Preview

Salami Attack

Good Essays
Open Document
Open Document
830 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Salami Attack
Salami Attack
A salami attack is when small attacks add up to one major attack that can go undetected due to the nature of this type of cyber crime. It also known as salami slicing/penny shaving where the attacker uses an online database to seize the information of customers, that is bank/credit card details, deducting minuscule amounts from every account over a period of time. These amounts naturally add up to large sums of money that is unnoticeably taken from the collective accounts. Most people do not report the deduction, often letting it go because of the amount involved. This could be a fraction of a cent, so as to avoid suspicion from the unsuspecting customer states Raj B Lon sane.

The victims that take the fall for such acts are usually bank holders, and websites that store account information like PayPal. It can be quite scary to have amounts disappear in large portions at once, making it a onetime incident for the company. Raj B Lon sane states that the amount of money that is then lost cannot be replaced by the company, leading them to take on court battles without the money to replace what is lost. Therefore for an insider to do this on a regular basis, he/she deducts money slyly in small quantities without having the customer in question, take notice.

How to Avoid a Salami Attack
A company that protects personal account information of a customer has to be on the lookout for individuals who wish to put them in a compromising situation when it comes to another’s funds. Raj B Lon sane states that it is important to know how to tackle this from an angle that is highly sophisticated.
a) Banks have to update their security so that the attacker doesn’t familiarize himself/herself with the way the framework is designed, before finally hacking into it states Raj B Lon sane.

b) Raj B Lon sane adds that banks should advise customers on reporting any kind of money deduction that they aren’t aware that they were a part of. Whether a small or big

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Bsa 310 Week 2

    • 653 Words
    • 3 Pages

    IT security policies need to address the customers concerns in regards to handling their personal information with a third…

    • 653 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Any information stored in an organisation has to follow the security and confidentiality procedures. Information security and confidentiality is the process where data is kept away from unauthorised access, disclosure, destruction, use or modification. It applies to both physical and electronic data. All organisations store a large amount of confidential information about their employees, customers, company’s status,…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Protecting clients and company confidential information is of high importance, not only for the company and existing clients but also future clients.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Mis 589 11 & 12 Mini Cases

    • 1102 Words
    • 5 Pages

    Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hrm/531 Week 1

    • 1126 Words
    • 5 Pages

    It is expected to happen from time to time. But banks expect businesses not to let this practice become a habit.…

    • 1126 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The three main threats that face the banking industry are; Organized crime targeting financial institutions, Assault on Authentication, Malware. There are other threats that financial institutions are facing such as; Increased insider threat, Mobile Banking Attacks, and Telephone based fraud. The banking industry is facing more and more threats each day as they become more and more dependent on electronic media, this includes mobile banking, web based banking, atm machines, and any kind of information system that the bank is using. With the rise in technology and banking adapting to the technology banks become vulnerable and constantly have to keep up to date on all security measures and sometimes even invent new ways of protecting the banks data as well as its customers data.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Better Essays

    These transactions are resulting in the exploitation of resources of the Web site and of the Credit Card Providers for these users after the User’s reaches their responsible percentage quickly. The Hacker uses their methods to exploit found vulnerabilities or have a User click on an application that allows them to take control undetected while the user continues their shopping. Once the User signs off and leaves the transaction it supposedly closes its session, the Hacker suspends the transaction until the coast is clear and then continues undetected, (Imperva, 2012b).…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Appearances are but a mask, one which is crafted and molded to our benefit. This is true in everyday eventualities from applying for a job to even hypothetical scenarios such as the apocalypse where survival is a matter of not letting others know your weaknesses. For instance the writers of the series Quarantine have adroitly layered out a story filled with half-truths and deceit, but also filled with an honest disposition of the characters trying to survive at all costs. This is especially true the sequel to Quarantine: The Loners.…

    • 996 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    hospital industry

    • 479 Words
    • 2 Pages

    General Acute Care Only. LTC unit, L/A Beds, S/S Beds, Admissions, Discharges, Days of Care, Discharge Days, Bed Days Available, Length of Stay, Occupancy Rate, and Births.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    McBride Financial services’ main concern is to ensure security for its customers’ financial online application services, and making sure that the online information is protected. In order not to involve into a lawsuit from clients because of identity stolen, McBride Financial will implement a kind of internal security system so every employee can access the clients’ information. McBride Financial is also concerned with physical security of the computer system, and other security issues as the company’s success is based on client’s understanding of how their personal information is safe. (Apollo Group, 2003 )…

    • 664 Words
    • 3 Pages
    Good Essays

Related Topics