Tuesday, 1 May 2012

Chapter 3 case study 


COMPUTER AND INTERNET CRIME


QUESTIONS TO CONSIDER


1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

Answer:

Trading in different fields is full of opinions about the right way to trade. Trading should abound. If trading is as much about self-development as it is about having a proper profit and loss statement, then as a trader you need to rely more on your individual perspective than on collective opinion. "The rules of conduct are just an outer show of devotion and loyalty - quite confusing to the heart." To be impeccably loyal to a trading system like the issue being said by Peter Gumble, it tells confusing to your heart and your individuality. And when men rely on these rules for guidance, there comes a time of ignorance abounds.


Reference:

link: http://tradereducatoronline.com/2011/09/20/the-taoist-trader-breaking-the-rules/


2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

Answer:

As I searched over the net. When the heads of SocGen discovered this, they could not believe this one man had managed to do so much, so surreptitiously. A person familiar with SocGen's board says: " Everyone is stupefied to this affair. SocGen had an image as the best French banking. What is striking here is the contrast between the mediocrity of the trader and the scale of the catastrophe." Jean-Pierre Mustier, the head of SocGen's investment banking division, spent hours interrupting Mr. Kerviel in the aftermath of his Icarus-like plunge that ended up costing the bank €4.9bn.

Reference:

link: http://www.ft.com/cms/s/0/927fe998-d5b2-11dc-8b56-0000779fd2ac.html#axzz1tgZ0NaYx


Discussion Questions


1. Identify and briefly discuss four reasons why computer incidents have become more prevalent.


Answer: 
               
Computers are having a incidents it's because they not using any security to protect the computers able to enter the computer easily and to delete all the files inside the computer or it will put a virus on it able to damage the software.


2. A successful distributed denial-of-service attack requires downloading software that turns 
unprotected computers into zombies under the control of the malicious hacker. Should the owners of the zombie computers be fined as a means of encouraging people to better safeguard their computers? Why or Why not?


Answer:


For me the owner will protect their programs to avoiding malicious hacker. Because the hackers will do their work to hack any sites or program that their like to avoiding that it's better to make protection to prevent any malicious hackers in any programs or sites.


3. Do you believe that spam is actually harmful? Why or why not?


Answer:


For me it's harmful, because spam is abusing an email system example if know one are sending an email for you but their are sending a message if you open that it can harm your computer we don't know if that message having also a virus that can damage your system we must be careful on it.


4. How ca installation of a firewall give an organization a false sense of security?


Answer:


For me installation of a firewall cam secure your business or any organizations would to access any networks. Because they are using firewalls to secure their networks. Example if any organizations would like to access i the network if that organization not identify of the network they will use the firewall to blocked or not gaining access on the network.


5. Some IT security personnel believe that their organizations should always employ whatever resources are necessary to capture and prosecute criminals. Do you agree? Why or why not?


Answer:


I  agree, because if the IT security do that they can capture any criminals that having a bad intention through the computers it can help also avoiding any malicious or bad intentions of any organizations.


Discussion Questions


1. There are some who think that the techniques tools used in the Dark Web project could be used in a way that could negatively affect our way of life. The executive director of the Electronic Privacy Information Center, Marc Rotenberg fear "the very same tools that can used to track terrorist can also be used to track political opponents. " What are some negative ways such tools can be used against U.S citizens? Do you think that this is reasonable fear?


Answer:


For me this dark web project can tracking any terrorist able to know if what are they doing if we know the terrorist are having planned we will know their planned we can intercept their communications in other terrorist to avoiding a bad intentions as well.


2. Identify three positive ways that this technology could be used to improve the performance      organizations or to help us i our daily lives.


Answer:


For me the positive ways that any technology used to improve their performance in organizations. To help them to make easier of their work using technology to communicate of their business having conversations using technology and helping them to make fast of their transactions.


3. Do a Web search to find current information about the dark web research being carried out UA, including information about the budget for this effort, the number of researchers current employed, and any new tool or techniques they've developed. Write a brief summary of your findings.


Answer:


For me findings a information of the dark web to know that they having effort to make such new tools or techniques to developed any devices or technology we can avoid all of these getting their own informations. 


Discussion Questions


1. What harm does a worm cause to the public, Internet service providers, and e-mail service providers? Are there other reasons why many people object so strongly to the spread of worms?


Answer:


For me, Worms is a virus it is a harmful virus that can damage programs or systems in the computer they use this virus to sending copies of others if you open it the worm virus spread their are possibilities you will lost all of your data, programs other files that this virus can destroy.


2. What would you say or do if you received an email that guaranteed you $20 per month if you agreed to permit your computer to be used to send email during hours you are not using it?


Answer:


For me if that is their strategy to get the attention of it i will avoid that it's because you have nothing agreed something that they will give $20 per month you will not get their plan to do such bad intentions of sending an emails.


3. Do you feel it is objectionable to let others use your computer to execute your files without your prior knowledge or consent? What if ti were for a good cause, such as destroying a worldwide botnet, such as that created by the Storm worm, or running an application that analyze research data related to finding a cure for cancer?


Answer:


For me if you let others use your computer execute files without your consent your files will terminated you let others use your computer we don't know if that person has bad intention to do that or putting any kind of virus that can harm your computer. You will avoid that to secure your all files in the computer.


Discussion Questions


1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?


Answer:


For me  yes, because Mike Lynn do his job and remind all of them what is the possibilities that can cause damage of a property he is concern if what can do if that will happen he do his best for what is right for their country. 


2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not?


Answer:

Cisco and ISS treated Mike Lynn is an unprofessionalism work. Cisco and ISS they have to face the problems regarding of their issues.


3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.


Answer:


Mike Lynn discovered something that can create a worm in the network to attack and control all of the routers in the internet. 

3 comments: