Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

IT2222

05 Assignment 1

Name Date
Section Score

Direction: Assess the given scenario and provide applicable cybersecurity technologies by answering the guide
questions in at least three (3) sentences each. (3 items x 10 points)

Scenario:

In December 2021, Banco De Oro users took to social media to complain about illegal transactions made using their
accounts to transfer money to the UninonBank account of a certain “Mark Nagoyo.” A common pattern among the victims
is that the alleged cybercriminals were somehow able to access the victims’ BDO accounts even if they were careful
about not clicking any suspected phishing links and ensuring not to reveal any of their banking details in public.

A month later, five (5) suspects of the BDO hacking were arrested and charged by the National Bureau of Investigation
(NBI).

Ronelyn Panaligan, one of the suspects, acts as a “verifier” and pretends to conduct a survey and ask victims for their
identification cards with photographs in exchange for PHP50 in prepaid credit loan for “participating in the survey”. The
information and photographs of the victims, without their knowledge, would be used to apply for verified GCash or
Paymaya accounts. And after securing the debit cards, would offer them for sale to other fraudsters looking to cash out
funds from illegitimate sources.

Clay Revillosa, a third-year college student, was found to be selling 800,000 mailing lists or e-mail addresses containing
login credentials of online banking accounts for PHP30,000.

As for Ifesincachi Fountain Anaekwe and Chukwuemeka Pete, the DOJ said, they are the brains behind the “Mark
Nagoyo Group” and provided access devices such as bank accounts, crypto wallets, or even point of sale (POS) terminals
of legitimate merchants to fraudsters.

Jherom Anthony Taupa was found to be selling a “SCAMPAGE” for P2,000. It is a phishing website that is an imitation of
the website of GCash. The "SCAMPAGE" was used to harvest the login details, usernames, passwords, and mobile
personal identification numbers (MPINs) of victims who would access it under the mistaken belief that they were
accessing the GCash official portal.

Source: https://www.rappler.com/business/bdo-clients-lose-money-due-alleged-online-banking-hack/

Guide Questions:

1. What should possible cybersecurity technology BDO apply to prevent such scenarios? Match the cybercrime
offense to the possible cybersecurity technology.
2. Which cybersecurity technologies should bank users apply to avoid falling from such crimes?
3. In your opinion, what is the significance of cybersecurity technologies in situations like this?

GRADING RUBRIC:
Performance Standards Points
The student provided a justified explanation of the question. 5
The student provided a clear answer in at least three (3) sentences of explanation. 5
Total 10

05 Assignment 1 *Property of STI


Page 1 of 1

You might also like