Question

In: Accounting

The controller of a small business received the following e-mail with an authentic-looking e-mail address and...

The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo:

From: Big Bank [[email protected]]

To: Justin Lewis, Controller, Small Business USA

Subject: Official Notice for all users of Big Bank!

Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com

Please confirm your account information as soon as possible. Failure to confirm your account information will require us to suspend your account until confirmation is made.

A week later, the following e-mail was delivered to the controller:

From: Big Bank [[email protected]]

To: Justin Lewis, Controller, Small Business USA

Subject: Official Notice for all users of Big Bank!

Dear Client of Big Bank,

Technical services at Big Bank is currently updating our software. Therefore, we kindly ask that you access the website shown below to confirm your data. Otherwise, your access to the system may be blocked.web.da-us.bigbank.com/signin/scripts/login2/user_setup.jsp

We are grateful for your cooperation.

REQUIRED

a. What should Justin do about these e-mails?

b. What should Big Bank do about these e-mails?

c. Identify the computer fraud and abuse technique illustrated.

Solutions

Expert Solution

(a): Here it is clear that the email sent to Justin is just an attempt to acquire confidential information and the information will then be used for illicit purposes by the sender of the email. Hence Justin should take systematic actions with regards to these e-mails. First of all he should notify and inform all employees of his organization that the e-mail is fraudulent and that no one should reply to these e-mails. Next he should ensure that all employees are aware about how to deal with such fraudulent e-mails. He can organize a training and orientation program for employees if there is a need for the same to educate them with regards to such fraud practices. Lastly he should notify Big Bank about the e-mail.

(b): Big-Bank should start by immediately alerting all its customers that they should not respond to any e-mails that is asking them to provide their confidential banking related information. The bank should also request its customers to forward them such mails so that they can take reasonable actions and steps in this regard. Next the bank should investigate these e-mails and then should put proper remedial measures in place so as to ensure that the interest of its account holders is protected. Lastly the bank should notify the law enforcement agencies to ensure that legal action is taken against the sender of these e-mails.

(c ): The computer fraud and abuse technique that has been illustrated here is called phishing. Phishing is a cybercrime in which the targets are usually contacted by e-mails or phone calls and the targets are then lured to provide their confidential and sensitive information like credit card details or bank details etc.


Related Solutions

Imagine that you have received an e-mail from Ammar who attempt to open his own business...
Imagine that you have received an e-mail from Ammar who attempt to open his own business and knew that you are taking an entrepreneurship course at UNITEN. He asked you to explain briefly about the business plan. Relate to him about the good of business plan. Subject: Entrepreneurship
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A...
A small company involved in​ e-commerce is interested in statistics concerning the use of​ e-mail. A poll found that 37% of a random sample of 1122 adults, who use a computer at their​ home, work, or​ school, said they do not send or receive​ e-mail. Complete parts a through e. ​a) Find the margin of error for this poll if we want 90​% confidence in our estimate of the percent of American adults who do not use​ e-mail. b.) Explain...
Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating...
Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating spam e-mails as soon as they hit an inbox. To examine one such product, a manager randomly sampled his daily emails for 50 days after installing spam software. A total of 374 e-mails were received, of which 15 were spam. Is there evidence that the proportion of spam getting through is greater than 2%? α = 0.10 a. State your hypotheses. b. Which hypothesis...
12. When you send someone an e-mail address, it travels across the Internet to the ____________________...
12. When you send someone an e-mail address, it travels across the Internet to the ____________________ e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.
Which of the following business messages would not use the direct strategy? a. An e-mail message...
Which of the following business messages would not use the direct strategy? a. An e-mail message to a staff introuducing a new employee b. A letter a customer denying his or her request for credit c. A letter to a coworker congratulating him or her on a recent promotion d. An oral presentation detailing the specifics of a new company wellness initiative
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the message is clumsy and fails to include essential information in revealing security breaches to customers. Your Task. List at least seven weaknesses Revise this message using the suggestions you learned in this chapter about security breach messages. To: Kara Khalial [[email protected]] From: Justin Small [[email protected]] Subject: Customer Security Incident at Princeton Payment Systems Cc: Bcc: Companies and individuals across the country are experiencing more...
Must be in C#: 7. E-MAIL ADDRESS BOOK Create a Windows Forms Application with a class...
Must be in C#: 7. E-MAIL ADDRESS BOOK Create a Windows Forms Application with a class named PersonEntry. The PersonEntry class should have properties for a person’s name, e-mail address, and phone number. Also, create a text file that contains the names, e-mail addresses, and phone numbers for at least five people. When the application starts, it should read the data from the file and create a PersonEntry object for each person’s data. The PersonEntry objects should be added to...
A purchasing department received the following e-mail. Dear Accounts Payable Clerk, You can purchase everything you...
A purchasing department received the following e-mail. Dear Accounts Payable Clerk, You can purchase everything you need online—including peace of mind—when you shop using Random Account Numbers (RAN). RAN is a free service for Big Credit Card customers that substitutes a random credit card number in place of your normal credit card number when you make online purchases and payments. This random number provides you with additional security. Before every online purchase, simply get a new number from RAN to...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent by the CEO to all employees. Step 1: Identify five or more weaknesses describing why each is a weakness. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           Staff Members From:          G. B. Goldman <[email protected]> Subject: Hackers!                 Staff Members: This is to inform you that, like other banks, we are afraid of hackers....
Consider a small business you want to create. In your post, address the following: What type...
Consider a small business you want to create. In your post, address the following: What type of business would you create? Conduct some research on companies offering a similar product. What distinguishes you from your competitors? Name 2-3 risks you need to consider in your new venture? Consider the risk factors similar companies may have encountered. How could you leverage e-commerce and social media to make your business profitable?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT