Premium Essay

Ais Attack

In: Computers and Technology

Submitted By walkrmatt
Words 1059
Pages 5
030
Although in many cases we see banks joining forces with law enforcement to fight cybercrime, online attackers are become increasingly organized and financial institutions may find themselves fighting even tougher battles. (Kitten, 2012)
In one such case, here in Georgia, a man has pleaded guilty for the role he played in a $1.3 million phishing scheme that targeted customers of Chase, Bank of America, ADP and Branch Bank & Trust. In his plea, Waya Nwaki admitted to using stolen log-in credentials to intercept and respond to e-mails sent by banks to customers when unfamiliar computers or IP addresses were used to access online accounts. He also admitted to impersonating payroll officers in conversations he had with ADP, which is based in New Jersey.
The case resulted from a collaboration between the banks and the Federal Bureau of Investigation against Nwaki, a.k.a. Shawn Conley, who was arrested in December on charges of wire fraud conspiracy, wire fraud, aggravated identity theft, and conspiracy to gain unauthorized access to computers. Each count, to which Nwaki pleaded guilty, carries a maximum sentence of 20 years in prison and a maximum fine of $250,000; sentencing is set for Aug. 15, 2012.
According to court records, Nwaki and six co-conspirators, between August 2000 and June 2010, worked across three continents to launch phishing attacks through spoofed websites designed to mimic banks and payroll processors such as ADP. When online users visited the spoofed pages, they were asked to provide confidential personal and financial information, such as dates of birth, Social Security numbers, mothers' maiden names, and online account user names and passwords.
Having obtained log-in credentials and answers to commonly-asked security questions, the hackers accessed online accounts to make unauthorized transfers to accounts they controlled and/or wired...

Similar Documents

Premium Essay

Ais Attacks

...Attacks On AIS Introduction The more modern technology advances it appears vulnerabilities continuously exist in software used on networks. Hackers or automated information system (AIS) attackers gain access to system networks by manipulating those vulnerabilities. Attackers accomplish this by exploiting operating systems at the root level (Balga, Iftode, & Chen, 2008). Although there are protective measures available, businesses, particularly small businesses, are the most susceptible to these attacks. The following paragraphs will provide an argument based on why businesses are liable for loss when attackers attack their AIS. AIS The assembly of firmware, hardware, and software makes up the automated information system or AIS. It is here where computers store information, such as computations and communications. Businesses and governmental agencies benefit from the use of an AIS. The benefits are time and cost efficient; however, the greater the benefit the greater the risk of attacks. Businesses are losing billions of dollars annually because of these attacks especially when there is no preventive measures in place (Balga, Iftode, & Chen, 2008). Without preventive measures, attackers forge Internet Protocol (IP) Addresses, which causes the victims of the attack to attack other victims. The source of the attack remains unidentifiable. Another type of attack is through user accounts. Networks use authentication information, such as user ID and......

Words: 773 - Pages: 4

Free Essay

Ais Attacks

...ACC 564: Accounting Information Systems12 August 2012 | Abstract This paper explores accounting information system attacks and failures and the party that is to blame. The paper will include the following requirements: 1. My position on whether the firm and its management team should or should not be held liable for losses sustained in a successful attack made on their AIS by outside sources. I will include two (2) facts to support my position. 2. Suggestions for who should pay for the losses incurred, to whom, and why. 3. My opinion regarding the role, if any, the federal government should have deciding and enforcing remedies and punishment. I will include two (2) facts to support my opinion. 4. An evaluation on how AIS can contribute or not contribute to the losses. This assignment will use technology and information resources to research issues in accounting information systems. AIS Attacks and Failures: Who to Blame Take a position on whether a firm and its management team should or should not be held liable for losses sustained in a successful attack made on their AIS by outside sources. Include two (2) facts to support your position. Security controls are safety measures to avoid, counteract or minimize security risks. The firm and management team is responsible for effectively implementing preventative, detective, and corrective controls in order to prevent, identify, and limit the extent of damage from occurring, in progress, or caused by the......

Words: 600 - Pages: 3

Premium Essay

Should Companies Be Held Liable for Successful Attacks on Their Ais by Outside Sources?

...Should Companies be Held Liable for Successful Attacks on Their AIS by Outside Sources? Julie Stoltz Keller School of Management Advanced Accounting Information Systems AC571ON Jeffrey Pullen November 14, 2011 Should Companies be Held Liable for Successful Attacks on Their AIS by Outside Sources? This is a question that has been asked many times over. There are many different opinions on the answer. My thought is that companies not only should but must be held liable. In this age of information capture the companies capturing the information must make sure their accounting information system (AIS) is constantly updated and checked for signs of attack from outside sources. Companies have installed systems which are becoming quite sophisticated and employees are being trained in security measures in hopes of controlling some of the damage wrought by outside forces. However, criminals and terrorists have many different ways of attacking systems. While many in the public do not hear about many of these attacks, some do make their way into the media, especially if a lot of information has been stolen or an extremely robust virus is detected. Some are of the thought that even though some losses have been in the hundreds of millions of dollars, the losses are tolerable. The difficulty is that as the attackers become more advanced the attacks will also become more advanced. It becomes apparent that cooperation between governments and their constituents in necessary to......

Words: 940 - Pages: 4

Free Essay

Conversation with Ai Weiwei

...Summary of A Conversation with Ai Weiwei, an interview conducted by Zheng Shengtian Ai Weiwei, a respected contemporary artist from China is the interviewee in Zheng Shengtian’s article, A Conversation with Ai Weiwei. Conducted in the artists’ studio in Caochangdi, Beijing on July 19, 2013, Shengtian delves deeply into Weiwei’s life before and after his foray into the art world. It is through this interview that we get a sense of what the underlying inspirations were and what the current motivating factors are for Ai Weiwei as an artist and activist. A privileged childhood was far from the reality for Ai Weiwei. At an early age, Weiwei was already grasping what it meant to be wrongly accused and the consequences it had. Weiwei and his family were sent to live in a military camp in Xinjiang, China after his father; Ai Qing was condemned as a “rightist” in 1957 (Shengtian 6). When asked about his life in the military camp, Weiwei did not have a clear recollection and only saved a few traumatizing memories. He recalled the time when their military camp fired the first shot of China’s Cultural Revolution on January 26th. “I remember hearing lots of explosive noises. I saw my family boarding up the door. I heard running footsteps on our rooftop. Because the rooftop was made of tiles, which were not soundproof, I could hear the bullets whistling by” (Shengtian 8). Seeing dead bodies, including classmate, Ma Lu, is still very much a vivid memory for Ai Weiwei. Such scenes......

Words: 993 - Pages: 4

Premium Essay

Assighnment #2: Ais Attacks and Failures: Who to Blame

...ASSIGHNMENT #2: AIS ATTACKS AND FAILURES: WHO TO BLAME Introduction In this paper, I am going to present about an accounting information system attacks and failures: who to blame. I am also going to discuss the following related topics in the following order: Firstly, I will take a position on whether a firm and its management team should or should not be held liable for losses sustained in a successful attack made on their AIS by outside source. Secondly, I will suggest who should pay for the losses, to whom, and state why. Thirdly, I will give my opinion regarding the role, if any; the federal government should have deciding and enforcing remedies and punishment. Finally, I will evaluate how AIS can contribute or not to contribute to the losses. A Firm and its Management Team Should Be Held Liable for the Losses According to the Control Objectives for Information and Related Technology (COBIT) framework and the Trust Services framework, achieving organization’s business and governance objective require adequate control over IT resources. IT processes must be properly managed and controlled in order to produce information that satisfies the seven criteria: effectiveness, efficiency, confidentiality, integrity, availability, compliance and reliability. These IT processes are grouped into the following four management activities or domains (Romney & Steinbart, 2012). 1. Plan and Organize (PO), 2. Acquire and Implement (AI), 3. Deliver and Support......

Words: 1552 - Pages: 7

Free Essay

La Singularidad

...thing that approaches the importance of that reality is finding like minds that realize the same, and being able to make some connection with them. If these books have influenced you the same way that they have us, we invite your contact at the email addresses listed below. Enjoy, Michael Beight, piman_314@yahoo.com Steven Reddell, cronyx@gmail.com Here are some new links that we’ve found interesting: KurzweilAI.net News articles, essays, and discussion on the latest topics in technology and accelerating intelligence. SingInst.org The Singularity Institute for Artificial Intelligence: think tank devoted to increasing Humanity’s odds of experiencing a safe, beneficial Singularity. Many interesting articles on such topics as Friendly AI, Existential Risks. A SingInst.org/Media Videos, audio, and PowerPoints from the Singularity Summits; and videos about SIAI’s purpose. blinkx.com/videos/kurzweil Videos on the internet in which the word “Kurzweil” is spoken. Great new resource! PRAISE FOR THE...

Words: 237133 - Pages: 949

Free Essay

L'Echec Du Bic En France

...L’échec du BIC en lancement des sous-vêtements en FRANCE   Sommaire L’histoire…………………………………... ………………………………………………3 Présence mondiale……………………… ………………………………………………4 Développement durable………………… ………………………………………………5 Bic en chiffres……………………………. ………………………………………………6 Références………………………………... ………………………………………………7   L’histoire Le Groupe BiC est une société cotée en bourse fondée le 25 octobre 1945, dont le siège social se situe à Clichy en France. Années clés – expansion vers international 1945 - Marcel Bich (1914-1994) et son associé Edouard Buffard (1908-1996) fabriquent à Clichy (France) des pièces détachées de stylos plume et porte-mines 1950 - Marcel Bich lance le stylo à bille BIC® Cristal® en France. BIC® est une version raccourcie de son propre nom 1954 - Entrée de BIC sur le marché italien 1956 - Entrée de BIC sur le marché brésilien 1957 - Entrée de BIC au Royaume-Uni, en Australie, en Nouvelle-Zélande, en Afrique du Sud... par l’acquisition de Biro Swan (Royaume-Uni) 1958 - Entrée de BIC sur le marché des Etats-Unis par l’acquisition de Waterman Pen 1959 - Entrée de BIC sur les marchés scandinaves 1960 - Expansion de BIC en Afrique et Moyen-Orient dès le début des années 60 1965 - Entrée de BIC sur le marché japonais et le marché mexicain 1969 - Création de BIC Graphic (marquage publicitaire) 1972 - Entrée de BIC en Bourse (Paris) 1973 - Lancement du Briquet BIC® 1975 - Lancement du Rasoir BIC® 1979 - Entrée de BIC sur les......

Words: 1494 - Pages: 6

Free Essay

Ai Weiwei

...2013 Ai Weiwei Ai Weiwei is an internationally celebrated Chinese artist whose voice is heard loudly through his art. He believes in freedom of expression and despises the Chinese Government’s power. Ai’s contemporary style comes in many forms; Sculpture, architecture, installation, film and photography, are only some of his great talents; his art exposes the very real hardships of the Chinese people and how their culture has been muted over time. The government has become such a major influence and has gained so much power that at one point they convinced the people to destroy their cultural reminders in hopes that they will leave behind an insignificant past. Ai Weiwei was born the 18 of May 1957 to father Ai Qing and mother Gao Ying. Ai Qing was well known throughout China for his very forward poetry. Qing would later be considered a liberal who spoke out by joining a very left wing Artist Association and in doing so he was subsequently arrested in the early 1930’s, this decision cost he and his family to be sentenced to live in a labor camp. For the first eighteen years of Ai Weiwei’s life was spent in Xinjiang and later they would be removed to Gobi Desert (with even worse conditions) then back again to Xinjiang before being released in 1975. Life was very hard for the family during this long period of time. The year of 1975, brought with it great change for their entire Weiwei family, they were allowed to return home to Beijing and in the year of 1978, Ai Qing......

Words: 2779 - Pages: 12

Free Essay

String Ai vs Weak Ai

...machines that were able to do some kind of intelligent work. According to AI concept it is possible for a machine to think. Actually intelligence has different meanings according to different people so let’s skip this talk and come to the point Strong vs Weak AI. Strong AI: According to think tanks of AI a day will come when computer’s computations and calculations will become so strong that a computer will be able to take decisions just like human brain, so that we will be able to call it as intelligent as human brain. In other words a machine will think in the same way as a human brain does. Weak AI: Weak AI is also intelligence in a way because the technology that we are using today as AI can be referred to as weak AI. Because the level of AI that we attain today can’t be placed at the level of human brain, because the most advance machines today we have can’t actually think like human brains. The case of chess master Garry Kasparov vs IBM's Deep Blue program is a good illustration. Although Kasparov had the advantage of human intuition, Deep Blue had the ability to calculate 200 million probabilities per second. Better approach to adopt: According to me it is impossible for a machine to attain a level of intelligence like human brain. But if we consider that it happens so this will be a destruction of the world. Because human brain is equally as dangerous as it is intelligent, so better approach is weak AI but it should be evolved for the betterment of...

Words: 294 - Pages: 2

Free Essay

Singularity

...Tanya Leadmon English 111 11/04/13 Singularity When Raymond Kurzweil wrote “The Singularity is Near: When Humans Transcend Biology” in 2005, he predicted that Singularity would occur in the year 2045. Singularity is defined as when computers become smarter than humans. Kurzweil truly believes that this will happen in the year 2045. While reading my critique of Kurzweil’s theory, decide for yourself if you believe Singularity will occur in 2045, or ever. Kurzweil describes his law of accelerating returns as exponential increase in technologies like computers, genetics, nanotechnology and robotics, and artificial intelligence. Kurzweil also predicts that once Singularity has been reached, machine intelligence will be a quintillion times more powerful than all human intelligence combined. Before Singularity can occur, Kurzweil states that there will be exponential growth in evolutionary progress, computational capacity, how the brain works, and revolutions in genetics, nanotechnology, and robotics. Kurzweil believes computational capacity will continue to grow exponentially. He feels that a new paradigm will debut to carry on this growth. According to him, this new paradigm will be nanotubes. He goes on to say that the best way to build machine intelligence is to first understand human intelligence. The first step is to peer inside the brain. Kurzweil predicts that during the 2020’s greater details of the brain will surface because...

Words: 530 - Pages: 3

Free Essay

Redaction

...J’ai visité la France et la Belgique pendant les vacances d'hiver. J’ai voyagé pour le plaisir et pour rencontrer des gens différents. J'ai visité la Tour Eiffel, Notre-Dame de Paris et l'Arc de triomphe. C’est formidable et magnifique! Il y a eu beaucoup de monde et il a plu toujours pendant le voyage, mais j'ai toujours le plaisir quand même! J’ai habité dans une auberge, c'est pas mal, les chambres est minuscules avec des lits jumeaux, et le prix est eu raisonnable. Mais il y avait les personnes que je n'ai pas connu dans la même chambre que moi, alors, c'est un peu inconfortable. J'ai préféré prendre le train et le bus en France, parce que le taxi est très cher. J'ai pris souvent le bus ou le métro à Paris, c'est plus cher à Paris qu'à Galesburg pour prendre un taxi. Je suis allée à Rouen pour le visiter mon amie, j'ai pris le train de Paris, le prix est raisonnable, et ça fait une heure et demie pour y aller. La plupart des Français peut parler un peu anglais. Je parle un peu français, mais j’ai une amie qui parle bien français, donc on n'a pas eu beaucoup de problèmes de communiquer. Mais j’ai eu un problème d’argent, parce que les choses sont toutes trop chères en France. J’aime la France, et je pense que la Tour Eiffel est très belle et inoubliable! Je suis allée à la Seine aussi, et il y a eu beaucoup de serrures d'amour sur les ponts parisiens, c'est vraiment romantique! Je vous......

Words: 277 - Pages: 2

Free Essay

French Writing Controlled Assessment Example a/a*

...French Writing Controlled Assessment (Mon hero) La personne que j'admire est mon oncle, Olufemi Oloyede. Il est le frère de mon père. Il a quarante-huit ans. Il habite au Nigeria, à Lagos et Il a habité depuis vingt-cinq ans. Il n'a rien accompli de particulièrement spécial, mais je crois que il est respecté parce que sa profession. Apres avoir étudié médicine à l'université, Il a spécialisé dans Cardiologique. Quelle bonne idée! Je l'aime parce qu’Il a étudié très bien à l'école sans hésiter, malgré le fait qu’il a fallu dix ans. Il était vraiment travailleur. Alors même qu’Il travaille beaucoup, Il n'est jamais fatigué ou éculé. La plupart du temps il ne plaignait jamais. Mon Oncle est grand et forte. Il porter toujours un costume car Il a souvent dit qu’ils sont à la mode. Ses vêtements sont toujours bien propres. Il est savant, judicieux et drôle, plus drôle, à mon avis que tous les autres. Il est moins strict que mes parents. Il a deux sœurs et deux frères. Il est marié et a deux enfants. Une fille de dix-sept ans et un garçon de deux ans. Mon Oncle est mon héro parce que Il m’a inspiré à devenir docteur. Je travaillerai dur et si je deviens médecin, Je lui serais reconnaissant. J'étais sur le point étudier la musique, car toujours, je pensais que devenir un docteur, ce serait trop dur. Cependant, selon moi, Il a transformé mon opinion et mon but. C'est pourquoi mon oncle est mon...

Words: 254 - Pages: 2

Free Essay

Magicl Day

...Some years ago, I (GLS) was snooping around in the cabinets that housed the MIT AI Lab's PDP-10, and noticed a little switch glued to the frame of one cabinet. It was obviously a homebrew job, added by one of the lab's hardware hackers (no one knows who). You don't touch an unknown switch on a computer without knowing what it does, because you might crash the computer. The switch was labeled in a most unhelpful way. It had two positions, and scrawled in pencil on the metal switch body were the words ‘magic' and ‘more magic'. The switch was in the ‘more magic' position. I called another hacker over to look at it. He had never seen the switch before either. Closer examination revealed that the switch had only one wire running to it! The other end of the wire did disappear into the maze of wires inside the computer, but it's a basic fact of electricity that a switch can't do anything unless there are two wires connected to it. This switch had a wire connected on one side and no wire on its other side. It was clear that this switch was someone's idea of a silly joke. Convinced by our reasoning that the switch was inoperative, we flipped it. The computer instantly crashed. Imagine our utter astonishment. We wrote it off as coincidence, but nevertheless restored the switch to the ‘more magic’ position before reviving the computer. A year later, I told this story to yet another hacker, David Moon as I recall. He clearly doubted my sanity, or suspected me of a supernatural......

Words: 642 - Pages: 3

Premium Essay

Casual Wear

...The unexpected outcome provides the reader with the fierce shock of reality on a personal level. Since the only name given to the woman is “wife” and the odds were “1 to 910 against her strolling past the Embassy,” the reader is given the impression that this is something that could happen to anyone, anywhere (Merrill 907). The shift in tone from detached to very personal provides the reader with the stark contrast between a generalized newscast and the very personal level on which people are affected by the events being covered. The events that make the news, however, have a different effect on different individuals, which Merrill suggests in the last two lines of “Casual Wear.” In line eleven, Merrill provides the outcome of the attack for both the terrorist and the tourist; the terrorist is left with the satisfaction of “claiming responsibility,” while...

Words: 603 - Pages: 3

Free Essay

Snyder V. Phelps

...Phelps 1. The Court holds that the picketing pertained to a matter of “Public concern” because members of the Westboro church basically attacked this funeral. Family members were grieving the loss of their son, their soldier that was killed in Iraq, giving his own life for his country. And the members of this church were throwing verbal attacks, not counting with all the signs they took showing how they hate soldiers because of the homosexuality existing in the service, not having idea that it was the case for this deceased soldier. The fact here is that this was a public matter, because it interrupted the community peace and those are subjects that society (public) are concern in every day basis. 2. A captive audience is a group of people who listen or to watch someone or something because they cannot leave. 3. Because he could not agree with the Court and what the Court rely on. Westboro Church caused this father great pain and the Court denies him for what he suffered. Westboro Church was addressing public issues, but that is different than attacking a person when they are in pain for the loss of a son. He was a victim of their attack. Page 178 Case 6.2 Brown v. Entertainment merchants Association 1. The issue before the Court was the sale of certain violent video games to children without parent’s permission. These video games have violence; killing, and pornography, enemies with weapons, using explosives to destroy structures, dangerous races with......

Words: 411 - Pages: 2