Preview

Computer Sabotage - Internal Controls

Good Essays
Open Document
Open Document
910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Sabotage - Internal Controls
The most expensive and best-publicized incident of computer sabotage happened at Omega Engineering Corp of Bridgeport, New Jersey. It was a classic example of inside hack attack, whereas a former employee intentionally launched a logic bomb that permanently caused irreparable damage, destroying more than a thousand programs in the matter of a few seconds.
Omega Engineering was a thriving defensive manufacturing company in the 1990s; it used more than 1,000 programs to produce various products with 500,000 different designs for their customers, including NASA and the U.S. Navy (Lin, 2006).
It was the morning of July 31 1996, when the first worker fired up the Novell NetWare 3.12 file server as he always did. This time, however the server did not boot up. A message popped up on the screen saying that a section of the file server was being fixed and then it crashed. When it crashed "it took nearly every program down along with it, destroying any means of finding them and scattering the millions of lines of coding like a handful of sand thrown onto beach" (Gaudin, 2000). Even when the server was down, however, the programs could be taken off the backup tape and the machines could run. But the backup tape was nowhere to be found. The Plant manager went to the individual workstations to retrieve any programs that workers had saved to their desktops, but there was also nothing to be found. There were no programs and no backup tapes. The manager then made a decision to run the machines with programs that already had been loaded the day before and the machines run like that – some, for days, some for weeks until they choked inventory or exhausted their raw material (Gaudin, 2000).
During the crash – Tim Lloyd, a former employee, who had been fired just three weeks ago, have been called, as he was the one responsible for the security of the system and maintenance the back up tape. He however, did not provide the answer where the tape was or whether or not he had it.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft 2003 XP SP2 Workstation?…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chilean Mine Collapse

    • 262 Words
    • 2 Pages

    o What would be the potential needs of the company’s employees when receiving a message about this incident?…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Briargrove

    • 403 Words
    • 2 Pages

    Briargrove, a multinational organization, has a wide-range of computer systems and applications of which need to communicate with each other quite frequently. However, being that different backup systems are located globally and online, Briargrove only implemented data back-ups and lab test network without having any particular policy or procedure put into place. The impact of not implementing administrative controls is that, a vast amount of management has taken it upon themselves to download unknown software of which has counteracted with the system therefore causing a complete system failure and thereby affecting the organization as a whole entity. Subsequently, after the system failure, Briargrove has been advised to provide both a…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Chilean Copper Mine

    • 1073 Words
    • 4 Pages

    o What would be the potential needs of the company’s employees when receiving a message about this incident?…

    • 1073 Words
    • 4 Pages
    Better Essays
  • Good Essays

    the United States. Today, the Worldcom accounting scandal is known as one of the worst…

    • 1065 Words
    • 5 Pages
    Good Essays
  • Better Essays

    As a multinational organization, Briargrove has an extensive computer system network. However, due to too many locations globally, Briargrove only thought of data back-ups and lab test network without implementing administrator accesses or an information Technology (IT) policy and procedure. Because they failed to implement Information Systems (IT) administrative controls, many of the management personnel downloaded unknown software and has caused a complete system failure, affecting negatively the entire organization’s network. Following their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Omega Inc. Bia

    • 2982 Words
    • 12 Pages

    Two weeks ago, Omega experienced a significant loss of proprietary data (estimated value $550,000.00) that was stored electronically in an Oracle database in their main office in Reston. The data was unrecoverable and backups were not being routinely maintained, so no restoration was possible. Although he has no hard evidence, Omega’s CTO believes that the loss resulted from deliberate deletion of files by a systems administrator from the Kansas City office that had been “let go” several weeks prior to the loss. Needless to say, the CTO has been tasked to “get things under control.”…

    • 2982 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    1. IT department was doing a project over summer to upgrade some older PC’s in around different departments.…

    • 2823 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Oxo Case Write-Up

    • 2747 Words
    • 11 Pages

    * OXO’s new line of product is now in the needs of large capacity of 3D-CAD modeling and engineering, which Smart Design can’t meet with the current royalty-based fee.…

    • 2747 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Airbus S.A.S., 2011. Airbus A380: Manufacturing Process. [online] Available at: < http://www.airways.ch/files/2005/0105/002/a380production.htm> [Accessed 15 April 2011]. The Seattle Times Company, 2006. How the other half builds. [online] Available at: < http://seattletimes.nwsource.com/html/businesstechnology/2002740839_toulo use15.html> [Accessed 15 April 2011]. Roussel J., 2005. Benefits of requirement engineering with doors. [online] Available at: < http://www.incose.org/japan/ijc_data/20050822/IJC20050822_07.pdf> [Accessed 15 April 2011]. Articlesbase, 2010. Strategic Management – Case Study of Airbus. [online] Available at: < http://www.articlesbase.com/corporate-articles/strategicmanagement-case-study-of-airbus-2997023.html#ixzz1K0UnP546> [Accessed 15 April 2011]. Transport Intelligence news, 2010. Qantas to resume limited A380 services. [online] Available at: < http://www.flightglobal.com/articles/2010/11/23/350061/qantas-to-resumelimited-a380-services.html> [Accessed 15 April 2011]. Baubil D., 2003. A380 Systems Selection. [online] Available at: < http://www.aviationweek.com/conferences/html/ts03/baubil_airbus.pdf> [Accessed 15 April 2011]. Invest master, 2011. Airbus management. [online] Available at: < http://www.my-investment.com/blog/airbus-management> [Accessed 15 April 2011]. Bized, 2007. Operations Management. [online] Available at: < http://www.bized.co.uk/dataserv/chron/news/2763.htm> [Accessed 15 April 2011].…

    • 4825 Words
    • 20 Pages
    Best Essays
  • Powerful Essays

    Managing the Virus Hunters

    • 1337 Words
    • 6 Pages

    Imagine what life would be like if your product were never finished, if your work were never done, if your market shifted 30 times a day. The computer-virus hunters at Symantec Corp. don’t have to imagine. “That’s the reality of their daily work life. At the company’s response lab in Santa Monica, California, described as the “dirtiest of all our networks at Symantec. “ Software analysts collect viruses and other suspicious cod and try to figure out how they work so the company can provide security updates to its customers. There’s even a hazardous materials box by the door to the lab, marked DANGER, where they put all the discs, tapes, and hard drives with the nasty viruses that need to be completely disposed of. Symantec’s situations may seem unique, but the company, which makes content and network security software for both consumers and businesses, reflects the realities facing many organizations today: quickly shifting customer expectations and continuously emerging global competitors that have drastically shortened product life cycles. Managing talented people in such an environment can be quite challenging as well.…

    • 1337 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Radar Cross Section

    • 7351 Words
    • 30 Pages

    DRDO works towards enhancing self-reliance in Defence Systems and undertakes design & development leading to production of weapon systems and equipment in accordance to requirements laid down by the three services. DRDO’s work involves various areas of technology, including aeronautics, armaments, combat vehicles, electronics, instrumentation engineering systems, missiles, materials, naval systems, advanced computing, simulation and life sciences.…

    • 7351 Words
    • 30 Pages
    Powerful Essays
  • Powerful Essays

    Related Literature

    • 13314 Words
    • 54 Pages

    Although Jaschen’s sentence seemed like a crime to many in the IT industry, the real injustice occured just a few months after Jaschen’s indictment, when Securepoint, a German IT security company, hired Jaschen as a programmer. It appeared that the teen responsible for 70 percent of all computer virus…

    • 13314 Words
    • 54 Pages
    Powerful Essays

Related Topics