Page 342 - Introduction to Electronic Commerce and Social Commerce
P. 342
References 329
The Results Cluley, G. “Phishing and Diet Spam Attacks Hit Twitter Users.” Cluley
Associates Limited, January 9, 2014. grahamcluley.com/2014/01/
phishing-diet-spam-attacks-hit-twitter-users (accessed April 2016).
According to the bank’s information security administrator, Constantin, L. “Identity Thieves Obtain 100,000 Electronic Filing PINs
although the number of schemes has not decreased, the num- from IRS System.” IDG News Service, February 10, 2016.
ber of employees reporting such schemes has increased CyberSource. 14th Annual 2013 Online Fraud Report, CyberSource
significantly. Corporation (2013).
Dawn Ontario. “Virus Information: Guide to Computer Viruses.” n.d.
To read BankWest’s tips on how to protect yourself Dog Breed Info Center. “Examples of Scam E-Mails.” n.d. dogbreed-
against identity theft, phishing, and so forth, see bankwest- info.com/internetfraud/scamemailexamples.htm (accessed April
sd.com/etc.htm. 2016).
Sources: Based on Kitten (2010) and BankWest (2016). EMC/RSA. “2013 A Year in Review.” Report # JAN RPT 0114, January
2014. emc.com/collateral/fraud-report/rsa-online-fraud- report-
012014.pdf (accessed April 2016).
Questions Fink, E. “Google Glass Wearers Can Steal Your Password.” CNN News,
1. List the major security problems faced by BankWest and July 7, 2014. money.cnn.com/2014/07/07/technology/security/google-
glass-password-hack (accessed May 2016).
relate them to the attack methods described in Sections
Finkle, J. “‘Pony’ Botnet Steals Bitcoins, Digital Currencies:
10.2, 10.3, and 10.4. Trustwave.” Reuters.com US Edition, February 24, 2014. reuters.
2. In what ways is BankWest helping to stop scams before com/article/2014/02/24/us-bitcoin-security- idUSBREA1N1
they cause damage? JO20140224 (accessed April 2016).
Forrest, C. “Phishing Gets More Dangerous: New Report Analyzes the
3. Given the problems of BankWest and its solutions, can
Weapons of Choice.” TechRepublic, January 27, 2016.
you suggest an even better defense mechanism? Frenkel, K. A. “2016 Has the Markings of a Perfect Storm for Fraud.”
CIO Insight, January 28, 2016.
Goldman, D. “Hacker Hits on U.S. Power and Nuclear Targets Spiked
ONLINE FILES in 2012.” January 9, 2013. money.cnn.com/2013/01/09/technol-
ogy/security/infrastructure-cyberattacks (accessed April 2016).
Goldman, J. “Data Breach Roundup: January 2014.” February 14,
Available at ecommerce-introduction-textbook.com 2014a. esecurityplanet.com/network-security/data-breach- roundup-
january-2014.html (accessed April 2016).
W10.1 Application Case: How Seattle’s Hospital Survived a Goldman, D. “Take Down Any Website for $3.” CNN News, December
Bot Attack. 31, 2014b. money.cnn.com/2014/12/31/technology/lizard-squad-
attack (accessed April 2016).
Goodchild, J. “Policy-Based Security and Access Control.” April 5,
2011. csoonline.com/article/2128022/mobile-security/case-stud-
References -olicy-based-security-and-access-control.html (accessed April
2016).
Alto, P. “Infographic: The Real Cost of Cyberattacks.” Enterprise Goodman, M. Future Crimes: Inside the Digital Underground and the
Innovation, March 21, 2016. Battle for our Connected World. New York: Anchor Reprint, 2016.
Andress, J. The Basics of Information Security, Second Edition: Greengard, S. “Breaches of Health Care Data: A Growing Epidemic.”
Understanding the Fundamentals of InfoSec in Theory and Practice. Baseline, February 12, 2016.
Rockham, MA: Syngress Pub., 2014. Harrison, V., and J. Pagliery. “Nearly 1 Million New Malware Threats
Apps, P., and J. Finkle. “Suspected Russian Spyware Turla Targets Released Everyday.” CNN News, April 14, 2015.
Europe, United States.” Reuters.com U.S. Edition, March 7, 2014. Harwood, M. Internet Security: How to Defend Against Attackers on
reuters.com/article/2014/03/07/us-russia-cyberespionage- the Web (Jones & Bartlett Learning Information Systems Security &
insight-idUSBREA260YI20140307 (accessed April 2016). Assurance), 2nd edition. Burlington, MA: John Bartlett Learning,
BankWest. “About Us.” bankwest-sd.com/about.htm (accessed April 2015.
2016). Hinckley, S. “Pay by Selfie? Amazon Says Your Portrait Can Protect
Bort, J. “For the First Time, Hackers Have Used a Refrigerator to Attack Online Purchases.” CSMonitor, March 15, 2016.
Businesses.” Business Insider, January 16, 2014. Horowitz, D., and A. Horowitz. “Online Merchandise Scams Target
Cannell, J. “Cryptolocker Ransomware: What You Need to Know.” Students.” The Costco Connection, December 2015.
October 8, 2013. blog.malwarebytes.org/intelligence/2013/10/ Jennings, R. “This Hollywood Hospital Didn’t Backup Its Data?
cryptolocker-ransom (accessed April 2016). “Ransomware” Payday for Evil Hackers.” Computerworld, February
Casti, T. “Phishing Scam Targeting Netflix May Trick You With Phony 18, 2016.
Customer Service Reps.” The Huffington Post Tech, March 3, 2014a. John, A. Internet Security. Publisher: Self-Publishing, 2016.
huffingtonpost.com/2014/03/03/netflix-phishing-scam- Jones, M. “Facebook Tests Tool that Identifies Fake Accounts.” Value
customer-support_n_4892048.html (accessed April 2016). Walk, March 24, 2016.
Casti, T. “Scammers are Targeting Netflix Users Again, Preying on Kaiser, T. “Hackers Use Refrigerator, Other Devices to Send 750,000
the Most Trusting among Us.” The Huffington Post Tech, April 17, Spam Emails.” January 17, 2014. dailytech.com/Hackers+Use+Re
2014b. huffingtonpost.com/2014/04/17/netflix-comcast- phishing- frigerator+Other+Devices+to+Send+750000+Spam+Emails+/
_n_5161680.html (accessed April 2016). article34161.htm (accessed April 2016).
Cloud, J. Internet Security: Online Protection from Computer Hacking. Kan, M. “Alibaba Uses Facial Recognition Tech for Online Payments.”
North Charleston, USA: CreateSpace Publishing Platform, 2015. Computer World, March 16, 2015.