{"id":3273,"date":"2016-09-12T09:25:43","date_gmt":"2016-09-12T13:25:43","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3273"},"modified":"2016-09-12T09:25:43","modified_gmt":"2016-09-12T13:25:43","slug":"data-manipulation-an-imminent-threat","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/09\/12\/data-manipulation-an-imminent-threat\/","title":{"rendered":"Data Manipulation: An Imminent Threat"},"content":{"rendered":"<p>Hackers that are looking to cause more chaos than financial gain are nothing new, but this article reminded me how scary it can be.<\/p>\n<p>The article describes a potential scenario where a hacker\u00a0gains access to a bank&#8217;s internal network using traditional methods such as a stolen password, malware infection, etc. This is followed by getting privileged access into the customer database where detailed account balances and personal information is held. Over a three month period the hacker begins to alter and manipulate the data that is linked to customer transactions. Once the banks and customers realize what has happened it could take months for the data to be manually recalculated to the correct amounts. During this\u00a0time customers are are wondering if they&#8217;ll have the correct and accurate balances, when, if ever, they&#8217;ll be able to make a withdraw, and if there is a safe place to place their money besides their mattress.<\/p>\n<p>This reminds me of the story line in season 1 of Mr.Robot&#8230;<\/p>\n<p>It&#8217;s easy to think that the financial sector has the best network and database security but I&#8217;m sure there are vulnerabilities. The large corporations may be better protected but some of the smaller financial\u00a0companies may not have the same security luxuries to prevent an attack like this. The article points out a research survey of\u00a0200 organizations (average work force of 22k) and 47 % acknowledged that no individual or functional group is responsible for monitoring databases for unauthorized activity. This is alarming considering how much critical financial data is kept in these databases.<\/p>\n<p>http:\/\/www.darkreading.com\/attacks-breaches\/data-manipulation-an-imminent-threat-\/a\/d-id\/1326864?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers that are looking to cause more chaos than financial gain are nothing new, but this article reminded me how scary it can be. The article describes a potential scenario where a hacker\u00a0gains access to a bank&#8217;s internal network using traditional methods such as a stolen password, malware infection, etc. This is followed by getting [&hellip;]<\/p>\n","protected":false},"author":11477,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[715219],"tags":[],"class_list":{"0":"post-3273","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-03-it-administrative-controls","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/11477"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3273"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3273\/revisions"}],"predecessor-version":[{"id":3276,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3273\/revisions\/3276"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}