OCU C)ISSO C Discussion Lesson 17
- This topic has 5 replies, 6 voices, and was last updated 2 weeks ago by
Joseph Doss.
-
AuthorPosts
-
-
February 15, 2024 at 4:02 pm #93557
Manny Varela
KeymasterWhen investigating a crime, there are always means, opportunity, and motive. Discuss in detail a specific cybersecurity crime and tell a story (real or fiction) about the criminal making sure to discuss the M.O.M. of the criminal. Also, discuss how this crime affected the organization.
-
June 17, 2025 at 11:16 am #106559
Ashly Jackson
ParticipantIn the world of cybersecurity, one crime stands out: the infamous data breach at Apex Technologies. The perpetrator, known only by the alias “Cipher,” was a skilled hacker with a precise modus operandi, carefully crafting a plan that hinged on means, opportunity, and motive. Cipher’s means included advanced hacking tools and social engineering techniques, enabling him to exploit weaknesses in Apex’s network security.
The opportunity arose when an employee inadvertently left their password on a sticky note, providing Cipher with unrestricted access. Capitalizing on this oversight, he executed his plan during a weekend when the organization’s defenses were weakened by minimal staffing.
Cipher’s motive was rooted in financial gain, driven by an underground market for stolen data. His successful breach resulted in the theft of sensitive client information, leading to financial loss, legal repercussions, and a devastating blow to Apex’s reputation. The fallout forced the company to invest heavily in cybersecurity measures, a cost that would haunt it for years to come. Ultimately, this story illustrates how the calculated nature of cybercrime can wreak havoc on businesses, highlighting the critical need for robust security practices.
-
June 17, 2025 at 9:27 pm #106572
Amy Hastings
ParticipantYour story was awesome! It was such a great read and a great way to explain a data breach in a story! You have great information, and I think your story really tells the importance on a data breach.
-
-
June 17, 2025 at 9:26 pm #106571
Amy Hastings
ParticipantCybersecurity crimes are all bas but this one I feel is important, it is called “The scary truth behind Identity Theft”. This story is based on someone named Steve because no one ever found out who did it. Steve set up a carefully well thought out plan with means, opportunity, and motive, his plan was to steal one of his main top bosses from work’s identity. Steve’s means were somewhat personal as he was close with this boss, he figured out a way to gain access to his information.
Steve’s opportunity was when everyone was going out to lunch and his boss was in front of him and accidentally dropped his wallet, Steve picked it up and managed to take photos of all his information including is ID, Social Security, and his banking information. In his wallet was also all his passwords into the company’s financial records. He then placed the wallet back and left work. Once he was home, he had the chance to get into all of this information.
Steve’s motive was to gain access to all the money that his boss had along with the company’s money. Steve wanted that money and was able to hack into the banking spots in both his boss’s financial records and the company’s. He thought this would give a better life and so he used his bank account to open himself an account and make fraudulent purchases in his bosses’ name.
This story is to tell that identity theft in an organization can lead to financial losses and legal consequences and this has an impact on both the employees along with the company itself.
-
June 18, 2025 at 12:33 pm #106584
Ashly Jackson
ParticipantIdentity theft is a serious issue that can have devastating effects on individuals and organizations. The story of Steve illustrates how personal relationships can be exploited for malicious intent. By carefully planning and taking advantage of an opportunity when his boss dropped his wallet, Steve gained access to sensitive personal and financial information. This breach not only jeopardized his boss’s finances but also put the company at risk of significant losses and reputational damage. The impact of such crimes extends beyond financial implications; they can lead to legal repercussions for both the perpetrator and the organization involved. Awareness and prevention are crucial.
-
-
June 20, 2025 at 3:45 pm #106638
Joseph Doss
ParticipantThink of the movie The Matrix, in essence it’s about group of hackers that are attempting to take down a global power facility, their motive is that they find that this facility is very unethical in they way they treat their employees so they are attempting to entirely close the facility using their hacking skills.
The means is that they find a weakness in this facilities cybersecurity setup in the form of a glitch which they exploit in order to gain more access and take more and more control of the computer systems.
This attack could have been prevented or stopped by simply patching this glitched application, proper system testing may have also aided in a stronger security setup. In not patching this glitch the facility provided theses hackers the opportunity to breach their systems.
-
-
AuthorPosts
- You must be logged in to reply to this topic.