FBI's Cyber's Most Wanted
Review the Federal Bureau of Investigation’s Cyber’s Most Wanted website. Select one suspect and explain the related security laws, crimes committed, security vulnerabilities that were exploited, and how to prevent these incidents from happening again.
Specifically, the following critical elements must be addressed:
Explain the related security laws based upon the chosen suspect.
Describe the crimes committed by the chosen suspect.
Identify the security vulnerabilities that were exploited.
Propose incident precautions in order to prevent the incident from repeating.
Chosen suspect: Igor Dekhtyarchuk
Security laws
The following security laws are relevant to the crimes committed by Igor Dekhtyarchuk:
- Wire Fraud: This law prohibits the use of interstate wires or electronic communications to commit or attempt to commit fraud.
- Access Device Fraud: This law prohibits the use of access devices, such as credit cards and bank account numbers, to commit or attempt to commit fraud.
- Aggravated Identity Theft: This law prohibits the knowing possession of two or more means of identification of another person with the intent to commit, or to aid or abet in the commission of, any unlawful activity that constitutes a felony.
- Weak passwords: Many of the login credentials that Dekhtyarchuk sold were weak and easy to guess.
- Phishing attacks: Dekhtyarchuk also used phishing attacks to steal login credentials from victims.
- Social engineering: Dekhtyarchuk also used social engineering tricks to trick victims into revealing their login credentials or clicking on malicious links.
- Use strong passwords and multi-factor authentication: Organizations and individuals should use strong passwords and multi-factor authentication to protect their online accounts.
- Educate employees about cybersecurity: Organizations should educate their employees about cybersecurity best practices, such as how to identify and avoid phishing attacks and social engineering tricks.
- Implement security controls: Organizations should implement security controls such as firewalls, intrusion detection systems, and web filtering to protect their networks from malicious attacks.
- Monitor networks and systems: Organizations should monitor their networks and systems for suspicious activity and respond to incidents quickly.
- Organizations:
- Use a password manager to help employees create and manage strong passwords.
- Implement multi-factor authentication for all access to critical systems and data.
- Conduct regular security awareness training for employees.
- Implement security controls such as firewalls, intrusion detection systems, and web filtering to protect networks from malicious attacks.
- Monitor networks and systems for suspicious activity and respond to incidents quickly.
- Individuals:
- Use a password manager to help create and manage strong passwords for all online accounts.
- Enable multi-factor authentication for all online accounts that offer it.
- Be careful about what links you click on and what information you share online.
- Be suspicious of unsolicited emails and phone calls.
- Keep software up to date.