• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS Portfolio :: Frauds in online banking -review of a news article.

Extracts from this document...


ITGS PORTFOLIO 2 TITLE : FRAUDS IN ONLINE BANKING NEWS ITEM : http://business.smh.com.au/business/anz-warns-of-malicious-virus-20090205-7ylr.html WORD COUNT : 854 AREA OF IMPACT : BUSINESS AND EMPLOYMENT NAME : Ishaan Khanna A: PRESENTATION OF THE ISSUE The Australia and New Zealand Banking Group Limited commonly called ANZ is the fourth largest bank in Australia after the Commonwealth Bank, the National Australia Bank, and Westpac Banking Corporation. [birgitdaube.de] ANZ is also the largest bank in New Zealand, where the legal entity became known as ANZ National Bank Limited in 2004 and where it operates two brands, ANZ and the National Bank of New Zealand. ANZ warned its customers to be careful of a fraudulent portal of a website that is generated by a virus which resides on a user's computer that generates a form which requests the account holder for personal details. The problem being faced is as follows: Trojan horses enter as attachments in the inbox of a user but once they are opened, they secretly install programs which cause great danger. ...read more.


Customers who accessed the banking portal lost important data. The Trojan horse stores personal data by planting malicious codes and scanning sequences of letters and numbers with a keyboard scanner. The data reaches the place where the hackers are operating from and they gain easy access to such private and confidential data. C: IMPACT OF THE ISSUE The Trojan horse also known as Trojan is a virus that appears to perform a desirable function but in fact performs secretive malicious functions which enable unauthorized access to the user's machine. [answers.com] This issue is not related specifically to ANZ Bank. It is related to all banks in general and this problem of hacking by Trojan horses can occur in various other banks as well. Customers will face severe losses if personal and sensitive information falls in the hands of hackers and this may eventually affect thousands of customers and the entire bank may shutdown due to disappointment of customers and loss of trust in the bank. ...read more.


To prevent the virus which could arrive with any attachment the bank recommended usage of advanced antivirus software. The bank issued a warning to its customers to be careful of changes on websites of banks. If there is any problem of any kind the customers should immediately call the company and ask for solutions to the problem. [theage.com] As a Trojan horse has many forms, there is no standardized way to delete them. The easiest responses used to clear temporary internet files and to delete them. Normally, antivirus softwares detect and remove Trojans, however if the virus cannot be found by the antivirus, booting the computer from other sources, such as a live CD, allow an antivirus program to delete a Trojan. Updated anti-spyware programs can also be of great use. Most Trojans also hide in registries, and processes. [answers.com] . Keys for generation of signatures and encryption can be stored on smartcards which depends on the concrete implementation. [pc1news. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. Drugs should not be legal

    Even the drug ?abusers of the sixties had a slogan, Speed Kills. Young drug dealers have a good ?supply of guns, and they do not hesitate to use them. The streets of many inner ?cities are bloody battlegrounds where crack wars are fought.

  2. Proyecto Personal - Anorexia y Bulimia

    Despu�s de esperar un rato, pude entrevistar a la psic�loga por media hora, dado que era un d�a ocupado, y al final me ofreci� venir uno de los d�as en los que hab�an terapias familiares para sentarme a observar y tomar nota si es que quer�a.

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    your personal health information is an important part of our changing health care system. You and your doctor can better manage your health care by improving how you communicate with each other and how you maintain your health information. Using computers and other electronic devices makes it easy for you,

  2. Information Technology in a Global Society - analysis of an article "Using data mining ...

    Works Cited: Thearling, Kurt. "Data Mining and Privacy: A conflict in the making?" DS (1998. Web. June-July 2010 <http://www.thearling.com/text/dsstar/privacy.htm> Kaur, Harleen, and Siri Krishan Wasan. "Empirical Study on Applications of Data Mining Techniques in Healthcare." Journal of Computer Science (2006). Department of Mathematics, Jamia Millia Islamia. Web. June-July 2010. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=>. ScienceDaily 18 December 2009.

  1. ITGS Portfolio 1

    A better solution would be Plug-in Hybrid Electric Vehicles (PHEVs). The idea is to increase the size of the battery in a normal hybrid so it can take more energy, and add a plug, so that the car can also get energy from the electrical grid or from rooftop solar power.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Using the technology of purchasing grocery food online can cause problems regarding the issue of computers replacing the jobs of human beings. People might rely on the convenience of using online grocery shopping, therefore neglecting the people who work as a clerk or cashiers in grocery stores.

  1. ITGS portfolio Playstation news article. Too much playstation can be painful

    This function, as well as a memory card manager, can be accessed by starting the console without inserting a game, therefore accessing a system menu with a dark blue background and buttons that are designed like rainbow graffiti. If a game is put in the system at any time on the menu, the game will immediately start.

  2. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    The research done indicates that the major issue regarding the Wi-Fi network is that Wi-Fi networks are not secured and are being misused to send threat emails and gain personal information of the user.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work