What is phishing and how is it perpetrated

Assignment Help Computer Network Security
Reference no: EM131039988 , Length: word count:3000

Phishing-

This is my favourite topic...

The number of internet users is constantly increasing, and new online services and market places are appearing every day, which means that more and more information, including private data, is being transferred via the web. As a result, there are more and more people trying to steal this sensitive data. One popular technique used by the criminals is phishing - a combination of social engineering and traditional digital data theft.

1. Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website. [Microsoft]

2. Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait. [Tech Target]

3. Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to protect yourself from phishing is to learn how to recognize a phish. Phishing emails usually appear to come from a well-known organization and ask for your personal information - such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account. In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email. [PhishTank]

4. Phishing and spoof emails aim to obtain your secure information, passwords, or account numbers. These emails use deceptive means to try and trick you, like forging the sender's address. Often, they ask for the reader to reply, call a phone number, or click on a weblink to steal personal information. [PayPal]

5. Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, Social Security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince recipients to respond to them. The email can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business. It often urges you to act quickly because your account has been compromised in some way. [American Bankers' Association]

6. "Phishing" is a technique used to gain personal information for purposes of identity theft, using fraudulent e-mail messages that appear to come from legitimate businesses. These authentic-looking messages are designed to fool recipients into divulging personal data such as account numbers and passwords and credit card numbers. Consumers are lured into providing their account details by deceptive emails that look like they have been sent by a financial institution or other company, but which are in fact clever copies sent by a "phisher" hoping to deceive and defraud. [Australian Communications & Media Authority]

• Some background infoURL

Assessment-

The number of internet users is constantly increasing, and new online services and market places are appearing every day, which means that more and more information, including private data, is being transferred via the web. As a result, there are more and more people trying to steal this sensitive data. One popular technique used by the criminals is phishing - a combination of social engineering and traditional digital data theft.

Your assessment task:

1. What is phishing

2. How is it perpetrated?

3. Why is it successful?

4. Why should organisations be concerned?

5. What are the current and future trends?

6. What can be done to avoid it?

Tips:

• Only use recent references/sources
• Use lots of headings and show a logical flow
• Give me your opinion
• Word limit 3000

12 apa reference.

Reference no: EM131039988

Questions Cloud

Total and marginal utility of the fourth ice cream : The price of an ice cream cone is £1.50 and you buy three ice cream cones per week. If the price of an ice cream cone falls to £1.25 and you still buy three ice cream cones per week, which of the following is TRUE? a) The total utility of the four..
Human differences to be identified as protected classes : Please discuss what causes some of the forms of human differences to be identified as ‘protected classes.’ Also, please identify the ‘protected class(es)’ that differ between state (CA) legislation and federal legislation.
Discuss the difference between prejudice and stereotyping : Please discuss the major difference between empathic (active) listening and the other levels of listening presented by Stephen Covey. Also, please discuss, using graphs, the process of dialogue and its potential in changing people’s mental models and..
What will happen to the price of planes : What will happen to the price of planes, to sales, and to profits when Airbus comes out with a new plane?
What is phishing and how is it perpetrated : Your assessment task: What is phishing. How is it perpetrated? Why is it successful? Why should organisations be concerned
Calculate demand for may using five week moving average : Boi’s Car Rentals has been doing great business since acquiring a major North American car rental label. In preparation for the World Peace Summit slated for next month they need to project their demand for May. The business’ historic data is listed ..
Number of companies under competitive conditions : What happens to the industry and the number of companies under competitive conditions?
Is the growth of amazon.com proof that the world is flat : Book sales are reaching record highs even as "bricks and mortar" bookstores such as Barnes and Noble are struggling financially? Explain this paradox in the context of market areas, technology, and the spatial relationship between supply and deman..
Report characteristics for enterprise systems : The existing systems used in the domain - The benefits of existing systems in the identified domain and the challenges of existing systems in the identified domain

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd