What is phishing and how is it perpetrated

Assignment Help Computer Network Security
Reference no: EM131039988 , Length: word count:3000

Phishing-

This is my favourite topic...

The number of internet users is constantly increasing, and new online services and market places are appearing every day, which means that more and more information, including private data, is being transferred via the web. As a result, there are more and more people trying to steal this sensitive data. One popular technique used by the criminals is phishing - a combination of social engineering and traditional digital data theft.

1. Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website. [Microsoft]

2. Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait. [Tech Target]

3. Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to protect yourself from phishing is to learn how to recognize a phish. Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email. [PhishTank]

4. Phishing and spoof emails aim to obtain your secure information, passwords, or account numbers. These emails use deceptive means to try and trick you, like forging the sender's address. Often, they ask for the reader to reply, call a phone number, or click on a weblink to steal personal information. [PayPal]

5. Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, Social Security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince recipients to respond to them. The email can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business. It often urges you to act quickly because your account has been compromised in some way. [American Bankers' Association]

6. "Phishing" is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses. These authentic-looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords and credit card numbers. Consumers are lured into providing their account details by deceptive emails that look like they have been sent by a financial institution or other company, but which are in fact clever copies sent by a "phisher" hoping to deceive and defraud. [Australian Communications & Media Authority]

• Some background infoURL

Assessment-

The number of internet users is constantly increasing, and new online services and market places are appearing every day, which means that more and more information, including private data, is being transferred via the web. As a result, there are more and more people trying to steal this sensitive data. One popular technique used by the criminals is phishing - a combination of social engineering and traditional digital data theft.

Your assessment task:

1. What is phishing

2. How is it perpetrated?

3. Why is it successful?

4. Why should organisations be concerned?

5. What are the current and future trends?

6. What can be done to avoid it?

Tips:

• Only use recent references/sources
• Use lots of headings and show a logical flow
• Give me your opinion
• Word limit 3000

12 apa reference.

Reference no: EM131039988

Questions Cloud

Total and marginal utility of the fourth ice cream : The price of an ice cream cone is £1.50 and you buy three ice cream cones per week. If the price of an ice cream cone falls to £1.25 and you still buy three ice cream cones per week, which of the following is TRUE? a) The total utility of the four..
Human differences to be identified as protected classes : Please discuss what causes some of the forms of human differences to be identified as ‘protected classes.’ Also, please identify the ‘protected class(es)’ that differ between state (CA) legislation and federal legislation.
Discuss the difference between prejudice and stereotyping : Please discuss the major difference between empathic (active) listening and the other levels of listening presented by Stephen Covey. Also, please discuss, using graphs, the process of dialogue and its potential in changing people’s mental models and..
What will happen to the price of planes : What will happen to the price of planes, to sales, and to profits when Airbus comes out with a new plane?
What is phishing and how is it perpetrated : Your assessment task: What is phishing. How is it perpetrated? Why is it successful? Why should organisations be concerned
Calculate demand for may using five week moving average : Boi’s Car Rentals has been doing great business since acquiring a major North American car rental label. In preparation for the World Peace Summit slated for next month they need to project their demand for May. The business’ historic data is listed ..
Number of companies under competitive conditions : What happens to the industry and the number of companies under competitive conditions?
Is the growth of amazon.com proof that the world is flat : Book sales are reaching record highs even as "bricks and mortar" bookstores such as Barnes and Noble are struggling financially? Explain this paradox in the context of market areas, technology, and the spatial relationship between supply and deman..
Report characteristics for enterprise systems : The existing systems used in the domain - The benefits of existing systems in the identified domain and the challenges of existing systems in the identified domain

Reviews

Write a Review

Computer Network Security Questions & Answers

  Implement the affine cipher in c programing language

Implement the Affine Cipher in C programing language with comments - Implement DES in C programming language with comments.

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Describe the features of telecommunications networks

Describe the features of telecommunications networks

  Why do modern encryption algorithms use keys?

Why do modern encryption algorithms use keys?

  Write down a 1400- to 2100-word paper which explains the

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  What firewall setup would provide the firm both flexibility

Which firewall technologies should be deployed to (a) secure the internet-facing web servers (b) to protect the link between the web servers and customer database (c) to protect the link between internal users and the customer database? Be sure to..

  Develop a security awareness training communication plan

Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO), develop a security awareness training communication plan for these users

  Draft compliance matrix and compliant proposal to rfp

Create a compliance matrix and prepare a FAR-compliant proposal in response to the RFP from Assignment 2. Note: You may create and /or assume all necessary assumptions needed for the completion of this assignment.

  Identify the responsibilities of a project manager

Identify the responsibilities of a Project manager when participating in a real world project and define the role of management in projects, particularly from the view point of the practitioner as a member of the project team;

  Determination of the legal and ethical issues of seizure

A determination of the legal and ethical issues of seizure, handling, and investigating electronic evidence such as data and information contained on smartphones, flash drives, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd