Page 45 - DCAP603_DATAWARE_HOUSING_AND_DATAMINING
P. 45
Unit 2: Data Mining Concept
FBI, the majority of the hackers are from Russia and the Ukraine. Though, it is not surprised to notes
find that the increase in fraudulent credit card usage in Russian and Ukraine is corresponded to
the increase in domestic credit card theft.
After the hackers gained access to the consumer data, they usually notify the victim companies
of the intrusion or theft, and either directly demanded the money or offer to patch the system for
a certain amount of money. In some cases, when the companies refuse to make the payments or
hire them to fix system, the hackers have release the credit card information that they previous
obtained onto the Web. For example, a group of hackers in Russia had attacked and stolen about
55,000 credit card numbers from merchant card processor CreditCards.com. The hackers black
mailed the company for $ 100,000, but the company refused to pay. As a result, the hackers
posted almost half of the stolen credit card numbers onto the Web. The consumers whose card
numbers were stolen incurred unauthorized charges from a Russian-based site. Similar problem
also happened to CDUniverse.com in December 1999. In this case, a Russian teenager hacked into
CDUniverse.com site and stolen about 300,000 credit card numbers. This teenager, like the group
mentioned above also demanded $100,000 from CDUniverse.com. CDUniverse.com refused to
pay and again their customers’ credit card numbers were released onto the Web called the Maxus
credit card pipeline.
Besides hacking into e-commerce companies to steal their data, some hackers just hack into a
company for fun or just trying to show off their skills.
Example: A group of hacker called “BugBear” had hacked into a security consulting
company’s website. The hackers did not stole any data from this site, instead they leave a message
like this “It was fun and easy to break into your box.”
Besides the above cases, the FBI is saying that in 2001, about 40 companies located in 20 different
states have already had their computer systems accessed by hackers. Since hackers can hack
into the US e-commerce companies, then they can hack into any company worldwide. Hackers
could have a tremendous impact on online businesses because they scared the consumers from
purchasing online. Major hacking incidences liked the two mentioned above illustrated that
the companies do not have sufficient security system to protect customer data. More efforts are
needed from the companies as well as the government to tighten security against these hackers.
Since the Internet is global, efforts from different governments worldwide are needed. Different
countries need to join hand and work together to protect the privacy of their people.
Data Warehousing and Data Mining using the sas®
system
s a management information systems department, our charge, simply stated, is to
answer questions. We answer questions reactively when needed and proactively
Awhen possible. Being able to turn data into information, information into action
and action into value is our reason for being. As technology changes, industry competition
tightens, and our clients become increasingly computer savvy, our department must
rapidly seek new technology and methods to meet the needs of our wide and varied list
of clients.
Beyond the online mainframe systems, printouts, and electronic file attachments, we
desire to provide internet based, intelligent, integrated systems that give our end users the
best management information systems in the world. By using formal data warehousing
practices, tools and methodologies, state of the art data extraction, transformation and
Contd...
LoveLy professionaL university 39