Question

CASE A Handy cookies is a cookies Producing Company, with it headquarter in Texas. Handy cookies ...

CASE A

Handy cookies is a cookies Producing Company, with it headquarter in Texas. Handy cookies has three branch offices in New York, Maryland and California. The general Manager, David Morrison who is always at the headquarter sends weekly financial documents to each of the branch managers via email. Periodically, the branch managers sends important reports to each other and to the headquarters. All their messages are sent via email. The messages are sent in plain text. Recently, there was a report of an intruder who hacked into their email accounts.

Handy cookies need a security technique that can help provide confidentiality to their messages. So that an unauthorized person cannot read their messages.

CASE B

Duke Mark a 20 years customer of handy has recently received an email from Fred Abraham the manager of handy cookies California branch. The email reads

We have changed our bank account details. Can you please use the new account details as stated in this email to transfer the money for the order? If you place order and pay before tomorrow noon we offer you 20 % discount.

Account no. 00000005153258963,

Bank name: bank of northsadem

Duke Mark after reading the email quickly call Fred Abraham to inform him that he already transferred half of the money into the new account and he will be transferring the other half in two days. Immediately Fred got the call he knew that Duke has been duped. Someone has claimed to be Fred and got Duke’smoney.

Handy cookies need a security technique that can help provide message Integrity. Such protocol can ensure that messages received are from the claimed sender.

For the case above

  1. Choose a well-known company (English)

  2. State the date of the attack

  3. Who were the attackers

  4. Explain how the attack took place

  5. Explain the damages/effect of the attack on the company

  6. Was the problem resolved?

    a)If yes, Explain measures taken to resolve the problem and measures taken to prevent future occurrence b)If no, explain measures taken and why the problem could not be resolved
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Recently Google.com had hit by this type of attack where the attacker send an invitation and whosoever open that invitation an application will open through which your account login credentials will be saved to the hacker's account.

In May, 2017 the attack has been reported. A group of attackers have carried out this attack though their identities are not found.

The attack is carried out in such a way that the email that is being send as a spam will trick the person to open and will gather the personal information. This attack has a sole motive to get the credit card details of the user and also tricking them to share their password.

The damage is generally faced by the users and lots of users had fallen into this trick and many personal credentials are compromised as well.

yes, the problem is resolved and the spam accounts are deleted.

For resolving this type of phishing emails, spam filtering should be used by the users as this will figure out the spam emails arriving to the inbox and directly block those email IDs and put them in the black list. Email spam filtering can help you stay protected from these types of attacks. Powerful spam detection filter will even check for images and decide whether it is a spam mail or not.

Add a comment
Know the answer?
Add Answer to:
CASE A Handy cookies is a cookies Producing Company, with it headquarter in Texas. Handy cookies ...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • Part III: Matching (45 points) Match the items below with their applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30. Cyber-extortion 31. Trojan horse 32. Scar...

    Part III: Matching (45 points) Match the items below with their applications 26. Pretexting 27. Hacking 28. Password cracking 29. Salami technique 30. Cyber-extortion 31. Trojan horse 32. Scareware 33. Social engineering 34. Vishing A man accessed millions of ChoicePoint files by claiming in writing and on the phone to be someone he was not. A. rs who opened the attachments unknowingly unleashed a program hidden inside another program that secretly copied the subscriber's account name and passwor forwarded them...

  • Case Study: Acme Manufacturing Company Steve Arnold is a production manager at Acme Manufacturing Company in...

    Case Study: Acme Manufacturing Company Steve Arnold is a production manager at Acme Manufacturing Company in New Jersey. When Steve drove into the parking lot at the plant on Tuesday morning at 8:35, he was already 35 minutes late for work. Steve had overslept that morning because the night before he had stayed up late to finish the monthly production report for his department. He parked his car and entered the rear of the plant building. Passing through the shipping...

  • SECTION 1: CASE STUDY: Audit of Sales and Collections Cycle (85 Marks) Read the case below for Digitex LLC and a...

    SECTION 1: CASE STUDY: Audit of Sales and Collections Cycle (85 Marks) Read the case below for Digitex LLC and answer the question that follow: Brief company background Digitex LLC has been in business since 1998 and has grown rapidly over the Middle East. The company is a distributor of electronic parts and equipment to the IT industry in the GCC region. Digitex has some strong internal controls policies and procedures over its business environment both internally and externally. However,...

  • By the time the New York identity theft fraud case was solved, over 30,000 people had...

    By the time the New York identity theft fraud case was solved, over 30,000 people had suffered a total combined loss of over $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims’ credit information and exploited that information to steal the victims’ identity. The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people’s personal information. Philip Cummings had begun to work at Teledata...

  • Case Study Analysis: Fred Stern & Company, Inc. (Knapp): In the business world of the Roaring...

    Case Study Analysis: Fred Stern & Company, Inc. (Knapp): In the business world of the Roaring Twenties, the schemes and scams of flimflam artists and confidence men were legendary. The absence of a strong regulatory system at the federal level to police the securities markets—the Securities and Exchange Commission was not established until 1934—aided, if not encouraged, financial frauds of all types. In all likelihood, the majority of individuals involved in business during the 1920s were scrupulously honest. Nevertheless, the...

  • Case Study: Johnson Motor Corporation By: Theresa Ceccarelli, Ph.D. Johnson Motor Corporation operates several proving grounds...

    Case Study: Johnson Motor Corporation By: Theresa Ceccarelli, Ph.D. Johnson Motor Corporation operates several proving grounds worldwide, for development and validation testing of new vehicles. The company has a long history in the automotive industry and has a strong reputation for quality and service. Dan Smith oversees several of these sites. In one particular site in Michigan, Smith has a garage that consists of 140 full time mechanics, most of which are men. The Director, Dan Smith has been with...

  • CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a...

    CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant "E" slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm...

  • Is anyone help me this question? CASE 2-5 Coping with Corruption in Trading with Vietnam Corruption...

    Is anyone help me this question? CASE 2-5 Coping with Corruption in Trading with Vietnam Corruption is a fact of lifie in China. In fact Transparency Interna-fo travel to cash or gifts. (This was especially true when few tional, a German organization that applies its Corruption PerceptionPRC officials had been abroad.) As a result, traders report that Index (CP) globally. rates China with a CPl of 3.6 and is number dangling foreign trips in fromt of their PRC clients has...

  • Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming...

    Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant “E,” slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm laid off 4,000...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT