Question

In: Computer Science

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.

1. Identify the malware attack experienced in the above scenario

2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations

Solutions

Expert Solution

1.

Keylogger malware is the malware attack technique that can be used to steal login passwords and other confidential type data into system. This malware technical especially used for stealing user's id and password as this method works by tracking the user's keyboard stroke.

2.

Prevention in case when the attack is suspected by the user. In this case the user should immediately disconnect the system from internet connection and call the run the security software and check for malware or any threats. Network and system should be kept updated.

Prevention in case when the attacker is stealing money, immediately disconnect from the network, call banks, insurance, social media support and others as such to instruct them for blocking individual's account temporarily.

Also, arranging a security service firm immediately to eliminate and get rid of malware threat as soon as possible. The security firm may run various antivirus and other related toolkits to scan and fix the threat.

Network and system should have zero glitches and to be kept updated every time.

Filing a complaint about the incident can provide to get back the loss in some way.


Related Solutions

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to...
Three people A, B, and C practice shooting at a target. The probability that A, B,...
Three people A, B, and C practice shooting at a target. The probability that A, B, and C hit the target is 0.9, 0.8 and 0.6, respectively. 1) Now select any one of them at random, what is the probability that the person selected hits the target? 2) If the person actually hit target, what is the probability that the person selected is A? 3) If the person selected shoots once more, what is the probability that he hits the...
should matthew hale be allowed to practice law for his races view? by denying him the...
should matthew hale be allowed to practice law for his races view? by denying him the license to practice law because he overtly admitted to this racist views, did the bar committee violate his freedom of expression?
Non-certified individuals are still allowed to practice software engineering. Discuss the pros and cons of this
Non-certified individuals are still allowed to practice software engineering. Discuss the pros and cons of this
. How does Market Segmentation define possible target markets? Illustrate a best practice to segmenting product...
. How does Market Segmentation define possible target markets? Illustrate a best practice to segmenting product markets. Provide lots of examples.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT