• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

MIS5208 - Spring 2020 - Data Analytics for IT Auditors

DATA ANALYTICS FOR IT AUDITORS AND CYBERSECURITY

Data Analytics for IT Auditors

MIS 5208.001 ■ Spring 2020 ■ Caswell Anderson
  • Home
    • Instructor
  • Class Materials
    • Classroom Recordings
    • Lectures
  • Class Blogs
    • About Blogs
    • Read Blogs Here
  • Schedule 2020
    • ACL
      • Part 01 – Introduction to the Course and to Fraud
      • Part 02 – Fighting and Preventing Fraud
      • Part 04 – Data Driven Fraud Detection – Investigating Concealment and Money Laundering
    • ACL Labs
      • Lab 01 – Install ACL / Review and Work with On-Line Documentation
      • Lab 02 – ACL Analytics Basics | CPE (1.5)
      • Lab 03 – Fraud Scandals of Note
      • Lab 04 – ACL Analytics Foundations (CPE) (ACL 101 V4 CPE)
      • Lab 05 – Remediating Issues & Reporting Results (CPE) (ACL 105 V1 CPE)
      • Lab 06 – ACL Analytics Introduction to Scripting (CPE) (ACL 106 V1 CPE)
      • Lab 07 – Basics of Datetime Fields Learning Series (Basic-Intermediate) (ACL 210)
      • Lab 08 – Basics of Datetime Fields Learning Series (Basic-Intermediate) (ACL 210) (Continued…)
  • Quizzes and Tests
    • Mid-Term Exam
    • Final Exam
  • Grading and Policies
  • WEBEX
You are here: Home / Archives for social engineering

social engineering

Social Media Fraud and the Real-World Effects

February 25, 2018 by Caswell Anderson


Over the past several weeks, American news has been flooded with the revelation of a sophisticated disinformation campaign conducted by the Internet Research Agency, a company directed by a close ally of the Russian government. Of interest for fraud investigators is the use of social media to create social movements as a form of information warfare. Of particular note is the use of event pages. Investigators discovered the IRA used Facebook’s event creation and coordination capability to organize rallies for and against Donald Trump after his inauguration. The purpose of this was geopolitical in nature, but the technique could soon be seen amongst corporations, state governments and criminal organizations.

Consider a hacker group wishing to steal from Verizon. Causing physical disruption in the form of anti-telecom protests might be an effective way to disorient the management at a given location. This provides a potential avenue into theft of information or even physical assets. Perhaps in another example, a corporation is interested in starting operations in a given locality. By organizing anti-tax protests, they might gain leverage in negotiations. These possibilities show that using the power of groups – a time-honored political tool – can also be used for financial gain or simple disruption.

Security and fraud analysts should assess such risks when conducting an environmental assessment. Though this may seem less integral to the firm and thus less important, I would argue that the correct approach is one of vigilance, as the technique has been seen, and it has succeeded. Where the IRA perhaps started, many other governments and corporations will follow.

Defense One Article

 

Filed Under: Fraud - General, Uncategorized Tagged With: social engineering

Primary Sidebar

Blogs

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in