Hiram College
Intimate learning. Global reach
Hiram College  PO Box 67  Hiram, Ohio 44234   330-569-3211

Home Page - Cram's Courses      

Electronic Crime in Modern Day Business
Blended Course

50% in class; 50% at home
INTD 32700 R10
Please Note: All writing assignments, forum discussions, PowerPoint presentations, quizzes, and videos for this course are on Moodle at Hiram College
and the tests and writting assignments will be submitted through Moodle and not handed in during class or emailed to the professor.

LCCC (Lorain County Community College) Campus - Saturdays: 8:00 am to 12:00 pm
IN CLASS: Saturdays - Aug 27, Sept 10, Sept 24, Oct 8, 2016
AT HOME: Saturdays - Sept 3, Sep 17, Oct 8, Oct 15, 2016


PowerPoint presentations used in class
Atoms, Energy, and Electricity Part I
Atoms, Energy, and Electricity Part II
Atoms, Energy, and Electricity Part III
Atoms, Energy, and Electricity Part IV

INDT 32700 R10  
Instructor Roger F. Cram
  Home – 330-569-7962 Cell phone: 330-569-4912
cramrf@hiram.edu 

 Course Syllabus

Click here to go to Disney World
Click here for extra credit

Click here for a prize

IN CLASS
Session 1 - Aug 27, 2016

This first week you will be introduced to different types of crime occurring in corporations. You will learn about what happens in our society when major technological advancements occur - who is benefited and who is harmed. You will be introduced to your first list of Electronic Crime vocabulary words and you will begin your study into the characteristics of electricity that allows criminals to steal money and data.

Select Class Teams:

Readings:

Videos Presentations:
MCI - The Invisible Crimninals

In connection with Chapter 2 of Electricity DeMystified, watch the short videos below to reinforce your readings.

PowerPoint Presentations:

"Atoms, Energy, and Electricity Part 1" (Click) This PowerPoint is designed to supplement your assignment in Electricity DeMystified. Upon arriving at the website, click on Atoms, Energy, and Electricity Part I. A PowerPoint presentation should download to your computer. If you are asked for a password, ignore the request

Quizzes:
Week One - Vocabulary.  Look up the definitions to the listed vocabulary words and print them on a sheet of paper. You may use the hacker on-line dictionaries provided below or your own source. Your definition of each term should indicate you undderstand the definition and concept. Copying and pasting definitions from other sources does not indicate you understand the term.

Hacker's Dictionary
FOLDOC Dictionary
Enter your term on the top and click search.
The Jargon File
Click on "Glossary" in Section II on the left hand side.

The vocabulary words on the quiz are listed below. Answer the questions in Moodle and submit.

Virus
Worm
Hacker
Trojan Horse
Cracker
Social Engineering
Phreaker
Firewall
Backdoor
Dumpster Diver

Presentations: None

Writing Assignment 1
:
Technologies, Social Media and Society
Five Things We Need to Know About Technology Change

The word processing, spell checking, grammar correcting PC was a blessing to writers and students everywhere. However, typewriter companies went out of business and our children are not learning how to spell. The hand-held calculator was a God send over the slide rule. The calculator was small and easy to carry, helped people calculate the best bargains at a grocery store, helped engineers to do complex calculations on job sites, and made math calculations a breeze for students increasing their accuracy. However, our children's mathematics skills are shrinking.

In the olden days oil was used in lamps to provide light for our homes. When the electric light bulb was invented, it should have put the oil companies out of business, but the invention of the oil furnace kept them alive. When the natural gas furnace was invented the oil companies should again have seen their demise, but the invention of the automobile and airplane saved them again as gasoline provided a new demand. What will happen to the oil companies when solar and electric cars are perfected?

You are going to school on line using your PC for this course. A few years ago the only school available was a classroom or a correspondence course where individual lessons were delivered to you through the mail. Correspondence course companies are now out of business. Some colleges are closing their doors or offerring on line courses and remote learning sites to compete with the changing demand for education.

Using any two of the Five Things We Need to Know About Technology Change, describe a product or service in your life, family, or job that illustrates a clear example of your two choices.

Answer this in not less than 500 words.

For Next Week: Submit the Vocabulary Quiz from Session 1 (through Moodle)
                                           Submit writing assignment one (through Moodle)

AT HOME
Session 2 - Sept  3 through Sept 9, 2016

This second week will take you into some of the problems and future concerns with your social networks, like Facebook. Are we being manipulated and controlled? Is all of our personal information on Facebook, now the largest human behavioral data base in the world, going to cause us problems in the future? Will our private and highly personal information be sold or compromised?  Our smartphones, are they actually making decisions for us like which movie we want to watch, which restaurant do we want to go to, and which products or services are we going to use? Are all our Internet clicks recorded? Is our location always available to someone through GPS recorded tracking?

Corporate fraud will be explored again, but this time through financial reporting fraud. Can money be stolen from a corporation by minipulating expense and revenue figures? Since 80% of corporate fraud occurrs from employees, are top management as involved as other lower-stature employees?

As we advance our way toward understanding how magnetic signals carrying personal information are intercepted and stolen by hackers, we will explore voltage, amperes, and resistance through Ohm's Law. This involves only simple arithmetic like 6=12 / 2 or 12 = 6x2. For those of you afraid of math, we go no further than Ohm's law, despite what your text book Electricity DeMystified may present.

Due this Session: 
(1) Vocabulary words assigned during our last session (2) Essay assigned Session 1 Technologies, Social Media and Society - Five Things We Need to Know About Technology Change
Readings:

Videos:

In connection with Chapter 6 in Electricity DeMystified, view the following short videos designed to help you understand this material.

AC Current Through Magnetism
Electromagnetic Spectrum  Source: Rocketboom.com
Electromatic Waves and the Sun  Source: PBS Video
The Earths Magnetic Lines of Flux  Source: Youtube.com

PowerPoint Presentations:

Atoms, Energy and Electricity Part II (Click) This PowerPoint is designed to supplement your assignment in Electricity DeMystified. Upon arriving at the website, click on Atoms, Energy, and Electricity Part IV. A PowerPoint presentation should download to your computer. If you are asked for a password, ignore the request.

Videos Presentations:

After or before reading Chapter 3 in Electricity DeMystified, view the following short videos designed to help you understand this material.

    • https://www.youtube.com/watch?feature=player_embedded&v=-mHLvtGjum4

PowerPoint Presentations:

 View Atoms, Energy and Electricity Part II (Click) This PowerPoint is designed to supplement your assignment in Electricity DeMystified. Upon arriving at the website, click on Atoms, Energy, and Electricity Part II. A PowerPoint presentation should download to your computer. If you are asked for a password, ignore the request.

Class Discussion: In Technologies, Social Media, and Society there is an article entitled What Facebook Knows. On page 24 in the 13/14 edition, and on page 49 of the Twentieth Edition, find the section titled "Social Engineering" and described how Facebook was used to secretly increase organ donors and influence elections by getting more people to vote.

Discuss how do you feel about the possibility of Facebook or other social media being used to secretly influence your choices? Do you feel you are being unknowingly manipulated if this technique was used to sell products or influence your social  or political decisions? Has this happened to you?

Quizzes:
Week Two - Vocabulary.  Look up the definitions to the listed vocabulary words and print them on a sheet of paper. You may use the on-line dictionaries listed below or your own source.

Hacker's Dictionary
FOLDOC Dictionary
Enter your term on the top and click search.
The Jargon File
Click on "Glossary" in Section II on the left hand side.

The vocabulary words on this quiz are:

ISP
Shoulder Surfing
Twitter - What is this organization; what does it do?
Facebook - What is this organization; what does it do?
Bit
Byte
Barf or Barfulation
Code Police
CEO - See Chapter 2 in Managing the Risk of Fraud and Misconduct
U.S. GAAP - See Chapter 2 in Managing the Risk of Fraud and Misconduct

Presentations:
Essays: There are two essays assigned this week. (1)
Who is Kevin Mitnik  This assignment is to be turned in Session 3.   (2) Research Paper/ Essay: How Modern Technology Has Negatively Impacted Your Life. This paper is to be double spaced and no less that 750 words. This assignment is to be turned in Session 4.

How Modern Technology Has Negatively Impacted Your Life

Almost all of you have been exposed to the problems associated with electronics in the workplace.  This course deals with how electronics (computers, software, pagers, cell phones, laptops, e-mail, Bloggs) improperly implemented into the workplace causes stress, turnover, poor moral, loss of efficiency and effectiveness, undermined corporate structure, and encourages internal crime. Your research paper should involve your personal experiences with this problem. By understanding how and why these things occur, you will hopefully become better managers.

If you are a housewife or househusband and have never experienced the negative aspects of electronics in the workplace, perhaps your social contacts have unfavorably changed for the same reason.  Many persons have lost friends because of excessive participation with American on Line (AOL).  Chatting on AOL, being addicted to their garage sales, addicted to computer games with partners in remote locations, or just surfing the Internet have so involved some families that their friends and other former social contacts have all but been replaced with these new electronic acquaintances.  Have you ever been the victim of identity theft? Children spending hours on the Web have altered family social activities. Perhaps your children have had unpleasant experiences associated with the total proliferation of adult material.  Possibly you have become the victim of computer fraud over the Internet.

If you are a traditional student and have not yet been employed in any of today’s busy electronic industries, perhaps electronics in your high school classes or in your social circles have had a negative impact on your morale, self-esteem, or social circles.  Have you ever been the victim of bully texting? Perhaps an electronic dating service has exposed you to a less than desirable experience. Possibly the need to use computers in college and keep up with all the modern changes in software are causing you problems. If none of the above events have occurred in your life, you may do research into the negative aspects of computers in society and write a paper on your findings.

The research paper is to be no less than 750 words (about 3 pages double spaced).  Actually, it is not a research paper, but rather a report of your personal experiences as they relate to the core-concepts of this course.

For Next Week:
Essay 2: (1) Vocabulary Words (2) Who was Kevin Mitnik?

Write a 500 word essay on the subject: Who Was Kevin Mitnik? Turn this Essay in at the next class session.
Please double space this essay. You may use your own sourses of reference or refer to the links below.

Kevin Mitnik from Takedown
Live on the Web - Kevin Mitnik



IN CLASS
Session 3 - Sept 10, 2016

When automation at the workplace started in the 1950s and 1960s, many people projected that the use of computers would allow a person to do one days work in only three or four hours. This would greatly increase the worker's leisure time. As it turns out, when computers did allow one worker to finish his/her tasks in a few hours, instead of going home, the worker was told to stay at work doing the tasks of two or three workers. This not only increased each worker's responsibility, but reduced jobs. Employers now had a better means to spy on employees through technology. This topic will gradually be covered throughout the rest of this course.

What is Phishing? How can we detect it? What is Cybersquatting? What is Social Engineering? Are we ever personally exposed to these activities? Can these activities be spotted by us, the users, before and damage is done to our computers or bank accounts?

The above topics will be studied this week along with getting closer to understanding how criminals intercept our computer and cell phone signals to complete their evil deeds. Read the Hacker Newspapers listed below for some fascinating events occurring with Verizon last month. Are your cell phone conversations being recorded? Are your cell phone numbers being compared to those phone number called on terrerist's cell phone records?

Pizza Party - supplied by the professor.
Due this Session: 
(1) Vocabulary words assigned during our last session (2) Essay assigned last session on Kevin Mitnik

Readings:

Video Presentations:

Mysterious Magnetic Fields  1:38
Basic DC Series Circuit  4:23
Simple Series and Parellel Circuits  8:35

AC & DC
Resistance
What is electricity
Ohm's Law

PowerPoint Presentations:

 View Atoms, Energy and Electricity Part III Click) This PowerPoint is designed to supplement your assignment in Electricity DeMystified. Upon arriving at the website, click on Atoms, Energy, and Electricity Part III. A PowerPoint presentation should download to your computer. If you are asked for a password, ignore the request.

Quizzes: First take-home quiz issued in class. To be turned in Session Four.
Week 3, Vocabulary.  Look up the definitions to the listed vocabulary words and type them into the answer spaces provided. You may use the on-line dictionaries listed below or your own source. Hacker's Dictionary
FOLDOC Dictionary - Enter your term on the top and click search.
The Jargon File - Click on "Glossary" in Section II on the left hand side.

The vocabulary words on this quiz are:

Botnets
Wall (as used on Facebook) Uploading
Downloading
Uploading
Browser
Phishing
Spy ware or malicious software
Cybersquatting or Typosquaters
Blog

Discussion:
Electromagnetic Waves

If you understood the presentation Atoms, Energy, and Electricity Part III then you have a remarkable knowledge about an incredible phenomenon that we use hundreds of times a day, but had no idea about its complexity.

Thousands of electromagnetic waves are passing through our bodies from all the radio and television signals, everyone's cell phone conversations, everyone who is texting, all Wi-Fi locations, all police cars, fire trucks, and ambulances, all aircraft, the military, gamma rays, ultraviolet, infrared, and thousands of others.  It's very good we can't see these electromagnetic waves because there are so many of them we wouldn't see much of anything else.

With much of our personal and proprietary information available through the interception of electromagnetic waves, are you a little nervous about your credit cards, bank accounts, securities, and other personal information? Can your medical records be easily hacked? Can money from your checking accounts be transferred in the middle of the night while you sleep?

While your bank manager is at her desk entering bank account and credit card numbers of customers into her computer, someone in a van stopped in the bank's parking lot is busy intercepting these signals and stealing all this data.  You see, every time the bank manager strikes a key on her computer keyboard, it sends an electric signal to the computer and the computer screen. Did I say an electrical signal was sent? Yes, and it created a electromagnetic wave as all electrical signals do, and this electromagnetic wave left the bank manager's key board and traveled through space at the speed of light. Yes, the van in the parking lot has an antenna (wire, conductor) that picks up these electromagnetic waves from the bank manager's keyboard turning them into alternating currents that can be tuned to duplicate each key stroke, each password, each bank account code, and each credit card number.

There are companies that do not have enough computer space to manage their operations. Instead of spending thousands of dollars on more computer memory and operating software, they intercept the computer Wi-Fi signals from other companies and actually utilize their unused computer memory, storage space, and even software. The best kind of antenna for intercepting computer system Wi-Fi signals is made from an empty Pringles potato chip can. The Pringles can has aluminum foil on the inside that creates alternating electric currents when passed over by a company's Wi-Fi electromagnetic waves traveling from their router through space at the speed of light.  Feel safe?

Discuss in class how understanding the electromagnetic wave phenomenon presented in my PowerPoint presentation Atoms, Energy, and Electricity Part III made you feel?  Is this a revelation to you? Did you already know this? Are you feeling nervous for your security? Are you worried about Identity theft?  Please answer this Forum in no less than 500 words and be sure to comment on two postings from your fellow classmates.

Presentations:

Essays:
For Next Week:


AT HOME
Session 4 -  Sept 17 through Sept 23, 2016

     This week we will finally understand how cyber criminals intercept proprietary information like passwords, credit card numbers, and transferring money from bank accounts. It is interesting to note that one rarely reads in the newspapers or views on TV news programs stories about money being stolen from banks through hackers and cyber criminals, yet this type of electronic crime is very common. If you were the CEO of First National Bank and your customers were having money stolen from their accounts by hackers, would you want that published in a newspaper or on the TV news? Probably not, for many of your customers would close their accounts. If the police located a cyber criminal hacking into your customer's accounts, would you want that person arrested and prosecuted so all the details about the trial would be in the newspapers or on the evening news? Again, your bank would lose many customers.
    
People today are so use to texting, using email, participating in chat rooms and other forms of data communications that it is often difficult to tell if your friends or associates are real people. Are these continuous cyber relationships harming our social person-to-person interaction skills? Is the person we are communicating with who they say they are or, possibly, even real?
     In order to protect our companies and employers we need to be familiar with building or maintaining a
n integrated and comprehensive compliance program capable of assessing risks, preventing and detecting misconduct, and evaluating its effectiveness. After all, being aware of electronic crime, preventing and detecting it, and improving policies and procedures to prevent its recurrence is probably why your are taking this course.
     All of the subjects mentioned above and more will be covered this week as we continue to pursue our journey into understanding the world of electronic crime.

Due this Session - (1) Vocabulary words assigned during our last session. (2) Essay: How Modern Technology Has Negatively Impacted Your Life assigned in Session 2 is now due (3) First take-home quiz is due this class.

Readings:

We will be using the following two publications in class for sessions 4, 5, and 6

http://www.theprosandthecons.com/articles/GDZ%20WCCF%20Ethics.pdf

http://egov.oregon.gov/DAS/SCD/docs/antifraud.pdf

Videos: The Movie "Hackers"

In connection with Chapter 6 in Electricity DeMystified, view the following short videos designed to help you understand this material.

AC Current Through Magnetism
Electromagnetic Spectrum  Source: Rocketboom.com
Electromatic Waves and the Sun  Source: PBS Video
The Earths Magnetic Lines of Flux  Source: Youtube.com

Some Video Fun:
Electronic Gadgets      Fun with Magnetism     An Electric Motor    A simpler motor      A Blond Girl Motor
How to Hack a POP Machine    Reprogram POP Machines     Elevator Hack       Inside a 9V Battery
Combination Lock Pick   Locked out of your car?  Car Lock Myth Busted

PowerPoint Presentations:
Atoms, Energy and Electricity Part IV (Click) This PowerPoint is designed to supplement your assignment in Electricity DeMystified. Upon arriving at the website, click on Atoms, Energy, and Electricity Part IV. A PowerPoint presentation should download to your computer. If you are asked for a password, ignore the request.

Quizzes:
Week 4, Vocabulary.  Look up the definitions to the listed vocabulary words and print them on a sheet of paper. You may use the on-line dictionaries listed below or your own source.

Hacker's Dictionary
FOLDOC Dictionary - Enter your term on the top and click search.
The Jargon File - Click on "Glossary" in Section II on the left hand side.

The vocabulary words on this quiz are:

Risk-Specific Compliance Managers - See Chapter 6 - Managing the Risk of Fraud and Misconduct
Frequency - Chapter 6 - Electricity DeMystified
Wavelength - Chapter 6 - Electricity DeMystified
Virtual Reality or Virtual Society - Article: Relationships, Community, and Itenity In the New Virtual Society in the text Technologies, Social Media, and Society
Micro-Coordination -  Article: Relationships, Community, and Itenity In the New Virtual Society in the text - Technologies, Social Media, and Society
Gabriel
Gnarly
Clone
Fried
Iron Box

Class Discussion: The Movie Hackers
Towards the end of the movie Hackers, a war was waged on the main frame computer designed to sink the oil tankers by hundreds of computers from all over the world attacking simultaneously. What is the hacker term for this type of an attack? You have been told in this course that 80% of corporate electronic crime comes from insiders. How does this fact pertain to the filmHackers? Do you see any similarity between the movie Hackers and the Kevin Mitnik story? 
Presentations:

Essays: A Study in Communications Abuse - The Personalities and Motivations of Telephone Phreakers

Go to the links below and learn about Captain Crunch. Learn about the relationships of Captain Crunch (Draper) with Kevin Mitnick, Steve Jobs and Steven Wozniak from Apple Computer (small world).

After viewing the above videos, write in not less than 500 words, what do you think of the hacker's or phreaker's culture, personality, beliefs, and egos? Is this a game? A challenge? Listen to what these famous hackers - Mitnick, Draper, Wozniak - say to justify their crimes.  Write a personality profile of Phreaker's as you are able to obtain from the above videos.

Turn this essay in at the next class session.

For Next Week:                                                                                                        

IN CLASS
Session 5 - Sept 24, 2016

Is it possible to hack a virus into Iran's nuclear program and cause severe physical damage to over 1,000 of their nuclear processing centrifuges? While these centrifuges are being ripped apart is it possible to send signals to all the monitoring and control stations that everything is operating normally? Well, this happened. In fact, finding who was responsible was on the news two weeks ago - June 2013.  The virus is named Stuxnet, and it quickly spread to over 100,000 computers in Iran's nuclear program before it was stopped. Who did this?  The United States? Israel? If Stuxnet appears to be a highly sophisticated virus, it's nothing compared to the one that hit Iran's oil industry in April 2013 called Flame. Are wars going to be fought this way in the future? Are bombs and soldiers going to be outdated?
Phreaker's hack into telephone systems. We are going to take a close look at yesterday when AT&T was most vulnerable and the three most famous phreakers of our time were driving Ma Bell and the FBI into distraction. Apple Compouter was founded by one of those phreakers.
Can you weight the risk of fraud in your company and set up focus groups, inventory control, and design considerations to help reduce crime? Yes you can, and it is imperative that this is done for any effective risk management control

Due this Session:  Vocabulary words assigned during our last session, Essay on the Hacker's Personality
Readings:
We will be using the following two publications in class for sessions 4, 5, and 6
http://www.theprosandthecons.com/articles/GDZ%20WCCF%20Ethics.pdf
http://egov.oregon.gov/DAS/SCD/docs/antifraud.pdf

  •  The Hacker's Home Page (This site is provided to study the hacker community and philosophy and to make you aware of what tools are available.)
  • Technologies, Social Media, and Society:
    • In Edition 13/14, read article 17, and in the Twentieth Edition read Article 4.1: Hacking The Lights Out.
    • In Edition 13/14 read Article 18 and in the Twentieth Edition read Article 8.3: Bride of Stuxnet. 
  • Managing the Risk of Fraud and Misconduct
    • Read Chapter 7 - Prevention Risk Assesment
  • Electricity Demystified
    • Read Chapter Seven - Pages 148-154

Videos:

In connection with Chapter 4 in Electricity DeMystified, view the following short videos designed to help you understand this material.

How Transformers Work  1:55

Hacking Culture Videos

Fraud in vending machine hacking
Hacking a pop machine 0:54
What is a Hacker?  3:33 (listen to this hacker's culture and philosophy)

Videos: Hackers. This movie is 107 minutes long, rated PG-13, made in 1995, and stars Jonny Lee Miller, Angelina Jolie, Jesse Bradford. Hackers can be currently rented from Amazon.com for $2.99. Click here to view this rental site.  YOUR WRITING ASSIGNMENT FOR THIS WEEK WILL BE ON THE VIDEO HACKERS.

