This website uses cookies to ensure you have the best experience. Learn more

Electronic Break Ins And Unauthorized Access Essay

1226 words - 5 pages

Electronic Break-Ins
As technology becomes more integrated into our everyday lives, it becomes necessary to take precautions when dealing with sensitive information and technology. The Internet is a prominent tool in today’s society, and will be used against people for many years to come. As technology grows larger, it increases the impact a malicious attack can have. Cybercrime is a special category of criminal acts that are typically executed through the utilization of computer and network technologies. Electronic Break-Ins is one of the categories of cybercrime.
“Electronic break-ins and unauthorized access are clear cut cases of unwanted intrusion, and the most serious form is cyber espionage. “ (Spinello)
In late 2013, the Federal Reserves had made a large announcement indicating that it would not be tapering its bond buying program. While the time of its release was carefully organized, someone in Chicago, Illinois managed to get this information early (in this instance, 7 milliseconds early), and placed large orders based off of this decision and a grand total of $600 million dollars in assets changed hands before most other traders had heard of it. How could this have happened? It takes seven milliseconds for the information to get from Washington to Chicago through fiber optic cables, yet these orders were placed on Chicago exchanges two to three seconds after 2 p.m. The subscribers of this data received the information milliseconds before others in Chicago that were relying on transmissions from the federal reserve in Washington to arrive. It isn’t clear whether this is a violation of the Federal Reserve’s rules to transmit information out of the lockout room before 2 p.m. if the information was pre-loaded into servers in Chicago for release at 2 p.m. (Aguilar) The Feds had a lack of clarity about the laws that were supposed to be followed, but the staffers at the event took several precautions designed to prevent the data from leaving the building early.
1. 1:45 – Doors are locked and everyone is out.
2. 1:50 – Staffers hand out hard copies of the statement to allow a few minutes for the reporters to digest the complicated document.
3. 1:58 – Reporters are escorted out of the room and into the camera room.
4. A few moments before 2 phone lines were opened up, but all communication with any external sources is forbidden.
5. All media personnel present were required to sign an agreement to the above schedule.
(Drum)
How could this have been prevented? The Federal Reserve could have taken control of the disbursement of the information, using its resources to guarantee the arrival of the information in all places at the previously mentioned time. This is the most logical conclusion to draw as the mishandling of information had consumers hurting themselves. Innocent third party individuals were being harmed by the vague rules and guidelines associated with such big news, and the Federal Reserve should take the opportunity to make sure the...

Find Another Essay On Electronic Break-Ins and Unauthorized Access

Computer Hacking Essay

2087 words - 8 pages Precis of 'Who's reading your E-mail" by Richard Behars The article exposes the vulnerability of computer data and of corporations with the popularity of the Internet. The Internet can allow hackers access to any computer in the world, with understated ease. Break-ins can go virtually undetected Major corporations and government security departments have acknowledged that hacker break-ins are out of control. Some companies are too fearful to

Computer Hacking Essay

1929 words - 8 pages Precis of 'Who's reading your E-mail"The article exposes the vulnerability of computer data and ofcorporations with the popularity of the Internet. The Internet canallow hackers access to any computer in the world, with understatedease. Break-ins can go virtually undetected.Major corporations and government security departments haveacknowledged that hacker break-ins are out of control. Some companiesare too fearful to join networks because of

Internet security

1862 words - 7 pages break-ins during the past two years; 17 respondents had losses over $1 million' ('November 1995 Feature'). In a survey conducted by Computer Security and the FBI, 53 percent of 428 respondents said they were victims of computer viruses; 42 percent also said that unauthorized use of their systems had occurred within the last 12 months (Rothfeder, 'November 1996 Feature' 1).While electronic attacks are increasing more rapidly than any other kind, a

From Hacking to Cyber Terrorism

4086 words - 16 pages , identifies security flaws in computer systems and produced excellent computer programmers. We have also seen negative side of it - violates right to privacy and security (e.g unauthorized access, security break ins), causes inconvenience to people (e.g. denial of service), gets used for criminal activities (e.g. financial fraud, threat, terrorism). Hacking also indirectly makes victim organizations to provide misinformation to their customers

