Page 45 - DCAP603_DATAWARE_HOUSING_AND_DATAMINING
P. 45

Unit 2: Data Mining Concept




          FBI, the majority of the hackers are from Russia and the Ukraine. Though, it is not surprised to   notes
          find that the increase in fraudulent credit card usage in Russian and Ukraine is corresponded to
          the increase in domestic credit card theft.
          After the hackers gained access to the consumer data, they usually notify the victim companies
          of the intrusion or theft, and either directly demanded the money or offer to patch the system for
          a certain amount of money. In some cases, when the companies refuse to make the payments or
          hire them to fix system, the hackers have release the credit card information that they previous
          obtained onto the Web. For example, a group of hackers in Russia had attacked and stolen about
          55,000 credit card numbers from merchant card processor CreditCards.com. The hackers black
          mailed the company for $ 100,000, but the company refused to pay. As a result, the hackers
          posted almost half of the stolen credit card numbers onto the Web. The consumers whose card
          numbers were stolen incurred unauthorized charges from a Russian-based site. Similar problem
          also happened to CDUniverse.com in December 1999. In this case, a Russian teenager hacked into
          CDUniverse.com site and stolen about 300,000 credit card numbers. This teenager, like the group
          mentioned above also demanded $100,000 from CDUniverse.com. CDUniverse.com refused to
          pay and again their customers’ credit card numbers were released onto the Web called the Maxus
          credit card pipeline.
          Besides hacking into e-commerce companies to steal their data, some hackers just hack into a
          company for fun or just trying to show off their skills.

                 Example: A group of hacker called “BugBear” had hacked into a security consulting
          company’s website. The hackers did not stole any data from this site, instead they leave a message
          like this “It was fun and easy to break into your box.”
          Besides the above cases, the FBI is saying that in 2001, about 40 companies located in 20 different
          states have already had their computer systems accessed by hackers. Since hackers can hack
          into the US e-commerce companies, then they can hack into any company worldwide. Hackers
          could have a tremendous impact on online businesses because they scared the consumers from
          purchasing  online.  Major  hacking  incidences  liked  the  two  mentioned  above  illustrated  that
          the companies do not have sufficient security system to protect customer data. More efforts are
          needed from the companies as well as the government to tighten security against these hackers.
          Since the Internet is global, efforts from different governments worldwide are needed. Different
          countries need to join hand and work together to protect the privacy of their people.





                         Data Warehousing and Data Mining using the sas®
                         system


                   s a management information systems department, our charge, simply stated, is to
                   answer questions. We answer questions reactively when needed and proactively
             Awhen possible. Being able to turn data into information, information into action
             and action into value is our reason for being. As technology changes, industry competition
             tightens,  and  our  clients  become  increasingly  computer  savvy,  our  department  must
             rapidly seek new technology and methods to meet the needs of our wide and varied list
             of clients.
             Beyond  the  online  mainframe  systems,  printouts,  and  electronic  file  attachments,  we
             desire to provide internet based, intelligent, integrated systems that give our end users the
             best management information systems in the world. By using formal data warehousing
             practices,  tools  and  methodologies,  state  of  the  art  data  extraction,  transformation  and

                                                                                Contd...



                                           LoveLy professionaL university                                    39
   40   41   42   43   44   45   46   47   48   49   50