IS4670 - Unit 1 Discussion 1 - Common Data Threats and Cybercrimes

IS4670 - Unit 1 Discussion 1 - Common Data Threats and Cybercrimes


Unit 1 Discussion 1: Common Data Threats and Cybercrimes
IS 4670

Anthony Brown
Denise Clark
Armando Rocha
Week 1




1. An e-mail scam asks employees to verify their account settings. When employees respond, they provide their computer user name and password.
a. Type of Data Threat / Types of Cybercrimes:
i. Social Engineering
ii. Phishing
iii. Fraud
iv. Hacking
v. Identity Theft
vi. Intellectual Property Theft
vii. Spamming
b. Who or what the exposure affected:
i. This would affect the employees, organization, and the entire network.
c. The consequences of the data exposure:
i. The consequences of this type of data exposure, would be the personal information of the employees and the customers, the financial information of the all their customers; specifically the organizations vendors, and most importantly, the companies’ reputation.
2. Someone attacks a university computer. He gains access to the records of over 30,000 students and staff members. These records include names, photographs, and Social Security numbers.
a. Type of Data Threat / Types of Cybercrimes
i. Backdoors and Trapdoors
ii. Exploits
iii. Keystroke Loggers
iv. Rootkits
v. Uniform resource locator injectors and browser redirectors
vi. Viruses
vii. Worms
viii. Trojan Horses
ix. Extortion
x. Fraud
xi. Hacking
xii. Identity Theft
xiii. Intellectual Property Theft
xiv. Transmission of Malware
b. Who or what the exposure affected:
i. The exposure affected 30,000 students and staff members. The most important thing that was compromised was their social security numbers.
c. The consequences of the data exposure:
i. The most important consequence of this data exposure is identity theft. This breach definitely affects the college’s reputation.
3. A company that processes credit cards stores unencrypted account information on its servers. Attackers gain access to the servers, exposing over 40 million accounts.
a. Type of Data Threat / Types of Cybercrimes:...

Similar Essays