Preview

Case Study

Good Essays
Open Document
Open Document
957 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study
CASE STUDY
Recently, the website of Ankit Fadia, a well-known ethical hacker, was hacked by another group that goes by the name Team Grey Hat (TGH). The “hactivist” group entered Ankit Fadia’s official site and exposed his credentials, including sensitive data, student details, database credentials (like name, user name & password). In a blog message, TGH also rubbished Fadia as a hacker and his courses
According to data from Indian Computer Emergency Response Team (Cert-In), in November last year more than 800 “.in” websites and nearly 700 “.com” websites in India were defaced by miscreants. A good number of Indian sites, including a few government ones, are hacked by cyber criminals every year. This has spurred the demand for security professionals and white-hat hackers.
Global market intelligence firm IDC predicts the requirement of 188,000 security professionals by 2012. At present, the number of certified security professionals in India is estimated at 22,000 by Cyber Security and Anti Hacking Organisation, while another report by Nasscom says that India needs about 77,000 ethical hackers every year.

SUNNY BAGHELA – 22 YR OLD – director and chief technical officer at tech defence consulting pvt tld

At 20,Sunny solved 15 cases of Cyber Crimes of Ahmedabad Crime Branch like Phishing Cases, Biggest Data Theft Case, Espionage Case, Credit Card Fraud Case, Several Orkut Fake Profile Impersonation Cases, Email Hacking Cases, SMS Spoofing Cases, Cyber Pornography Case,Cyber Terrorism Case, Several 419 Nigerian Fraud Case,etc.
Ahmedabad Blast Case Study
Sunny Vaghela helped Crime Branch, Ahmedabad to Trace origin of the Terror Mails sent during Ahmedabad Serial Bomb Blasts. Following are the details.
First Mail was sent on 26th Jully,2008 from Email Id alarbi_gujarat@yahoo.com from IP Address. 210.211.133.200 which traced to Kenneth Hawood’s House at Navi Bombay.His Unsecured WIFI router was misused by terrorists to send terror mail from his router.As

You May Also Find These Documents Helpful

  • Good Essays

    Case Study

    • 1651 Words
    • 7 Pages

    Hypertension (in addition to a number of medical conditions) may be considered as primary or secondary. Explain these concepts giving three examples of secondary hypertension and their pathophysiology.…

    • 1651 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The Certification of Ethical Hacker is achieved after completing a program involved with popular information security and hacking training. Investigators are taught techniques that are used by malicious, black hat hackers.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Study

    • 880 Words
    • 4 Pages

    Lincoln Electric has found a simple way to beat the competition in the manufacturing industry, Lincoln puts the employees first, knowing that without happy employees nothing will improve and nothing will get produced. Through revolutionary incentive programs and effective motivation techniques Lincoln has found ways to keep employees coming back day after day with smiles on their faces and a genuine love for the company in their hearts. It is rare to find companies that value the individual so much while at the same time…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: The Most Notorious Email Attacks Of All Time | SherWeb. (n.d.). Retrieved from http://www.sherweb.com/blog/the-most-notorious-email-attacks-of-all-time/…

    • 735 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    As we can see the email was sent through M57.biz WebMail Server using squirrelmail a webmail client. It could have been easily dismissed if it wasn’t for the fact that squirrelmail requires a server with PHP. Maybe I am overlooking this… Since there isn’t a conclusive answer as in who is behind the attack we can explore the possibilities using the artifiacts found in the suspects hard drive. In the email 210 from Jean’s Inbox when the attacker requests the information(spreadsheet) from Jean we know that the email was sent through an apache server as shown…

    • 1885 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.…

    • 1690 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Case Study

    • 468 Words
    • 2 Pages

    The lawsuit alleged that in April 2007, Amgen's board of directors flagged the company's process for dealing with post-market complaints about drugs as a…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A number of issues arise in considering hacking from the educator perspective. First, we need to consider the fact that the public perception of hackers is mixed, and that "hacking" and "being considered a hacker" can be quite appealing to students who are going through developmental periods in which they are defining themselves, as well as challenging authority and rules. There is often a Robin Hood mentality to early actions, though it is unclear exactly who "the poor" are, and how they are "being compensated". Second, the anonymity of actions which hackers perform against others often enhances the severity of actions. For example, an illegal…

    • 2426 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cyber Espionage

    • 4042 Words
    • 17 Pages

    India has been a victim of cyber espionage on many occasions where crackers operating in foreign jurisdictions regularly attack Indian computers and have successfully taken out sensitive information. International community is stressing upon enhancement of their cyber security capabilities unlike India.…

    • 4042 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    Who Made the Mistake

    • 1355 Words
    • 6 Pages

    The objectives of this case are to find out the culprit and for the culprit to be punished in order to avoid future reputation of the same event.…

    • 1355 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Today the tables have changed and cyber crimes ranges from the most popular Nigerian argot, ‘yahoo yahoo’ (internet fraud), to cracking and gaining access to unauthorised havens, identity theft and to that which most of us are guilty of; software piracy. In a nutshell, cybercrime surround all illicit activities that computers can be used for. While most of all the other crimes are on the low side in Nigeria, the hydra-headed monster is this internet fraud which has poisoned our ivory towers yet finding its way to our homes, no thanks to some choice of package a number of the national service providers render allowing the perpetrators access to the internet right in the comfort of their rooms.…

    • 502 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Terrorism

    • 1161 Words
    • 5 Pages

    This assignment requires the assessment and case analysis of a domestic or international terrorist event. The event for the purposes of this paper is a bomb explosion outside the courthouse in the city of New Delhi, India. The Associated Press (2011) reported the event as “A bomb apparently hidden in a briefcase exploded Wednesday as people lined up outside a top court in New Delhi, killing 10 people and wounding scores more in the deadliest attack in India's capital in nearly three years” (p. 1). They further stated “The blast near a gate at the High Court the second at the building in five months came despite a high alert in the city and renewed doubts about India's ability to protect even its most important institutions despite a security overhaul that followed the 2008 Mumbai siege” (Associated Press, 2011, p. 1). The latest reports several days after the explosion indicate Terror has struck Wednesday Delhi again…

    • 1161 Words
    • 5 Pages
    Better Essays
  • Good Essays

    I was in the office at around 6:40 pm when I got news of the serial blasts. I rushed to Connaught Place, the nearest location of the blasts, along with other reporters from the office. It was 7 pm when I reached the place and a thick cloud of smoke greeted me, through which I could see a man and a woman lying in a pool of blood. The rubbish bin had been ripped apart and a rickshaw stood with its roof caved in.…

    • 507 Words
    • 3 Pages
    Good Essays

Related Topics