Ask Operation Management Expert

Closing Case UBS PAINEWEBBER’S BUSINESS OPERATIONS DEBILITATED BY MALICIOUS CODE Employee (Allegedly) Planned to Crash All Computer Networks In June 2006, a former systems administrator at UBS PaineWebber, Roger Duronio, 63, was charged with building, planting, and setting off a software logic bomb designed to crash the network. His alleged motive was to get revenge for not being paid what he thought he was worth. He designed the logic bomb to delete all the files in the host server in the central data center and in every server in every U.S. branch office. Duronio was looking to 380 381 make up for some of the cash he felt he had been denied. He wanted to take home $175,000 a year. He had a base salary of $125,000 and a potential annual bonus of $50,000, but the actual bonus was $35,000. Duronio quit his job, went to a broker within hours, and bought stock options that would only pay out if the company’s stock plunged within 11 days. By setting a short expiration date of 11 days instead of a year, the gain from any payout would be much greater. He tried to ensure a stock price crash by crippling the company’s network to rock their financial stability. His “put” options expired worthless because the bank’s national network did go down, but not UBS stock. Discovering the Attack In a federal court, UBS PaineWebber’s IT manager Elvira Maria Rodriguez testified that on March 4, 2002, at 9:30 A.M. when the stock market opened for the day, she saw the words cannot find on her screen at the company’s Escalation Center in Weehawken, New Jersey. She hit the enter key to see the message again, but her screen was frozen. Rodriguez was in charge of maintaining the stability of the servers in the company’s branch offices. When the company’s servers went down that day in March 2002, about 17,000 brokers across the country were unable to make trades; the incident affected nearly 400 branch offices. Files were deleted. Backups went down within minutes of being run. Rodriguez, who had to clean up after the logic bomb, said, “How on earth were we going to bring them all back up? How was this going to affect the company? If I had a scale of 1 to 10, this would be a 10-plus.” The prosecutor, Assistant U.S. Attorney V. Grady O’Malley, told the jury: “It took hundreds of people, thousands of man hours and millions of dollars to correct.” The system was offline for more than a day, and UBS PaineWebber (renamed UBS Wealth Management USA in 2003) spent about $3.1 million in assessing and restoring the network. The company did not report how much was lost in business downtime and disruption. Tracking Down the Hacker A computer forensics expert testified that Duronio’s password and user account information were used to gain remote access to the areas where the malicious code was built inside the UBS network. The U.S. Secret Service agent who had investigated the case found a hard copy of the logic bomb’s source code on the defendant’s bedroom dresser. A computer forensics investigator found electronic copies of the code on two of his four home computers. Defense Blames UBS Security Holes Chris Adams, Duronio’s defense attorney, offered another scenario. Adams claimed that the code was planted by someone else to be a nuisance or prank. Adams also said the UBS system had many security holes and backdoors that gave easy access to attackers. Adams told the jury: UBS computer security had considerable holes. There are flaws in the system that compromise the ability to determine what is and isn’t true. Does the ability to walk around in the system undetected and masquerade as someone else affect your ability to say what has happened? He also claimed that UBS and @Stake, the first computer forensics company to work on the incident, withheld some information from the government and even destroyed some of the evidence. As for the stock options, Adams explained that they were neither risky bets nor part of a scheme, but rather a common investment practice. Disaster Recovery Efforts While trying to run a backup to get a main server up and functional, Rodriguez discovered that a line of code (MRM-r) was hanging up the system every time it ran. She renamed the command to hide it from the system and rebooted the server. This action stopped the server from deleting anything else. After testing to confirm the fix, backup tapes brought up the remaining 2,000 servers, and the line of code was deleted from each one. Restoring each server took from 30 minutes to 2 hours unless there was a complication. In those cases, restoration took up to 6 hours. UBS called in 200 IBM technicians to all the branch offices to expedite the recovery. Many of the servers were down a day and a half, but some servers in remote locations were down for weeks. The incident impacted all the brokers who were denied access to critical applications because the servers were down. 381 382 Minimizing Residual Damages UBS asked the judge to bar the public from Duronio’s trial to avoid “serious embarrassment” and “serious injury” to the bank and its clients and possibly reveal sensitive information about the UBS network and operations. UBS argued that documents it had provided to the court could help a criminal hack into the bank’s computer systems to destroy critical business information or to uncover confidential client information. Duronio faced federal charges, including mail fraud, securities fraud, and computer sabotage, which carry sentences of up to 30 years in jail, $1 million in fines, and restitution for recovery costs. Sources: Compiled from Gaudin (2006) and Whitman (2006). Class, the UBS PaineWebber Case is an example of what can happen when an employee (or someone who has inside access) decides to harm a business. Too many news stories contain similar situation, as such, we should be aware of the potential and prepare to prevent or mitigate adverse effects.

Questions 1. Do you agree with the defense lawyer's argument that anyone could have planted the logic bomb because UBS's computer security had considerable holes.

2. Given the breadth of known vulnerabilities, what sort of impact will any set of security standards have on the rise of cyber attacks?

Operation Management, Management Studies

  • Category:- Operation Management
  • Reference No.:- M92538437

Have any Question?


Related Questions in Operation Management

Conflictdefine functional versus dysfunctional conflict in

Conflict Define functional versus dysfunctional conflict in a work group and explain how you can increase functional conflict and decrease dysfunctional conflict. Develop a response that includes examples and evidence to ...

For this assignment you will need to find 2 articles in

For this assignment, you will need to find 2 articles in business that can help describe what are IT strategic initiative being undertaken by an organization are like. Choose a different organization for each of the arti ...

Coping with problems joe is a little nervous he has just

Coping With Problems Joe is a little nervous. He has just been transferred from another plant to take over a production line. Production is down and there is a serious problem with absenteeism. To make matters worse, the ...

Over 30 years ago michael porter identified a holistic

Over 30 years ago Michael Porter identified a holistic approach to understanding how competitive forces shape strategy. He posited that the only way to truly insulate an organization from underlying economic volatility i ...

You are the contracting officer for an air-to-ground

You are the contracting officer for an air-to-ground missile development program. A contract for pre-production models of the missile was awarded by your predecessor and the contractor is behind schedule. In a program me ...

The ikea case provides an excellent opportunity to apply

The IKEA case provides an excellent opportunity to apply strategic management concepts to a large privately-held company that is expanding into India. IKEA is a Netherlands-based Swedish company with a presence in 44 cou ...

Can you answer for me the following questions about social

Can you answer for me the following questions about social loafing and the three main causes of free-riding. 1. Give a description of the phenomenon of social loafing. 2. Give a description of the phenomenon of free-ridi ...

1 analyzing the bridgestonefirestone and ford motor company

1. Analyzing the Bridgestone/Firestone and Ford motor company, is it sufficient to use the ISO/QS 9000 standards as the main basis of vendor/product selection? 2. What position to these cars company ( 1. Volkswagen, 2. F ...

Research the effect of primary and secondary seat belt laws

Research the effect of primary and secondary seat belt laws on the occurrence of motor-vehicle injuries and fatalities. Explain how epidemiologic studies influenced the development of current seat belt laws. Describe how ...

Please provide a brief paragrap of the key takaways from

Please provide a brief paragrap of the key takaways from each of the following topics: Designing Clear Visuals in business reports Designing Successful Documents and Websites Writing Winning Proposals

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As