18
Hacking-Economic Espionage Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Embed Size (px)

Citation preview

Page 1: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Hacking-Economic

EspionageAksana Chornenkaya, Sherin Hassan, & Meagan Moore

Page 2: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Explain how cyber hacking and

economic espionage has evolved over the past century

Examples of hacker groups Examples of victims of hacking and

economic espionage Acts and Regulations Prevention

Goals of Presentation

Page 3: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Importance to accounting students and

business professionals.

Huge threat to companies, domestic and global.

Growth of technology and reliance on information-based systems.

Importance

Page 4: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

What is a Hacker?

“A person who finds weaknesses in a computer

system and exploits it.”

“Someone involved in the exploration of technology.”

Page 5: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Hacker Groups

• Warelords• Midwest Pirates Guild• 414’s• Legion of Doom• Many more…….

Page 6: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Until it was passed, breaking into

computer systems was not an illegal or criminal act.

Passed by Congress in 1986

Hacking IS a CRIME!!!!

Computer Fraud & Abuse Act

Page 7: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Operation Sundevil - 1990

Secret Services began raiding and arresting hackers

Involved in credit card theft, telephone and wire fraud

Operation Sundevil

Page 8: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

DOS attacks

Viruses

Malware - Worms

Evolution of Hacking

Page 9: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Black Hat Hackers – Malicious

White Hat Hackers – Ethical hackers

Grey Hat Hackers

Types of Hackers

Page 10: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Misappropriation of assets Inventory theft Insider trading Credit card fraud False invoices Revenue misstatement Expense account abuse

Effects of Hacking on a Co.

Page 11: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Accountants must be aware of the

threats Internal auditors must develop

processes and controls to prevent hacks Must work with external auditors to

identify security controls Advances in technology increased

opportunities for fraud

Importance for Accountants

Page 12: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore
Page 13: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Fierce competitive pressures

Improvements in eavesdropping technology

Weakest link: Employees

Motivation for Economic Espionage

Page 14: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Most Publicized Cases

Toshiba vs. Lexar

Davis vs. Gillette

Reuters vs. Bloomberg

Page 15: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Passed in 1996

Failed to curtail the problem

Companies were reluctant to seek prosecution

Economic Espionage Act

Page 16: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

SOX Section 404 Proactive and reactive approach Strong internal auditing

department Strong IT controls Physical access controls Employee training

Ways to Reduce Hacking and EE

Page 17: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

Companies that implement strong

IT controls, physical access controls, nondisclosure agreements and

background checks make it harder for hackers or employees to breach

systems and acquire proprietary information.

In Conclusion

Page 18: Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

QUESTIONS?