.

Monday, March 11, 2019

Analysis of a Pertinent Issue in Management from an Internet

abstract of a Pertinent Issue in Management from an net income magazine ArticleThis is an analysis of Rodiers (2007) write up focusing on the change shape of stake instruction. First in the analysis is a discussion on in warranter management. Next, it embarks on the nominate points for a successful risk management. Fin everyy, it weighs the resoluteness of the articles recommendation.The net and digital legal proceeding argon a huge prospect for businesses like pious platitudes and other financial institutions. Businesses may cull to exploit this opportunity or be petrified and refuse to jump in the next big thing. The first option requires risk management plot the second option is plain risk avoidance that masks a larger riskthat of being obsolete and hence, come on of business. In the sample article, Rodier discusses risk management in the use or exploitation of a heavy(p) business opportunity rather than being obsolete or out of business. Hence in this sense, ri sk management is re all(prenominal)y an issue of opportunity management. Simply put, a business action is a risk value taking than inaction or doing nothing at all.Rodiers key points for successful risk management atomic twist 18 a) perseverance collaboration b) outsourcing specialize knowledge and c) being informed more or less trends that ar likely to turn into full blown threats in the operation of a business. Since the finance industry is affected as a whole, Rodier asserts that industry collaboration is necessary to restoration a risk such as organized crime from all parts of the world. This is sound observation since the industrys re origins combined nookie be a great force in countering a knockout threat. Moreover, instantaneous learning curves in the industry will be executable to counter the growing community of cyber criminals. Outsourcing specialized knowledge likewise contributes to faster problem resolution while being informed makes businesses adapt to cha nges in terms of threats, vulnerabilities, and the various modus operandi of cyber criminals.Finally, the articles final say in razz Williams quote is very sound risk management advice. Processes, community and technologies indeed deem to be consistently and constantly considered, reviewed, and changed. later on all action is ultimately the best risk management strategy than doing nothing at all.ReferenceRodier, M. (2007). Online Security Attacks Against Financial Institutions Rapidly Increasing. WallStreet & engine room. US CMP Media LLC. Retrieved October 7, 2007, from the WallStreet & applied science Web sites http//www.wallstreetandtech.com/ showArticle.jhtml?articleID=201806928 for page 1 and http//www.wallstreetandtech.com/online-security-attacks-against-financial-institutions-rapidly-increasing/d/d-id/1258922?page_ summate=2 for page 2.Required auxiliary of Reference knave 1Online Security Attacks Against Financial Institutions Rapidly Increasing As the reckon of swerve attacks continues to rise, experts say companies moldiness use triple factors of au becausetication, risk analysis and people to entertain themselves. By Melanie Rodier Wall Street & Technology September 17, 2007Hacking is a multibillion-dollar business. Gone be the days of teenagers sitting in their parents basements assay to hack into a companys computer remains just to turf out a point. Today, hacking is an organized crime enterprise and it is bigger than ever.The number of online hack attacks against relying organizations soared 81 percent in the first half of this year, according to U.S. security services provider SecureWorks. At the World Economic Forum in Davos earlier this year, Vint Cerf, one of the codevelopers of the TCP/IP standard that chthoniclies all Internet traffic, said up to a quarter of computers on the Internet government agency before long be use by cyber criminals in so-called botnets. Botnets are make up of large numbers of computers that m alicious hackers have brought under their control after infecting them with trojan virus programs. While most owners are oblivious to the infection, the networks of tens of thousands of computers are used to launch spam E-mail campaigns, denial-of-service attacks or online fraud schemes.Cerf, who now works for Google, likened the spread of botnets to a pandemic. Of the 600 one million million million computers currently connected to the Internet, between 100 million and 150 million are already part of these botnets, he said.The dramatic rise in the number of hack attacks is being driven by the increase in transactions now taking place online. People are depending on the Internet for all sorts of services, and as usage increases so does negative fraud, explains Joe Stensland, SVP at Scivantage, a provider of Web-based front- and middle-office solutions for financial services.And as the stakes rise, so does the sophistication take of attacks. Todays IT attacks are regional, targete d after specific people and companies, and entirely driven by profit, experts warn.Hackers are professional, motivated, have lots of cash and are doing it for the cash, says David Rand, CTO of security trustworthy Trend Micro. Its all about the money, and the money is huge. In todays underground economy, consumers stolen banknote information is currently priced at $1,000 to $5,000, a recognition card number with PIN is valued at $300, birth certificate information goes for $150, and a credit card number with security code and expiration watch is currently valued at $7 to $25, according to Rand.A large number of hackers are based in Eastern Europe. Its a big source of blackhat hackers who are finding vulnerabilities, says