Preview

Operation Get Rich Or Die Tryin: A Case Study

Satisfactory Essays
Open Document
Open Document
339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operation Get Rich Or Die Tryin: A Case Study
In the television program “American Greed - Hackers : Operation Get Rich or Die Tryin’ “they explain the the reason most folks get into criminal hacking is because of credit and attention and not well thought out long term plans. The program also show how the team adapted to evade law enforcement measures by not being flashy and making spaced out recreational purchases such as cars and using cash when need be.

In the wider scope of financial protection and security in general, there are steps that administrators and security leads in financial related companies could take to create a better system. First, to think with security in mind when developing a system. This concept is doable but takes vision . Could you have imagined 10 years ago

You May Also Find These Documents Helpful

  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Maintaining and implementing of the security policies is one way that this can be accomplished, it is important the everyone knows their role in overall information security within the company.…

    • 717 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    To suggest an implementation of new systems that will help to reduce errors and fraudulent activity with in the financial accounting systems of the organisation, particularly payroll and improving the current systems relating to the storage of cheques and petty cash.…

    • 4123 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Small, midsized, and large businesses need effective controls to ensure that the business has the lowest risk rate possible. The lower the risk, the less likely that fraud would occur. In this analysis, Learning Team B will provide a proposal for appropriate controls to cover cash, sales, accounts receivable, inventory, and production. The team will discuss some prevention techniques to reduce these risks and make recommendations in areas that will help controls within the organization.…

    • 1546 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Santander is an example of a company who made sure that security is top of the game, the reason for this is this company deals with thousands of customers account details may it be for credit cards or store cards, each member of staff are put through training which explains all about data protection and what to do and not to do. The ways in which staffs are told to deal with the accounts are as…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    There are several things a manager has to consider when running a business. He or she must ensure that the company does what it needs to meet the needs of the customer, the employees, and protect all personal information. One way is to ensure that there are proper security measures to protect all data by making sure the employees are trained and understand the security protocols. Another way is by using the Systems Development Life Cycle (SDLC) method to help maintain the systems they have or need to conduct business. Businesses that follow the steps in the SDLC method and maintain a good information security system will keep the trust of its customers ensuring it remains profitable.…

    • 2427 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 1 Jiadai Gao

    • 596 Words
    • 2 Pages

    Financial institutions should implemented the following internal control procedures. The first one is Risk Assessment, which means financial institutions’ management should identifies, analyzes, and manages risks that can affect the company. The second one is Control Environment, this procedure require management of the institutions attitude toward, awareness of, and actions concerning the internal control structure to in order to reduce the fraud and error. The third one is Control Activities, which means that institutions’ management should enact specific policies and procedures to achieve the management objectives. What’s more, they should take necessary procedures to target the risks. The forth step is information and communications. Institutions should gather all necessary information to carry out internal controls. Providing, sharing and obtaining information is also very important, which is called communication. The last step is Monitoring. Which is an ongoing process to evaluate controls and determine whether all the operations are as intended. They changed when operating conditions change.…

    • 596 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are many ways to tighten up security when it comes to network security, but the most important part of the security in the actual user. If the user is not trained on the system and does not know ones regulations of the company then security is out the door. First and for most, the personal must continues training on the systems that they will have access to. Then there system must be prepared for the environment that they will be placed in. If the policy allows access to facebook then the server address won’t be blocked. If they don’t allow any other programs, software, or web sites then for work, then the computer must be set up for that purpose of working only. That is how one lowers the threat level on the user’s level. For authentication, authorization, and accounting the IT department must stay on top of their duties and have the passwords changed every so often. The IT team must also give the correct level of access to the person that is due it. And continue with follow ups on the system to insure that all is still well. For prevention they must try and stay one step ahead of the intruders. They must think like the hackers and try and get through their systems. For responding to intrusions a company should have a response team or a Disaster Recovery Team in place to act in cases of intrusions. There should be back systems in place to as not hinder the company day to day operation. Files should be backed up in a timely manner also. But a system is never fully…

    • 310 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    McBride Financial services’ main concern is to ensure security for its customers’ financial online application services, and making sure that the online information is protected. In order not to involve into a lawsuit from clients because of identity stolen, McBride Financial will implement a kind of internal security system so every employee can access the clients’ information. McBride Financial is also concerned with physical security of the computer system, and other security issues as the company’s success is based on client’s understanding of how their personal information is safe. (Apollo Group, 2003 )…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Operation Get Rich or Die Tryin' is just one example in a sea of inadequate security measures that is far too common in today corporations. The fact that TJX failed not only to notice the breach, but also to implement basic security measures is concerning enough. However, this inevitably leads us to ask if such a large corporation had this level of neglect, how pervasive is the lack of security in the industry? To answer the question, all we need to do is take a look at last couple of years in the news. We can see from a quick Google search that we've had hacks on Experian, Yahoo (in which I was personally affected), Sony and Uber, just to name a few. These are companies with which we are all familiar. and with vast amounts of capitol at their disposal. Yet somehow they still failed in their responsibility to safeguard some of our most…

    • 724 Words
    • 3 Pages
    Good Essays