Preview

Case Study

Good Essays
Open Document
Open Document
957 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study
CASE STUDY
Recently, the website of Ankit Fadia, a well-known ethical hacker, was hacked by another group that goes by the name Team Grey Hat (TGH). The “hactivist” group entered Ankit Fadia’s official site and exposed his credentials, including sensitive data, student details, database credentials (like name, user name & password). In a blog message, TGH also rubbished Fadia as a hacker and his courses
According to data from Indian Computer Emergency Response Team (Cert-In), in November last year more than 800 “.in” websites and nearly 700 “.com” websites in India were defaced by miscreants. A good number of Indian sites, including a few government ones, are hacked by cyber criminals every year. This has spurred the demand for security professionals and white-hat hackers.
Global market intelligence firm IDC predicts the requirement of 188,000 security professionals by 2012. At present, the number of certified security professionals in India is estimated at 22,000 by Cyber Security and Anti Hacking Organisation, while another report by Nasscom says that India needs about 77,000 ethical hackers every year.

SUNNY BAGHELA – 22 YR OLD – director and chief technical officer at tech defence consulting pvt tld

At 20,Sunny solved 15 cases of Cyber Crimes of Ahmedabad Crime Branch like Phishing Cases, Biggest Data Theft Case, Espionage Case, Credit Card Fraud Case, Several Orkut Fake Profile Impersonation Cases, Email Hacking Cases, SMS Spoofing Cases, Cyber Pornography Case,Cyber Terrorism Case, Several 419 Nigerian Fraud Case,etc.
Ahmedabad Blast Case Study
Sunny Vaghela helped Crime Branch, Ahmedabad to Trace origin of the Terror Mails sent during Ahmedabad Serial Bomb Blasts. Following are the details.
First Mail was sent on 26th Jully,2008 from Email Id alarbi_gujarat@yahoo.com from IP Address. 210.211.133.200 which traced to Kenneth Hawood’s House at Navi Bombay.His Unsecured WIFI router was misused by terrorists to send terror mail from his router.As

You May Also Find These Documents Helpful

  • Good Essays

    Case Study

    • 1651 Words
    • 7 Pages

    Hypertension (in addition to a number of medical conditions) may be considered as primary or secondary. Explain these concepts giving three examples of secondary hypertension and their pathophysiology.…

    • 1651 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The Certification of Ethical Hacker is achieved after completing a program involved with popular information security and hacking training. Investigators are taught techniques that are used by malicious, black hat hackers.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: The Most Notorious Email Attacks Of All Time | SherWeb. (n.d.). Retrieved from http://www.sherweb.com/blog/the-most-notorious-email-attacks-of-all-time/…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    desire to see Tartuffe suffer for his betrayal. We are reintroduced to the differences of a fraud and a true Christian. Cleante interrupted Orgon and said that he should not hope revenge against Tartuffe but, rather hope that Tartuffe repents for his sins and a light sentence by the King. Family and loyalty is another theme that is commonly recurring in the play. In the beginning of the play, Orgon falls further and further into Tartuffe’s trap and the whole household suffer from this. This makes it clear that he is the “pillar” that supports the family. His importance to the family is undeniable. Everyone in the family must bow to his wishes when he forces his daughter to marry someone she doesn’t love and disown his son Damis. When Orgon…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Case Study

    • 880 Words
    • 4 Pages

    Lincoln Electric has found a simple way to beat the competition in the manufacturing industry, Lincoln puts the employees first, knowing that without happy employees nothing will improve and nothing will get produced. Through revolutionary incentive programs and effective motivation techniques Lincoln has found ways to keep employees coming back day after day with smiles on their faces and a genuine love for the company in their hearts. It is rare to find companies that value the individual so much while at the same time…

    • 880 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Case Study

    • 468 Words
    • 2 Pages

    The lawsuit alleged that in April 2007, Amgen's board of directors flagged the company's process for dealing with post-market complaints about drugs as a…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    As we can see the email was sent through M57.biz WebMail Server using squirrelmail a webmail client. It could have been easily dismissed if it wasn’t for the fact that squirrelmail requires a server with PHP. Maybe I am overlooking this… Since there isn’t a conclusive answer as in who is behind the attack we can explore the possibilities using the artifiacts found in the suspects hard drive. In the email 210 from Jean’s Inbox when the attacker requests the information(spreadsheet) from Jean we know that the email was sent through an apache server as shown…

    • 1885 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Hallways In School

    • 207 Words
    • 1 Page

    Hallways in schools get absolutely crowded during passing time. With a five minute passing time, it would make hallways safer, give people more privacy, and compare better with other schools. One reason why we need a longer passing time is because it would reduce running in the hallways. According to “Wisconsin PBIS Network” you could be running in the hallway and get tripped by another person because you aren't paying attention where you are running or you could accidentally push another student into a locker. In addition, to reducing running rates in the hallway a longer passing time would also help students who need a bathroom break. For example, most teachers don't allow students to go to the bathroom during class, so they have to go during…

    • 207 Words
    • 1 Page
    Good Essays
  • Good Essays

    Group Reflection

    • 730 Words
    • 3 Pages

    The group activity included members of the class gathering together as a group and forming an idea of a type of group to facilitate. After a few minutes of brainstorming, the class came to a consensus to conduct a mindfulness meditation session. There was no chosen leader for the group. However, one of the members informally volunteered another member to lead the group. The informally chosen member took the lead and asked other members if they were comfortable with doing a mindfulness meditation group.…

    • 730 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Today the tables have changed and cyber crimes ranges from the most popular Nigerian argot, ‘yahoo yahoo’ (internet fraud), to cracking and gaining access to unauthorised havens, identity theft and to that which most of us are guilty of; software piracy. In a nutshell, cybercrime surround all illicit activities that computers can be used for. While most of all the other crimes are on the low side in Nigeria, the hydra-headed monster is this internet fraud which has poisoned our ivory towers yet finding its way to our homes, no thanks to some choice of package a number of the national service providers render allowing the perpetrators access to the internet right in the comfort of their rooms.…

    • 502 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Who Made the Mistake

    • 1355 Words
    • 6 Pages

    The objectives of this case are to find out the culprit and for the culprit to be punished in order to avoid future reputation of the same event.…

    • 1355 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    I was in the office at around 6:40 pm when I got news of the serial blasts. I rushed to Connaught Place, the nearest location of the blasts, along with other reporters from the office. It was 7 pm when I reached the place and a thick cloud of smoke greeted me, through which I could see a man and a woman lying in a pool of blood. The rubbish bin had been ripped apart and a rickshaw stood with its roof caved in.…

    • 507 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Terrorism

    • 1161 Words
    • 5 Pages

    This assignment requires the assessment and case analysis of a domestic or international terrorist event. The event for the purposes of this paper is a bomb explosion outside the courthouse in the city of New Delhi, India. The Associated Press (2011) reported the event as “A bomb apparently hidden in a briefcase exploded Wednesday as people lined up outside a top court in New Delhi, killing 10 people and wounding scores more in the deadliest attack in India's capital in nearly three years” (p. 1). They further stated “The blast near a gate at the High Court the second at the building in five months came despite a high alert in the city and renewed doubts about India's ability to protect even its most important institutions despite a security overhaul that followed the 2008 Mumbai siege” (Associated Press, 2011, p. 1). The latest reports several days after the explosion indicate Terror has struck Wednesday Delhi again…

    • 1161 Words
    • 5 Pages
    Better Essays

Related Topics