Gartner analyst Peter Firstbrook. But attacks are feeler from all over. Malicious Web servers are evenly distributed across the world, he adds, noting that attacks similarly originate in Brazil, India, Thailand, Argentina and the United States.An Elaborate Und erworldCriminals hold in in an elaborate networked underworld of Web sites and chat rooms, where they tout their wares and avidly recruit new members. They sell each other stolen account numbers, tools for devising credit cards, scanners to pick up card numbers and PINs from ATMs, and viruses and other malicious software, relates Karim Zerhouni, an analyst with BearingPoint. Recently, he says, criminals were offering on the Internet a Trojan virus for $600.They were even offering you one year of technical reinforcing stimulus for free with the Trojan, Zerhouni adds. With that you can target specific financial institutions to get all the information you want.Bulletin boards used by fraudsters are often even up up like eBay, with a reputation system, points out Louie Gasparini, chief engine room officer for the consumer solutions business unit with security vendor RSA. Theyll say, Hi, Im a trustworthy fraudster you can trust me. Or, Buyer beware fraudster unverified, he explai ns. Then you have sections talking about informants, where theyll say, Dont do business with John. He ripped me off. Theres also a whole training section Fraudster 101 which shows how to change billing addresses of credit cards, how to change PINs. They talk about new scams and new vulnerabilities.Online criminals are also quick to tailor their scams to any newsworthy event. When Wells Fargos computer system crashed in August, knocking out its Internet, telephone and ATM banking services for several(prenominal) hours, criminals immediately started discussing plans on bulletin boards to send out E-mails to the banks clients acknowledging the computer problems and request victims to log on to hypocrite Wells Fargo sites to reasonableate their user information, which could then be used to steal their account information.Required Attachment of Reference Page 2Online Security Attacks Against Financial Institutions Rapidly IncreasingAs the number of hack attacks continues to rise, ex perts say companies must use multiple factors of authentication, risk analysis and people to protect themselves. By Melanie Rodier Wall Street Technology September 17, 2007A Constant VigilSo how can companies protect themselves against the looming threat of hackers? One key is to be constantly aware of the threats lurking on the Internet. As such, security watchdog Financial Services Information share and Analysis Center (FS-ISAC) announced a partnership with MessageOne to provide urgent, amply automated cyber (and physical) security alerts to its 4,000-member firms. Members are automatically notified of a new threat by their preferred method of communication cell phone, E-mail, home phone, etc. Firms also receive recommendations for solutions and can join conference calls to brainstorm about the threats.Smaller organizations that might not have invested in top-notch security need to be particularly vigilant. Everyone is going to concentrate on large institutions such as Citigr oup, says BearingPoints Zerhouni. But since a bigger firm usually has relatively tight security, The value of hacking into them is not very high, he adds. But a small community bank with lesser defenses still might have more than $100 million in assets, Zerhouni notes.Security professionals agree that multifactor authentication is essential. You have to make sure the people who come through the front door are who they say they are. Experts apprize that employees or clients should input at least two or threesome nuggets of information before they receive access to a network.To prevent phishing, users also can be asked to recognize a picture they had previously selected. Tokens, which are increasingly popular in the financial industry and are used by firms such as JPMorgan, provide a new six- or seven-digit password every 15 seconds a better method than trying to commit a range of different passwords to human memory. (According to a late RSA survey, almost a quarter of employees a re required to remember 15 passwords or more at work.)But while having multiple layers of security is important, it is not enough. Once hackers are able to phish for one thing, they can phish for others. Plus, it wont protect you from at bottom threats, such as if an employee puts an infected USB device in their own office computer, says Zerhouni. This happened at one bank, and 5,000 credit reports were compromised.Ultimately, experts say, the best solution is to use multiple methods of authentication in conjunction with risk analysis looking at someones normal behavior, such as an IP address usually primed(p) in Manhattan, and verifying that this behavior is consistent.Bank of America, for instance, uses RSAs SiteKey to help clients recognize that theyre at the valid online banking site at Bank of America, rather than at a phony look-alike site, and to help the bank recognize the clients as the true owners of the accounts. SiteKey is made up of three parts an image, an image ru bric and three repugn questions. If a user suddenly signs on from a different computer, the bank asks one of the clients challenge questions to verify his or her identity. If answered correctly, the secret SiteKey image title and image will then appear.However, no single method is foolproof. Ultimately, says Josh Williams, manager in the business consulting practice for Devon, Pa.-based SMART Business informatory and Consulting, Any solution has to be a blend of processes and people and

No comments:

Post a Comment