Page 342 - Introduction to Electronic Commerce and Social Commerce
P. 342

References                                                                                      329

             The Results                                      Cluley, G. “Phishing and Diet Spam Attacks Hit Twitter Users.” Cluley
                                                                Associates Limited, January 9, 2014. grahamcluley.com/2014/01/
                                                                phishing-diet-spam-attacks-hit-twitter-users (accessed April 2016).
           According to the bank’s information security administrator,   Constantin, L. “Identity Thieves Obtain 100,000 Electronic Filing PINs
           although the number of schemes has not decreased, the num-  from IRS System.” IDG News Service, February 10, 2016.
           ber of employees reporting such schemes has increased   CyberSource. 14th Annual 2013 Online Fraud Report, CyberSource
           significantly.                                       Corporation (2013).
                                                              Dawn Ontario. “Virus Information: Guide to Computer Viruses.” n.d.
              To read BankWest’s tips on how to protect yourself   Dog Breed Info Center. “Examples of Scam E-Mails.” n.d. dogbreed-
           against identity theft, phishing, and so forth, see bankwest-  info.com/internetfraud/scamemailexamples.htm (accessed April
             sd.com/etc.htm.                                    2016).
              Sources: Based on Kitten (2010) and BankWest (2016).  EMC/RSA. “2013 A Year in Review.” Report # JAN RPT 0114, January
                                                                2014. emc.com/collateral/fraud-report/rsa-online-fraud- report-
                                                                012014.pdf (accessed April 2016).
             Questions                                        Fink, E. “Google Glass Wearers Can Steal Your Password.” CNN News,
             1.  List the major security problems faced by BankWest and   July 7, 2014. money.cnn.com/2014/07/07/technology/security/google-
                                                                glass-password-hack (accessed May 2016).
              relate them to the attack methods described in Sections
                                                              Finkle, J.  “‘Pony’ Botnet Steals Bitcoins, Digital Currencies:
              10.2, 10.3, and 10.4.                             Trustwave.” Reuters.com US Edition, February 24, 2014. reuters.
             2.  In what ways is BankWest helping to stop scams before   com/article/2014/02/24/us-bitcoin-security- idUSBREA1N1
              they cause damage?                                JO20140224 (accessed April 2016).
                                                              Forrest, C. “Phishing Gets More Dangerous: New Report Analyzes the
             3.  Given the problems of BankWest and its solutions, can
                                                                Weapons of Choice.” TechRepublic, January 27, 2016.
              you suggest an even better defense mechanism?   Frenkel, K. A. “2016 Has the Markings of a Perfect Storm for Fraud.”
                                                                CIO Insight, January 28, 2016.
                                                              Goldman, D. “Hacker Hits on U.S. Power and Nuclear Targets Spiked
             ONLINE FILES                                       in 2012.” January 9, 2013.  money.cnn.com/2013/01/09/technol-
                                                                ogy/security/infrastructure-cyberattacks (accessed April 2016).
                                                              Goldman, J.  “Data Breach Roundup: January 2014.” February 14,
           Available at ecommerce-introduction-textbook.com     2014a. esecurityplanet.com/network-security/data-breach- roundup-
                                                                january-2014.html (accessed April 2016).
           W10.1   Application Case: How Seattle’s Hospital Survived a   Goldman, D. “Take Down Any Website for $3.” CNN News, December
                  Bot Attack.                                   31, 2014b. money.cnn.com/2014/12/31/technology/lizard-squad-
                                                                attack (accessed April 2016).
                                                              Goodchild, J.  “Policy-Based Security and Access Control.” April 5,
                                                                2011.  csoonline.com/article/2128022/mobile-security/case-stud-
           References                                           -olicy-based-security-and-access-control.html  (accessed April
                                                                2016).
           Alto, P. “Infographic:  The Real Cost of Cyberattacks.”  Enterprise   Goodman, M. Future Crimes: Inside the Digital Underground and the
              Innovation, March 21, 2016.                       Battle for our Connected World. New York: Anchor Reprint, 2016.
           Andress, J.  The Basics  of Information Security, Second Edition:   Greengard, S. “Breaches of Health Care Data: A Growing Epidemic.”
              Understanding the Fundamentals of InfoSec in Theory and Practice.   Baseline, February 12, 2016.
              Rockham, MA: Syngress Pub., 2014.               Harrison, V., and J. Pagliery. “Nearly 1 Million New Malware Threats
           Apps, P., and J.  Finkle. “Suspected Russian Spyware  Turla  Targets   Released Everyday.” CNN News, April 14, 2015.
              Europe, United States.” Reuters.com U.S. Edition, March 7, 2014.   Harwood, M. Internet Security: How to Defend Against Attackers on
              reuters.com/article/2014/03/07/us-russia-cyberespionage-   the Web (Jones & Bartlett Learning Information Systems Security &
              insight-idUSBREA260YI20140307 (accessed April 2016).  Assurance), 2nd edition. Burlington, MA: John Bartlett Learning,
           BankWest. “About Us.” bankwest-sd.com/about.htm (accessed April   2015.
              2016).                                          Hinckley, S. “Pay by Selfie? Amazon Says Your Portrait Can Protect
           Bort, J. “For the First Time, Hackers Have Used a Refrigerator to Attack   Online Purchases.” CSMonitor, March 15, 2016.
              Businesses.” Business Insider, January 16, 2014.  Horowitz,  D.,  and A.  Horowitz.  “Online  Merchandise  Scams Target
           Cannell, J.  “Cryptolocker Ransomware:  What You Need to Know.”   Students.” The Costco Connection, December 2015.
              October 8, 2013.  blog.malwarebytes.org/intelligence/2013/10/  Jennings, R. “This Hollywood Hospital Didn’t Backup Its Data?
              cryptolocker-ransom (accessed April 2016).        “Ransomware” Payday for Evil Hackers.” Computerworld, February
           Casti, T. “Phishing Scam Targeting Netflix May Trick You With Phony   18, 2016.
              Customer Service Reps.” The Huffington Post Tech, March 3, 2014a.   John, A. Internet Security. Publisher: Self-Publishing, 2016.
              huffingtonpost.com/2014/03/03/netflix-phishing-scam-   Jones, M. “Facebook Tests Tool that Identifies Fake Accounts.” Value
              customer-support_n_4892048.html (accessed April 2016).  Walk, March 24, 2016.
           Casti,  T.  “Scammers are  Targeting  Netflix  Users Again,  Preying  on     Kaiser, T. “Hackers Use Refrigerator, Other Devices to Send 750,000
              the Most Trusting among Us.” The Huffington Post Tech, April 17,   Spam Emails.” January 17, 2014. dailytech.com/Hackers+Use+Re
              2014b.  huffingtonpost.com/2014/04/17/netflix-comcast- phishing-   frigerator+Other+Devices+to+Send+750000+Spam+Emails+/
                _n_5161680.html (accessed April 2016).          article34161.htm (accessed April 2016).
           Cloud, J. Internet Security: Online Protection from Computer Hacking.   Kan, M. “Alibaba Uses Facial Recognition Tech for Online Payments.”
              North Charleston, USA: CreateSpace Publishing Platform, 2015.  Computer World, March 16, 2015.
   337   338   339   340   341   342   343   344   345   346   347