actuvally the problem of This case is based on an actual attack. The solution represents the actual events of the attack and the hospital's response a. What could the hospital do to stop the attack and contain the damage? By Monday afternoon, IT figured out which malware the bots were installing and wrote a script, which was pushed out hourly, directing computers to remove the bad code. The script helped to slow the bots down a bit. The problem does not state how the problem was finally fixed. What actually happened is that on Tuesday the hospital's antivirus vendor figured out which malware the hackers had used to get into the network and wrote a virus signature that blocked new code from coming in. Together with the code the internal IT staff wrote, the hospital was able to clean up its computers. All of the infected computers had to have their hard drives wiped clean and their software reinstalled, at an estimated cost of $150,000. b. Which computer fraud and abuse technique did the hackers use in their attack on the hospital? The primary attack used was a Zero-day attack that exploited a newly found weakness in Microsoft’s operating system that did not yet have a patch written to correct the weakness. The perpetrators hacked into the hospital's network and used various forms of malware, including adware (pop-up ads) and worms. c. What steps should the hospital have taken to prevent the damage caused by the attack? The hospital's network is now protected by Computer Associate's Pest Patrol, which blocks adware and spyware, and Cisco MARS, an intrusion detection system. Northwest's I.T. staffers no longer wait for vendors, particularly Microsoft, to certify software patches before applying fixes—they evaluate and test patches themselves. In the case of the attack, the Windows flaw that the attack slipped through had not yet been patched on the hospital's PCs. Fortunately, the hospital's servers escaped the attack because they had been patched Solution Identify the computer fraud and abuse technique by: This computer fraud and abuse technique is called phishing. Its purpose is to get the information need to commit identity theft. The perpetrator probably also used brand spoofing of Big Bank’s
  • 2. web site Actuvally the problem of This case is based on an actual attack. The solution represents the actual events of the attack and the hospital's response a. What could the hospital do to stop the attack and contain the damage? By Monday afternoon, IT figured out which malware the bots were installing and wrote a script, which was pushed out hourly, directing computers to remove the bad code. The script helped to slow the bots down a bit. The problem does not state how the problem was finally fixed. What actually happened is that on Tuesday the hospital's antivirus vendor figured out which malware the hackers had used to get into the network and wrote a virus signature that blocked new code from coming in. Together with the code the internal IT staff wrote, the hospital was able to clean up its computers. All of the infected computers had to have their hard drives wiped clean and their software reinstalled, at an estimated cost of $150,000. b. Which computer fraud and abuse technique did the hackers use in their attack on the hospital? The primary attack used was a Zero-day attack that exploited a newly found weakness in Microsoft’s operating system that did not yet have a patch written to correct the weakness. The perpetrators hacked into the hospital's network and used various forms of malware, including adware (pop-up ads) and worms. c. What steps should the hospital have taken to prevent the damage caused by the attack? The hospital's network is now protected by Computer Associate's Pest Patrol, which blocks adware and spyware, and Cisco MARS, an intrusion detection system. Northwest's I.T. staffers no longer wait for vendors, particularly Microsoft, to certify software patches before applying fixes—they evaluate and test patches themselves. In the case of the attack, the Windows flaw that the attack slipped through had not yet been patched on the hospital's PCs. Fortunately, the hospital's servers escaped the attack because they had been patched