Kelogger Scam Police Foil $420 Million Keylogger Case Study

Total Length: 961 words ( 3 double-spaced pages)

Total Sources: 4

Page 1 of 3

Kelogger Scam

Police Foil $420 Million Keylogger Scam

Measures to deter these types of crimes

Categorize the type of modern attack(s) or computer crime(s)

Technologies to deter the threat

Summary of similar success stories

Measuresto deterthese types of crimes:

The white color and computer crimes can be tacked using sophisticated measures and appropriate controls. The cyber security is notably related to the virtual control of the computing services and IT infrastructure but at the same time it also requires that that the physical premises and controls are also in place. The effectiveness of IT infrastructure and security measures requires any institution including the financial services providers to act in accordance with the legal requirements. The security policy of the corporation should incorporate physical and virtual measures of control. In case of keylogger scam it is observed that the act is not possible only through an outsider's job. It required an inside access along with the loose external IT security controls.

The government, enterprises, and individuals should ensure that the IT policy is developed and implemented. After implementing the IT security policy it should also be regularly audited and the flaws should be removed. Along with the passage of time it is required to update the system according to the latest requirements and security threats. The periodic audit of the IT infrastructure will enable the system to be updated and respond to the latest threats of security breach. The personnel using the IT system should also be trained and informed with respect to the system expectations and their duties of care (Casey, 2011).

Stuck Writing Your "Kelogger Scam Police Foil $420 Million Keylogger" Case Study?



Categorize the type of modern attack(s) or computer crime(s):

The keyloggers attack is one of the most significant types of content security threat. The attack used to capture information about the usernames and passwords. The attack used was the attempt to gain access to the classified information that is later used to transfer money form the bank accounts. The Keylogger attacks can be made through hardware and software installation. These are two unique ways to access information from the victim computers. The software keyloggers are a part of the system that is related to the spyware. The hardware keyloggers are based on the physical attachments and requires inspection in order to detect. The popular and most common keylogger is the keyghost. It resides between the keyboard connector and the computer. The attackers access the information form the keyloggers through retrieving them form the victims and installing on their own system. Then information is accessed and key sequences are denoted. The hardware surveillance is essential along with the software updating of the antivirus systems. The agreement offered by various software services provides enables the users to place high value for the ports and these values are later used to access the information stored in the computer. Spyware is used to continuously access the information and in combination with the….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Kelogger Scam Police Foil 420 Million Keylogger" (2013, July 21) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/kelogger-scam-police-foil-420-million-keylogger-97644

Latest MLA Format (8th edition)

Copy Reference
"Kelogger Scam Police Foil 420 Million Keylogger" 21 July 2013. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/kelogger-scam-police-foil-420-million-keylogger-97644>

Latest Chicago Format (16th edition)

Copy Reference
"Kelogger Scam Police Foil 420 Million Keylogger", 21 July 2013, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/kelogger-scam-police-foil-420-million-keylogger-97644