Computer Crime in the 90's

2338 words - 9 pages password of network users as they log in, jeopardizing security at a site. Whoever installs the sniffer can then impersonate an authorized user and log in to access restricted documents. Laws are not yet up to adequately prosecute a person for impersonating another person on-line, but laws designed to prevent unauthorized access to information may be effective in apprehending hackers using sniffer programs. The Wall Street Journal suggest in recent

State-Based Computer Abuse Laws

983 words - 4 pages Omnibus federal cybercrime statute (18 U.S. Code § 1030). The statute addresses crimes that target the federal government, financial institutions or those used in interstate or foreign commerce. Briefly, these laws address the following crimes, that if committed, can be prosecuted by the federal government: a) unauthorized entry into a government computer and unlawfully disclosing confidential information. b) unauthorized access into a computer

Policay Statement for Tucker Inc

917 words - 4 pages unauthorized access. Controls shall be in place to ensure that only personnel with the proper authorization and a need to know are granted access to Tucker Inc. systems and their resources. Remote access shall be controlled through identification and authentication mechanisms. 1.3 Access Granting Decisions—Access to Tucker Inc. sensitive information must be provided only after the written authorization of the Data Owner has been obtained. Access

The Impact of Emerging Technology on the Public Sector

5008 words - 20 pages break-ins, computer viruses and other hostile attacks. Most persons would believe there is a degree of protection for information given the current level of security and protocol one must follow in order to access information. Password and username designations are very common tools used to access information while server protections such as firewall are used for protection. However, these tools are often not enough to protect most information

Computer Sabotage: Made Possible by Human Error

1277 words - 6 pages ”, blaming the incident directly on the person operating the system rather than the system itself. While there is a little wiggle room here, since there is almost always room for improvement in any system, it is not far off. When speaking of computer sabotage we are referring to the disruption, or destruction, of a system by malware. However, unlike electronic break-ins, where hackers gain unauthorized access to a system, computer sabotage almost always

Scheier's (2006) article

5832 words - 23 pages inventory, theft of funds and incorrect financial reporting can be conducted by internal employees of an organization. Furthermore, outsiders are also able to access unauthorized information through electronic exchange of data if proper controls are not installed. Controls such as password, authorities, firewall, encryption, segregation of duties, and auditing, physical controls over assets contribute to reducing crimes conducted by both internal

Security: Physical Access Controls

957 words - 4 pages 1. Walls, Fencing, and Gates: Oldest but one of the most reliable methods of keeping unauthorized individuals from gaining access to resources. The NWU has two main gates at the entrance of the university. To enter the gate you must have student card. There are roller gates at the computer facilities on the top floor where a student needs to swipe his or her student card in order to gain access. The NWU also have walls and fencing around the

Similar Essays

A Report On Network Security Based On The Text: Ahuja, V. (1996). Network & Internet Security. Massachusetts: Academic Press Inc

1343 words - 5 pages , write, or update a give file. Access control is the next concept. This concept pertains to the process of enforcing access rights for network resources. Access control grants or denies permission to a given user for access a resource and protects resources by limiting access to only authenticated and authorized users. Confidentiality is the process used to protect secret information from unauthorized disclosure. Data integrity allows detection

Computer Hacking Essay

1065 words - 4 pages of hacking are used to gain access to unauthorized data. Hacking can be as easy as erasing data off of a computer or as intense as causing various systems and/or networks to fail.There are various ways to prevent hackers from entering your system. The key is to maintain access control, preserve strength of data and build a disaster recovery plan. Such as the installation and updating of virus software, firewalls to make external break-ins more

Internal Control Essay

871 words - 3 pages and storage cabinets for inventories and records. This is not as secure as a safe because locks are easier to remove than trying to get into a safe. A computer facility with a pass key access or fingerprint or eyeball scan is also a physical control. This is also a very secure method as only the authorized people would have access. There are several mechanical and electronic controls available. There are alarms to prevent break-ins

Internet Security Essay

1601 words - 7 pages conducted by Computer Security and the FBI, 53percent of 428 respondents said they were victims of computer viruses; 42percent also said that unauthorized use of their systems had occurred within the last 12 months (Rothfeder, "November 1996 Feature" 1).While electronic attacks are increasing more rapidly than any other kind, a large number of data break-ins are from the inside. Ray Jarvis, President of Jarvis International Intelligence, says "In