• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ITGS Portfolio :: Frauds in online banking -review of a news article.

Extracts from this document...

Introduction

ITGS PORTFOLIO 2 TITLE : FRAUDS IN ONLINE BANKING NEWS ITEM : http://business.smh.com.au/business/anz-warns-of-malicious-virus-20090205-7ylr.html WORD COUNT : 854 AREA OF IMPACT : BUSINESS AND EMPLOYMENT NAME : Ishaan Khanna A: PRESENTATION OF THE ISSUE The Australia and New Zealand Banking Group Limited commonly called ANZ is the fourth largest bank in Australia after the Commonwealth Bank, the National Australia Bank, and Westpac Banking Corporation. [birgitdaube.de] ANZ is also the largest bank in New Zealand, where the legal entity became known as ANZ National Bank Limited in 2004 and where it operates two brands, ANZ and the National Bank of New Zealand. ANZ warned its customers to be careful of a fraudulent portal of a website that is generated by a virus which resides on a user's computer that generates a form which requests the account holder for personal details. The problem being faced is as follows: Trojan horses enter as attachments in the inbox of a user but once they are opened, they secretly install programs which cause great danger. ...read more.

Middle

Customers who accessed the banking portal lost important data. The Trojan horse stores personal data by planting malicious codes and scanning sequences of letters and numbers with a keyboard scanner. The data reaches the place where the hackers are operating from and they gain easy access to such private and confidential data. C: IMPACT OF THE ISSUE The Trojan horse also known as Trojan is a virus that appears to perform a desirable function but in fact performs secretive malicious functions which enable unauthorized access to the user's machine. [answers.com] This issue is not related specifically to ANZ Bank. It is related to all banks in general and this problem of hacking by Trojan horses can occur in various other banks as well. Customers will face severe losses if personal and sensitive information falls in the hands of hackers and this may eventually affect thousands of customers and the entire bank may shutdown due to disappointment of customers and loss of trust in the bank. ...read more.

Conclusion

To prevent the virus which could arrive with any attachment the bank recommended usage of advanced antivirus software. The bank issued a warning to its customers to be careful of changes on websites of banks. If there is any problem of any kind the customers should immediately call the company and ask for solutions to the problem. [theage.com] As a Trojan horse has many forms, there is no standardized way to delete them. The easiest responses used to clear temporary internet files and to delete them. Normally, antivirus softwares detect and remove Trojans, however if the virus cannot be found by the antivirus, booting the computer from other sources, such as a live CD, allow an antivirus program to delete a Trojan. Updated anti-spyware programs can also be of great use. Most Trojans also hide in registries, and processes. [answers.com] . Keys for generation of signatures and encryption can be stored on smartcards which depends on the concrete implementation. [pc1news. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    The rise of using online grocery shopping would result in a loss of employment for many members of the society. Also, public communications would be a factor that will be affected. As the employment number from grocery stores decrease, so will the ability of people to interact with people in the society and community.

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    time to maintain medical records * improving your quality of care by decreasing medical errors and assuring that all your health care providers have accurate and timely information Although HIT has many uses throughout our healthcare system, three important types of health IT may affect you in the near future as more consumers use personal health records (PHRs)

  1. ITGS portfolio Playstation news article. Too much playstation can be painful

    Three versions of the playstation have been released. The PlayStation 2 (often shortened to PS2) is a sixth generation video game console manufactured by Sony. The successor to the PlayStation, and the predecessor to the PlayStation 3, the PlayStation 2 forms part of the PlayStation series of video game consoles.

  2. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    6- How secured is Wi-Fi? 7- What are the steps that are taken to prevent cyber crime? 8- What are the punishments if one is found guilty of their cyber crime? Transcript of the Interview Name: Sunil Paraskar Qualification: Cyber Crime Commissioner Date: 19th November 2009 1- When were Wi-Fi devices launched?

  1. ITGS portfolio Extension

    that Wi-Fi networks are not secured by most users and this simplifies the hacking process for hackers. And this is a main loophole in Wi-Fi hacking. Compromise in securing Wi-Fi networks has caused a great amount of damage and led to leakage of secretive data , masquerading of websites and hacking of IP addresses leading to accusations on innocent citizens.

  2. Information Technology in a Global Society - analysis of an article "Using data mining ...

    This would also limit the number of people who could have access to the information too. Only the person who will be decrypting the data is able to see the information. Hospitals could choose doctors whom they think is trust worthy enough to give them the decryption key, which will

  1. Proyecto Personal - Anorexia y Bulimia

    La segunda es Comunidad y Servicio, pues al comunicar lo que he aprendido, aparte de informar a las personas que me rodean, puedo ayudar los enfermos que padecen de anorexia y bulimia, contribuyendo con mi comunidad. Finalmente tenemos Salud y Educaci´┐Żn Social, ya que estas enfermedades tienen que ver con

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    It may change your mind about the career you had initially wanted to pursue, and even given you an alternative idea. Work experience can also enable you to develop skills which can be applied to everyday scenarios, and can be an invaluable experience.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work