hacking-economic espionage

18
Hacking-Economic Espionage Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Upload: zwi

Post on 23-Feb-2016

52 views

Category:

Documents


5 download

DESCRIPTION

Hacking-Economic Espionage. Aksana Chornenkaya, Sherin Hassan, & Meagan Moore. Goals of Presentation. Explain how cyber hacking and economic espionage has evolved over the past century Examples of hacker groups Examples of victims of hacking and economic espionage Acts and Regulations - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Hacking-Economic Espionage

Hacking-Economic

EspionageAksana Chornenkaya, Sherin Hassan, & Meagan Moore

Page 2: Hacking-Economic Espionage

Explain how cyber hacking and

economic espionage has evolved over the past century

Examples of hacker groups Examples of victims of hacking and

economic espionage Acts and Regulations Prevention

Goals of Presentation

Page 3: Hacking-Economic Espionage

Importance to accounting students and

business professionals.

Huge threat to companies, domestic and global.

Growth of technology and reliance on information-based systems.

Importance

Page 4: Hacking-Economic Espionage

What is a Hacker?

“A person who finds weaknesses in a computer

system and exploits it.”

“Someone involved in the exploration of technology.”

Page 5: Hacking-Economic Espionage

Hacker Groups

• Warelords• Midwest Pirates Guild• 414’s• Legion of Doom• Many more…….

Page 6: Hacking-Economic Espionage

Until it was passed, breaking into

computer systems was not an illegal or criminal act.

Passed by Congress in 1986

Hacking IS a CRIME!!!!

Computer Fraud & Abuse Act

Page 7: Hacking-Economic Espionage

Operation Sundevil - 1990

Secret Services began raiding and arresting hackers

Involved in credit card theft, telephone and wire fraud

Operation Sundevil

Page 8: Hacking-Economic Espionage

DOS attacks

Viruses

Malware - Worms

Evolution of Hacking

Page 9: Hacking-Economic Espionage

Black Hat Hackers – Malicious

White Hat Hackers – Ethical hackers

Grey Hat Hackers

Types of Hackers

Page 10: Hacking-Economic Espionage

Misappropriation of assets Inventory theft Insider trading Credit card fraud False invoices Revenue misstatement Expense account abuse

Effects of Hacking on a Co.

Page 11: Hacking-Economic Espionage

Accountants must be aware of the

threats Internal auditors must develop

processes and controls to prevent hacks Must work with external auditors to

identify security controls Advances in technology increased

opportunities for fraud

Importance for Accountants

Page 12: Hacking-Economic Espionage
Page 13: Hacking-Economic Espionage

Fierce competitive pressures

Improvements in eavesdropping technology

Weakest link: Employees

Motivation for Economic Espionage

Page 14: Hacking-Economic Espionage

Most Publicized Cases

Toshiba vs. Lexar

Davis vs. Gillette

Reuters vs. Bloomberg

Page 15: Hacking-Economic Espionage

Passed in 1996

Failed to curtail the problem

Companies were reluctant to seek prosecution

Economic Espionage Act

Page 16: Hacking-Economic Espionage

SOX Section 404 Proactive and reactive approach Strong internal auditing

department Strong IT controls Physical access controls Employee training

Ways to Reduce Hacking and EE

Page 17: Hacking-Economic Espionage

Companies that implement strong

IT controls, physical access controls, nondisclosure agreements

and background checks make it harder for hackers or employees to

breach systems and acquire proprietary information.

In Conclusion

Page 18: Hacking-Economic Espionage

QUESTIONS?