PowerPoint Presentations:

Atoms, Energy and Electricity Part IV (Click) This PowerPoint is designed to supplement your assignment in Electricity DeMystified. Upon arriving at the website, click on Atoms, Energy, and Electricity Part IV. A PowerPoint presentation should download to your computer. If you are asked for a password, ignore the request.

Quizzes: Second take-home quiz issued in class. It is popsted on the Website. To be turned in Session 6.
Week 5, Vocabulary.  Look up the definitions to the listed vocabulary words and print them on a sheet of paper. You may use the on-line dictionaries listed below or your own source. Some of the terms below can be found in hacker dictionaries and in the videos about Captain Crunch.

Many of the below terms were taken from articles in Technologies, Social Media, and Society. Please do not simply tell me what a definition stands for (like PDF), tell me what it is and what it means.

Blue Box
Malware
Encryption
Slammer Worm
U.S. Power Grid
PDF Files
Denial of Service Attack
ESN / MSN
War Dialer
USB

Class Discussions:
Modern Technology vs. Toys

John T Draper, known as Captain Crunch, was the nickname of a hacker in the 1970s who shut down the eastern half of AT&T's telephone long distance switching system. He accomplished this task by blowing a whistle found in a Captain Crunch cereal box into a telephone.

The frequency of the whistle was about 2600 cycles per second, or as we now know, 2600 Hz. 2600 Hz is well within the range of human hearing being between 20 Hz up to 20,000 Hz.

Do you remember that one of the hacking organizations in New York listed each week on our schedule is called 2600? I wonder why they use that name?

AT&T decided to save money by allowing their voice and data signalling frequencies to be in the same frequency range. A 2600 Hz tone is a little higher in pitch than a dial tone and was used by AT&T's long distance switching stations to look for an open long distance line. Empty or unused long distance lines would look for a newly dialed long distance call that needed to be connected to the long distance network. AT&T's equipment generated a 2600 Hz tone when a long distance call was placed and the AT&T switching station looked for lines generating this tone.  Once located, the switching station connected the call generating the tone to the long distance network and completed the call.

It turns out that the Captain Crunch whistle found in the cereal box generated an almost perfect 2600 Hz tone. Guess what happened?

Go to the links below and learn about Captain Crunch. Learn about the relationships of Captain Crunch (Draper) with Kevin Mitnick, Steve Jobs and Steven Wozniak from Apple Computer (small world).

Discuss what do you think of a cereal whistle being used to shut down AT&T?  In a previous week, I mentioned that an empty Prinkle's Potato chip can was an excellent antenna for intercepting corporate Wi-Fi signals and utilizing their computers. Cereal box whistles, potato chip cans - what's going on here?

Presentations:

Essays:
For Next Week:  Vocabulary list from Session 5. Quiz # 2.


AT HOME
Session 6 - Oct 1 through Oct 7, 2016

     Last week we learned that some hackers have threatened to take down the national power grid in order to shut down the Internet and create havoc around the world.  Did you know that the national power grid can also be shut off by the solar winds mixing with the earth's magnetic field? Did you also know that our earth would be uninhabitable without the earth's magnetic field? This magnetic field stuff is very important in addition to being fascinating.
     This week we will explore further your lack of privacy and security risks on the Internet in addition to dangers to our children. Harassment, inappropriate content, and visibility issues will be explored.
     Preventing fraud from a manager's perspective through codes of conduct will be introduced. This is probably one of the reason you took this course, not only to learn about the many forms of electronic crime, but to finds ways of reducing such activities to protect your company.


Due this Session: 
(1) Vocabulary words assigned during our last session

We will be using the following two publications in class for sessions 4, 5, and 6

http://www.theprosandthecons.com/articles/GDZ%20WCCF%20Ethics.pdf
http://egov.oregon.gov/DAS/SCD/docs/antifraud.pdf

Textbook Assignments:

Articles:
Please read the following article. You are required to write a short essay on a portion of this article.

Managing Antifraud Programs and Controls by the American Institute of Certified Public Accountants, Inc. New York, NT.

Top 5 Hackers Publications, Web Sites, Etc.

Videos: 
In connection with Chapter 10 in Electricity DeMystified, view the following short videos designed to help you understand this material.There is also a hackers web site worth browsing.

The Solar Winds and Our Magnetic Field  4:44     The Earth's Magnetic Field is Collapsing  3:39   The Solar Winds Effect on Earth 4:44  The Rise of Drones - Netflix

 

Quizzes: Take-Home Final Exam issued. It is on the Website. To be turned in Class Session 7 or emailed by at Home Session 8 to cramrf@hiram.edu.
Week 6, Vocabulary.  Look up the definitions to the listed vocabulary words and print them on a sheet of paper. You may use the on-line dictionaries listed below or your own source.

Hacker's Dictionary
FOLDOC Dictionary - Enter your term on the top and click search.
The Jargon File - Click on "Glossary" in Section II on the left hand side.

Some of the terms below can be found in hacker dictionaries.

Many of the below terms were taken from articles Technologies, Social Media, and Society and other reading assignments. Some of the words and definitions are found in future assignments regarding government spying. Please do not simply tell me what a definition stands for (like PDF), tell me what it is and what it means.

The vocabulary words on this quiz are:

Tracking files
Third-party tracking files
Beacons
Flash cookies
BlueKai (the company)
Flux
Ampere's Law
Solar Winds
Cyberbullying
Code of Conduct

Class Discussions: Solar Winds

Many hackers have proclaimed, some testifying before Congress, that the easiest way to shut down the Internet is to hack into and disable the nations power grid. No electricity to homes and business, no Internet.

The two videos below were part of your material this week to reinforce your reading material in Electricity DeMystified. They are listed here again for your convenience.

The earth's magnetic fields when struck by the solar winds from the sun can shut down the power grids in many countries. It sounds like the sun can perform some very sophisticated hacking! What do you think of all this? Protecting ourselves from hackers and cyber-criminals is difficult enough, but how do we protect ourselves from the solar winds?

Are you beginning to see how mysterious and powerful magnetic fields can be?

Presentations:
Essays:
Creating a Positive Workplace

Management Antifraud Programs and Controls

Managing Antifraud Programs and Controls
by the American Institute of Certified Public Accountants, Inc. New York, NT.

The above article is extremely valuable to this course and is very well written. It comes from the American Institute of Certified Public Accounts. Keep this article handy and read it carefully. It can be effectively used for a portion of your final exam.

For this reading assignment and essay, write in not less than 750 words on pages 5 through 10 of Management Antifraud Programs and Controls, a summary of creating a positive workplace environment through hiring practices, discipline, attitude, and training. Then, if you are able, continue writing about your experiences in a job where such positive attributes were not in place.

Submit this essay at the next class session.

For Next Week:
Turn in Essay - Creating a Positive Workplace. Turn in vocabulary words.  Turn in Quiz #2. Turn in Final Exam.


IN CLASS
Session 7 - Oct 8, 2016

     Copyright infringements concern Web site owners, authors, music and video organizations, writers, and many other areas where the protected origin of works are of a concern. This is also of paramount importance to many corporations. The latest copyright laws will be visited as well as the right of law enforcement officers to search and seize your computers both at work and at home including the data contained therein.
    
An estimated 42% of million-dollar fraud cases were originally discovered by whistle blowers. What kind of corporate culture and environment feels safe for employees to turn in hackers and cybercriminals working among their ranks? Is confidentiality and security a concern? What about the harassment of co-workers after a whistle blower revealed to management a fraudster among the ranks? How safe is middle management with this information? Can they be trusted?
     We will explore the development of Microsoft Corporation and Apple Computer starting will Bill Gates and Steve Jobs in their college dorm rooms all the way up to the major corporations they created. How did they compete or cooperate? Were they ethical to each other? A surprising look at these two technological giants makes a fascinating study for this course.
     How business leaders can look for local trends to spot business opportunities is discussed in a seven-step analysis. And you can bet that cybercriminals will be looking for ways to take advantage of these new ideas, ready for exploitation and undermining in their dark world.
     Government agencies throughout the world are pushing for laws forcing third-party providers to collect far more personal data on individuals than the company requires for their business needs. In the contracts requiring the length of time this storage must be retained, there is usually provisions for the government to have access to all records expanding its surveillance capabilities on its citizens. (Sleep well, my friends)    
     Addressing your future privacy on the Internet I'm sure is a concern for all students since there is very limited privacy now. Should you use cloud, for example, by storing all your personal information on the Internet instead of your hard drive? Is it safer than using computer storage? Are governments creating laws that force companies to collect far more personal data on customers than is necessary to run the business? Are their provisions that all this data must be made available to governments as an enhanced method for creating deepening surveillance on its citizens? Who is the enemy here - the cybercriminals or the government?
     Your organization should establish auditing and monitoring of all company transactions to help insure that fraud and misconduct does not occur, or if it does, that it be detected. How does one set up such a auditing and monitoring system?

Due this Session:  Vocabulary words assigned during our last session, final exam, Quiz #2
Readings:

Videos:
The Pirates of Silicon Valley  Take notes as you watch this video. Your Forum activity for this week involves discussing this film.
Quizzes: Collect Final Exam rom those turning it in class. Option to email excam by at Home Session 8 (cramrf@hiram.edu)

Week 7, Vocabulary.  Look up the definitions to the listed vocabulary words and print them on a sheet of paper. You may use the on-line dictionaries listed below or your own source.

Hacker's Dictionary
FOLDOC Dictionary - Enter your term on the top and click search.
The Jargon File - Click on "Glossary" in Section II on the left hand side.

Some of the terms below can be found in hacker dictionaries.

Many of the below terms were taken from Technologies, Social Media, and Society and other reading assignments. Some are definitions and terms you need to know to understand upcoming articles. Please do not simply tell me what a definition stands for (like PDF), tell me what it is and what it means.

The vocabulary words on this quiz are:

Fourth Amendment
File sharing
Domain name
URL
First Amendment
ISP Memorandum
Time-shifting-
Whistle blower - Chapter 10
Exit Interviews - Chapter 10
Web-based reporting system

Class Discussion:
Discuss what you thought of the apparent lack of open ethics between Steve Jobs and Bill Gates as their businesses started to become major corporations?  Were you surprised? Who did you think exercised fewer scruples, Steve Jobs or Bill Gates? It is interesting to follow Steve Jobs and Steve Wozniak from their hacking days with Captain Crunch to forming one of the most profitable corporations in the United States. Did you notice how they treated Xerox to obtain their secrets? Was that ethical in your opinion? Did Bill Gates display similar questionable behavior in any of his dealings with other companies?

Presentations: None
Essays Due:

AT HOME
Session 8 - Oct 15, 2016


OTHER COURSE INFORMATION

Text Books

Technologies, Social Media, and Society - 13/14 Edition or the Twentieth Edition
Electricity Demystified, 2nd Edition McGraw Hill
Managing The Risk of Fraud and Misconduct McGraw Hill

Assignments and Quizzes

                                                            30% - Quizzes:  15% - Quiz One issued Session 3.  15% - Quiz Two issued Session 6
                                                            20% - Essays: 5% - How Modern Technology Has Negatively Affected Your Life
                                                                                  5% - Who Was Kevin Mitnik?
                                                                                  5% - Creating A Positive Workplace
                                                                                  5% - A Study in Communications Abuse - The Personalities and Motivations of Telephone Phreakers
                                                            10% - Research Paper: Future Hacking Trend Based On Media Release
                                                            10% - Class participation and attendance
                                                            12% - 6 Vocabulary tests = 2% each
                                                            18% - Final Exam:

Grading Policy

 Research Paper - 10%
Two quizzes - 15% each = 30%  Quiz One issued Session 3. Quiz Two issued Session 5.
Essays - 20%
Vocabulary Tests = 2% each total 12%
Final Exam - 18%
Attendance and Class Participation - 10%

After Completing This Course Students Will Be Able To:

.
:
.


Vocabulary Quizzes

Throughout this course we will be studying vocabulary related to electronic crime. Each week you will be given ten vocabulary words relevant to your studies assigned. Below, for your convenience, are three websites serving as dictionaries for such terms. Each week please turn in to your instructor your ten vocabulary words from the previous week's assignment. Give complete definitions, not just what a term like "URL" srtands for. Make sure you understand your submitted definition. If it is extremely complicated and obviously copied from another source, I may ask you to explain your submisson.

Hacker's Dictionary
FOLDOC Dictionary
Hacker's Dictionary Two

The Jargon File
Click on "Glossary" on the left hand side.

Field Trip

       Our filed trip is usually a dinner presentation held at a nice restaurant or catered by Hiram College where we will hear a program presented by a hacker, a security consultant, a member of a hacking attack penetration team, or a consultant for corporate espionage risk assessment. These are fun! The field trip is mandatory and attendance is worth 5% of your grade.  Those unable to attend the field trip will have an additional assignment worth 5% of their grade.

Research Paper

     The research paper/essay is to be at least 750 words, printed, and double-spaced. Actually, it is not a research paper, but rather a report of your personal experiences as they relate to the core-concepts of this course.

     Almost all of you have been exposed to the problems associated with electronics in the workplace.  This course deals with how electronics (computers, software, pagers, cell phones, laptops, e-mail, Bloggs) improperly implemented into the workplace causes stress, turnover, poor moral, loss of efficiency and effectiveness, undermined corporate structure, and encourages internal crime. Your research paper should involve your personal experiences with this problem. By understanding how and why these things occur, you will hopefully become better managers.

     If you are a housewife or househusband and have never experienced the negative aspects of electronics in the workplace, perhaps your social contacts have unfavorably changed for the same reason.  Many persons have lost friends because of excessive participation with American on Line (AOL).  Chatting on AOL, being addicted to their garage sales, addicted to computer games with partners in remote locations, or just surfing the Internet have so involved some families that their friends and other former social contacts have all but been replaced with these new electronic acquaintances.  Children spending hours on the Web have altered family social activities. Perhaps your children have had unpleasant experiences associated with the total proliferation of adult material.  Possibly you have become the victim of computer fraud over the Internet.

     If you are a traditional student and have not yet been employed in any of today’s busy electronic industries, perhaps electronics in your high school classes or in your social circles have had a negative impact on your morale, self-esteem, or social circles.  Perhaps an electronic dating service has exposed you to a less than desirable experience. Possibly the need to use computers in college and keep up with all the modern changes in software are causing you problems. If none of the above events have occurred in your life, you may do research into the negative aspects of computers in society and write a paper on your findings.

Final Exam Summer 2016

      The final exam is a take-home final, mostly essay, and will be issued during class session 7. You will have two weeks to complete your take-home, open-book final. It will be an essay final involving the concepts presented in all the articles, lectures, films, and other media presented in class.  Below is last year's final exam as a possible sample:

     You are a new CEO in a 25-year old company with 100 employees. Your company makes computer boards for PCs. It is your job to create an empowered work force with the security needed to protect the piracy and theft of corporate secrets and assets.  Because you are a new CEO and are starting new procedures and policies, you are creating change.  This change will create insecurities among some employees, reveal some Hems and Haws, some Sniffs and Scurries. According to our bible, in the article MANAGEMENT ANTIFRAUD PROGRAMS AND CONTROLS, several measures are needed for security and company efficiency during times of change, both to protect the company and to foster empowerment.

 

     Write a 5-page (minimum 1200 words) paper using information from Who Moved my Cheese, MANAGEMENT ANTIFRAUD
PROGRAMS AND CONTROLS,
White-Collar Crime, and any pertinent 3 articles assigned in class from Computers in Society, and present your plan as the new CEO to create an empowered and secure company.  Diagrams do not count as part of the required 1,200 words.

 

     You may submit a business plan, a detailed outline, or an article-type essay that might be found in our text. The object of this final is for you to convey to me that you have grasped enough of the class material to practically apply it to a real situation. Be creative, for I am not assigning a particular writing style or report format.

 

Email this final exam no later than July 9, 2016, to cramrf@hiram.edu

QUIZZES SUMMER 2016

 

Electronic Crime
Summer 2016  TRI-C
Quiz One


NAME (printed or typed) _____________________________________________________________

The Five Things We Need To Know About Technology Change

1. All technology change and advancement is a tradeoff. This means: (5 Points)

2. The advantages and disadvantages of a new technology are never distributed evenly among the population. This means: (5 Points)

3. Embedded in every technology there is a powerful idea, perhaps two or three powerful ideas. These ideas are often hidden from our view because they are of a somewhat abstract nature. But this should not be taken to mean they do not have practical consequences. This means: (5 Points)

4. Technology change is not additive; it is ecological. This means: (5 Points)

Managing the Risk of Fraud and Misconduct

5. Select the best answer: The sun will always rise in the east and when it does we will call it morning. The sun will always set in the west and when it does we will call it evening. This has always been; it is part of nature - it is mythic. When a technology becomes mythic: (3 Points)
Select one:
a. It is always dangerous because it is then accepted as is
b. It is not easily susceptible to modification or control
c. It is perceived to be part of the natural order of things
d. It tends to control more of our lives than is good for us
e. All of the above
f. None of the above

6. "The printing press annihilated the oral story-telling tradition; telegraphy annihilated space, television has humiliated the printed word; the computer, it seems, is degrading family and community togetherness." Which of the Five Things We Need To Know About Technology is this an example? (3 Points)
Select one:
a. There is embedded in every great technology and epistemological, political or social prejudice.
b. There is always a price for technology
c. There are always winners and losers
d. Technology change is not additive; it is ecological; that is, it changes everything.
e. Technology tends to become mythic, that is, perceived as part of the natural order of things.

7. The three conditions that must be present for fraud to occur are: Select one: (3 Points)
a. Opportunity, incentive, and cooperation
b. Cohering, pressure, and opportunity
c. Opportunity, incentive, and rationalization
d. Rationalization, opportunity, and collaboration
e. None of the above

8. Select the best answer. The previous question dealt with three conditions to occur necessary for fraud. These three conditions are known as: (3 Points)
Select one:
a. The Fraud Triangle
b. The Three Incentives for Crime
c. The Triple Paradigm of Fraud
d. The Asset Misappropriation Trisector

9. Select the best answer: The American Institute of Certified Public Accountants has labeled "what" as the Achilles' heel of fraud prevention? (3 Points)
Select one:
a. Computer password hackers
b. Management override
c. Lack of accounting control supervision
d. Computer maintenance down time
e. The constantly changing accounting policies requiring software updates and opportunity for hackers

10. Match the best definition that most accurately applies to the term. Enter the letter of the term in the blank preceding the definition. (3 Points each, total 27 Points)

I) ____The misappropriation of cash from an organization prior to being recorded
II) ____The misappropriation of cash from an organization after it has been recorded
III) ____Crediting one account with the receipts intended for a different account
IV) ____Where funds are distributed under the guise of a legitimate payment for invoiced goods or services. Personal purchase schemes, non-accomplish vendor schemes, schemes involving shell companies
V) ____Fraudulent disbursements that are perpetrated through the creation of false documentation
VI) ____Placing orders for inventory that exceed the amount actually needed to complete the project
VII) ____Fraudulent business ventures where investors are paid from other investors' funds rather than operations
VIII) ____When an employee engages in the unauthorized use of company assets
IX) ____Inventory theft, Fictitious Sales, Purchasing and Receiving Fraud

A. Asset Misuse
B. Noncash Fraud
C. Asset Requisition and Transfer Fraud
D. Larceny
E. Lapping
F. Fraudulent Billing
G. Payroll Schemes
H. Skimming
I. Ponzi Schemes

PowerPoint Slides on Electricity

11. a. Like charges _____________ each other.
b. Opposite charges ____________each other. (4 points)

12. a. Every time there is an alternating electric current, an _______________ _________________ is created. (2 Points)
b. Every time an alternating magnetic field crosses a conductor, an _________________ ______________
__________________ is created. (2 Points)

c. This ______________________ ______________________ leaves the conductor and travels through space at the speed of light. (2 Points)

13. True or False An atom is composed of a nucleus containing positively charged protons, negatively charged neutrons, and is orbited by neutrally charged electrons. (2 Points)

14. True or False The carrier particle foe the electromagnetic force is the electron. (2 Points)

15. True or False The flow of electrons in a wire, amperes, and current are basically the same thing. (2 Points)

16. What is a wavelength (in your own words)? (5 Points)

17. What is a frequency (in your own words)? (5 Points)

ESSAY:
18. In 500 words: How do you feel about the possibility of Facebook or other social media being used to secretly influence your choices? Do you feel you are being unknowingly manipulated if this technique was used to sell products or influence your social or political decisions? Has this happened to you? (12 points)

 

Electronic Crime
Tri-C - Summer 2016
Quiz Two

Chapter 6 - Building an Integrated and Comprehensive Compliance Program for Sustainable Value
Select the best answer.
1.  Effective fraud and misconduct risk management should begin with:
      a. A well designed and properly executed ethics and compliance
      b. A program that seeks to prevent, detect, and respond to fraud and misconduct.
      c. The program should be thoroughly integrated into the organization's overall guidance and risk-management framework
      d. The program should be thoroughly integrated into the company's business strategy and operations
      e. The program should not be an isolated set of activities within the organization
      f.  All of the above.

Chapter 6 - Building an Integrated and Comprehensive Compliance Program for Sustainable Value
2. Select the best answer. Because managers, officers, and CEOs of corporations are frequently the ones committing electronic crime, the success or failure of a compliance program will rest on the organization's ability to embed a culture of ethics and integrity.
      Circle One: TRUE or FALSE

Chapter 6 - Building an Integrated and Comprehensive Compliance Program for Sustainable Value
3. Select the best answer. An affective GRC program is Government, Risk, and Compliance program that protects, but does not enhance business values by fostering a risk-aware culture.
      Circle One: TRUE or FALSE

Chapter 6 - Building an Integrated and Comprehensive Compliance Program for Sustainable Value
Select the best answer.

4. The key attributes to an effective Compliance Function are:
     a. Authority, Responsibility, Competency, Objectivity and  Resources
     b. Authority, Responsibility, Due Diligence, Objectivity, and Coordination
     c. Authority, Coordination, Auditing, Responsibility, and Coordination
     d. Coordination, Responsibility, Authority, Auditing, and Cooperation

Chapter 6 - Building an Integrated and Comprehensive Compliance Program for Sustainable Value
Select the best answer.
5. An effective Board of Directors overseeing a corporation's compliance program needs information regarding:
     a. Aligning oversight, assessing risk, preventing misconduct, detecting and responding to misconduct, allow the CEO to evaluate the effectiveness of the program.
     b. Evaluate the effectiveness of the program by responding to the prevention of misconduct and assigning managers to asses risking taking.
     c. Aligning oversight, assessing risk, preventing misconduct, detecting and responding to misconduct, and evaluating effectiveness of the program.
     d. Aligning oversight, assessing risk, preventing misconduct, detecting and responding to misconduct, and evaluating effectiveness of the program.

What is Alternating Current?
Matching:
6.  Match the best definition in column B with the most appropriate answer in column A.
                    A                                            B
     A. Zero 1. ____Cycles per second
     B. Remains constant 2. ____Time interval between any two successive wave crests
     C. Constantly changing 3. ____The mazimum positive amplitude of a wave in the opposite direction
     D. Crests 4. ____Maximum positive amplitude of a wave
     E. Trough 5. ____The amplitude of an AC current
     F. Period 6. ____Amplitude of a DC voltage
     G. Frequency 7. ____Any point along the time axis
                             

 Article: Relationships, Community, and Identity in the New Virtual Society
Select the best answer.
7. In this phenomenon, relationships for young people can be just as powerful and meaningful as those in the real world.
     a. Virtual Society or virtual space
     b. The the Internet Only
     c. Chat Rooms Exclusively
     d. Emailting
     e. Texting above asll other mediums

Article: Relationships, Community, and Identity in the New Virtual Society
Select the best answer.
 8.  When the VCR was invented, many people predicted the demise of movie theaters; after all, if you can watch a movie at home why would anyone pay to go out to a theater? Today, movie theaters are doing a record business.
     When video conferencing was developed, some people predicted that many airlines and hotels would go out of business; after all, why would businessmen spend thousands of dollars on airfare, hotels, and meals to attend a business conference when they could stay in the office and do it on line? Well, airlines and hotels are busier than ever.
     The social turmoil of the 1970s was proclaimed by many to be the end of the nuclear family. But the family is still here; it's just different.
     People are now predicting that texting, email, chat rooms, cell phones, blogs, Facebook relationships, tweeting, on-line dating, and other social media are going to diminish our person-to-person interactions and destroy human personal interaction.
     What actually will happen is some human relationships will become shallower through cyber space relationship while others will become stronger. Things will change, but still be meaningful. As stated in Article 1 - Technology giveth and technology taketh away.

Circle One: TRUE or FALSE

Article: Relationships, Community, and Identity in the New Virtual Society
Select the best answer.
9.   Your found identity is one created by your circumstances - who your parents were, your ethnicity, your religion, your gender, your history and education and past experiences.  Your made identity is...
     a. ...the style of clothes and jewelry you wear
     b. ...your chosen behaviors
     c. ...your selected automobile, activities, and clubs you have joined
     d. ...how you want others to see you
     e. All of the above

Article: Are U Friends 4 Real?
Select the best answer.
10.  "Flaming" is a cyber term meaning text or email that invokes anger or other high emotions resulting from the hostile interpretation of such messages.  But texting, email, and Facebook are void of the human voice, the voice tone indicating anger, sadness, or frustration; the pauses between words indicating thought or concern, and the speed of the speech possibly indicating anxiousness.
     The phrase "You can make a marketing plan," can be said many different ways where one is a complement, the other is an insult, yet a third filled with sarcasm. It depends on where the pauses are, where the voice volume increases, and the voice tone.  Such communication is also void of body language and facial expressions which often make up over 80% of our personal communications.
      I once wrote what I considered to be a very grateful email of thanks and appreciation to a colleague for the effort he and his staff put into a wonderful weekend wedding. Shortly after sending the letter, I  received a very defensive phone call asking how I could be so unfair and insulting when he tried so hard to make the event successful. Somewhat dismayed, I went to his office and read to him my email with a kind voice tone, concerned inflections, appreciative pauses, and accompanied by facial expressions showing happiness and gratitude. What a difference! He was amazed!
      Friendships, romantic relationships, business memos, colleague correspondence, and instructions to employees, spouses, and children are often in the form of texts. Should care be taken in these messages to avoid "flaming" interpretations?

     a. Yes, care should always be taken to avoid "flaming interpretations" even though success is not guaranteed.
     b. No; flaming can't be avoided.
     c. No, if 50 people read the same message there will be 50 different interpretations. How can one attempt to overcome that?
     d. No, email and texting and other written forms of communication should always be replaced with phone calls to avoid flaming.

Article: Hacking the Lights Out
Select the best answer
11. The Stuxnet virus was planted into Iran's nuclear program computers by:
     a. Internet virus attack through email
     b. A back door attack through a computer's firewall
     c. Through a USB stick handed to an unsuspecting employee
     d. Through the power grid at the local power station
     e. From a trojan horse implanted into a didigital procedures manual

Article: Hacking the Lights Out
Select the best answer
12. When Iran's nuclear centrifuges were spinning out of control at a dangerous RPM, why didn't the control personnel intervene before the centrifuges were destroyed?
     a. The virus hit the centrifuges in the middle of the night when the neclear plants were closed
     b. The virus send false signals to the supervising controllers indicating all operations were operating normally
     c. The Stuxnet virus stopped the control mechanisms sent to supervisory personnel.
     d. The Stuxnet virus struck Iran's nuclear facilities on a holy holiday and the plants were closed

Article: Hacking the Lights Out
Select the best answer
13. All electricity furnished for home and industrial use in the United States uses 60-cycle alternating current. The power grid is the electrical supply circuits of thousands of power companies in United States all connected together. The 60 cycle AC current coming from any power company must match (be in sync) with the 60 cycle timing on the grid. The Aurora cyberattack in 2007 was staged by a pretend hacker working for the Department of Homeland Security to bring down an electric generator in a power company attached to the grid. How did this attack function?
     a.  The hacker created and out-of-sync 60 cycle current in opposition to the generators 60 cycle output.
     b.  The hacker planted a bomb under the generator
     c.  The hacker planted a bomb under the generator
     d.  The hacker pulled the generator's circuit breaker shutting the generator down

Article: Hacking the Lights Out
Select the best answer
14. Computers are subject to attack. The nation's electric power grid is also subject to attack by cybercriminals and it is much easier to hack than many protected computers.
      Circle One: TRUE or FALSE

Article The Bride of Stuxnet
Select the five answers that apply.
15. Once the virus Flame infects a computer, what happens?
     a. It records every keystroke
     b. It creates a perfect log of all activities
     c. It takes pictures of the monitor screen every 60 seconds
     d. It sends out bogus emails to everyone on the computer's email list
     e. It takes control of Bluetooth capability turning into a hub for a wireless network
     f.  It copies documents and files on the computer's hard drive

Article The Bride of Stuxnet
Select the besat answer
16. Stuxnet was a virus designed to work quickly, and in doing so it can be discovered quickly, so it must do its damage fast. Flame was a virus concerned with stealth and patience, moving very slowing, and infecting fewer machines.
     Circle OneL: TRUE or FALSE

Chapter 7 - Prevention: Risk Assessment
Select the best answer
17. The definition of what is as follows: A step-by-step process for identifying the quantitative and qualitative nature of potential integrity breakdown?
     a. Design considerations
     b. Risk Assessment
     c. Business goals and stategy
     d. Control Optimazion
     e. Risk Taking

Chapter 7 - Prevention: Risk Assessment
Select the best answer
18. What is the below procedure entitled?
(1) Identify Business Units, locations, or processes to assets
(2) Inventory and categorize fraud and misconduct risks
(3) Rate risks based on likelihood and significance of occurrence
(4) Remediate risks through control optimization

     a.  The four fundamental steps of risk assessment
     b.  The four fundamental steps of risk assessment
     c.  The four levels of crime, fraud, and misconduct
     d.  The four basics of the fraud rectangle
     e.  The control optimization for risk procedures

Chapter 7 - Prevention: Risk Assessment
Select the best answer
19. The first step is starting a risk assessment program is:
     a.  Putting someone responsible in charge
     b.  Deciding those aspects or parts of the organization that will be subject to the risk assessment.
     c.  Establishing a focus group to evaluate the overall risk of the company
     d.  Review documentation from previous risk assessment groups
     e. Have the focus group consult with the risk assessment team.

Chapter 7 - Prevention: Risk Assessment
Select the best answers - There are FOUR (4) correct answers
20. It is wise for the risk assessment team to have a company document review take place in order to determine company policies, procedures, and internal control.  These documents to be reviewed include: 
     a.  Code of Conduct
     b.  Applicable job descriptions
     c.  Employee attendance records
     d. Organizational charts
     e. Responce and improvement systems
     f.  Competitor's violation records
     g. All of the above

Chapter 7: Prevention: Risk Assessment
Select the best answer
21. Once the assessment team has estimated risk likelihood and significance, it is helpful to plot risks on an axis representing their significance and likelihood of occurrence using a heat map.
       Circle One: TRUE or FALSE

Chapter 7
Secelct the best answer
22. The primary coil of a transformer has 200 volts applied to it and 100 coils. The secondary side of the transformer has 50 coils. What is the voltage output on the secondary side?
     a. 50 volts
     b. 100 volts
     c. 200 Volts
     d. 100 amps
     e.  4 volts

Select the best answer
23. If you cut the resistance in half in an electrical circuit with 100 volts, the the amperes will double.
     Circle One: TRUE or FALSE

Chapter 7
Select the best answer
24. If the primary input side of a transformer has 500 turns and 100 volts, how many turns (coils) would you need on the secondary output side for the output to be 20 volts?
     a.  100 coil turns
     b.  50 coil turns
     c.  200 coil turns
     d. 20 coil turns
     e. None of the above

All your Ohm's law formulas are listed in the above wheel.
Refer to Chapter 3 on Electricity DeMystified if necessary.
     A spy for a competitive industry wants to listen to private conversations being broadcast over a competitor's private walkie-talkie network where management discuss test results in the field with engineers. The spy's office is too far away to receive the competitor's walkie-talkie signals. Somehow the spy needs to double the power output of the competitor's walkie-talkie signal. In order to accomplish this, the spy visits the competitor impersonating a communications walkie-talkie and radio company, J & B Communications, offering a free introductory deal. The introductory offer is to clean and tune all the competitor's walkie-talkies for free with the understanding that J & B Communications would be considered for any repair jobs in the future. The competitor agrees to the deal and give the spy 10 walkiw talkies to be cleaned, reconditioned, and returned in the morning. This is called social engineering.

The spy takes the walkie-talkies to his office and opens them up. The circuit on the antenna looks like the one below.
Do not be discouraged about this electronic circuit. Let's say it is the power output circuit to each walkie-talkie's antenna. The power to the antenna is 2 watts.
I = E/R  =  (Amps equals voltage divided by resistance)
I = 10/50 = (Amps equals 10 volts divided by 50 ohms) = .2 amps
The power output of the antenna is measured in watts. P = watts
P = EI (Power equals voltage times amps)

P = 10 X .2 = 2 watts. The walkie-talkies currently transmits a 2 watt signal.  The spy wants to double this power output to 4 watts. This would make the walkie-talkies more powerful, transmitt a longer distance, and allow the spy to monitor his competitor's conversations.
The spy decided to change the 50 Ohm resistor R3 in each walkie- talkie to a different value.  What value in ohms should the new resistor be in order to double the output power of each walkie talkie?

I = E/R  =  (Amps equals voltage divided by resistance)
I = 10/? = (Amps equals 10 volta divided by ? ohms) = .4 amps
The power output of the antenna is measured in watts. P = watts
P = EI (Power equals voltage times amps)
P = 10 X .4 = 4 watts.


Do you see now why you learned ohm's law? It is frequently used in electronic crime. (The actual circuit above would require different formulas beyond the scope of this course.)

     a. 50 ohms
     b. 200 ohms
     c. 35 ohms
     d. 25 ohms
     e. None of the above

Select the best answers from the matching table
26. Insert the best answer from column A into Column B

A. Captain Krunch

___Steve Wozniak
B.  A Hacker who helped form Apple Compluter ___ John DFraper
C. A young teenager who became a phreaker and hacker ___Kevin Mitnik
D. One of the founders of Apple Computer and the CEO and chairman ___Steve Jobs


Spplemental Course Study Material

Hacker Web Sites & Culture

Class PowerPoint Presentations
Telecommunication's Crime Presentation
Atom & Electronics Presentation

Atoms, Energy, and Electricity

The Particle Adventure
http://particleadventure.org/particleadventure/index.html

Disclaimer

     These Web Sites are to be used for educational purposes only.  In order to combat illegal hacking, it is necessary to understand how and why these activities take place.  

bugging.gif (2020 bytes) Watch for bugs!

     Below are some hacker and pfreaker websites.  Study them to learn about their environment, culture, beliefs, and purpose.  Learn the difference between the hacker that's a vandal and the hacker that's looking for security leaks in software encouraging the manufacture of such software to repair the vulnerable points in its product.

The Story of Kevin Mitnik
Kevin Mitnik Site
http://www.takedown.com/bio/mitnick.html

The Story of the Captain Crunch Cereal Whistle
Captain Crunch

Hacker Manuals and Instruction Guides
http://www.spectre-press.com/

The Hackers' Home Page
http://www.hackershomepage.com/

Some Hacking Organizations
http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/Hacking/Organizations/

Famous Hacked Web Sites
http://dir.yahoo.com/Computers_and_Internet/Security_and_Encryption/Hacking/Hacked_Web_Sites/

Glossary of Computer and Internet Terms
http://foldoc.org/

The Hacker Dictionary
http://www.hacker-dictionary.com/

The Jargon File
http://www.catb.org/~esr/jargon/

Some Famous Hacking Organizations

2600
http://www.2600.com

2600 Hacked Websites
http://www.2600.com/hacked_pages/

L0pht Heavy Industries
http://search.msn.com/results.asp?q=L0pht&spoff=on&origq=&RS=CHECKED&FORM=SMCRT&v=1&cfg=SMCINITIAL&nosp=0&thr=0&x=28&y=16

Cult of the Dead Cow
http://www.cultdeadcow.com