Question

500 words Why is Internet fraud grabbing the headlines when these crimes have existed long before...

500 words

Why is Internet fraud grabbing the headlines when these crimes have existed long before the Internet? What are some of the ways the internet makes committing these crimes easier? How can you protect yourself while using the internet and email?

Homework Answers

Answer #1

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

It is gaining the headlines because after the internet is being explored, there are plethora of ways criminal can use it to do fraud. The frauds have been multiplexed.

Below are some frauds done using intenet

  • Business E-Mail Compromise (BEC): A sophisticated scam targeting businesses working with foreign suppliers and companies that regularly perform wire transfer payments. The scam is carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
  • Data Breach: A leak or spill of data which is released from a secure location to an untrusted environment. Data breaches can occur at the personal and corporate levels and involve sensitive, protected, or confidential information that is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
  • Denial of Service: An interruption of an authorized user's access to any system or network, typically one caused with malicious intent.
  • E-Mail Account Compromise (EAC): Similar to BEC, this scam targets the general public and professionals associated with, but not limited to, financial and lending institutions, real estate companies, and law firms. Perpetrators of EAC use compromised e-mails to request payments to fraudulent locations.
  • Malware/Scareware: Malicious software that is intended to damage or disable computers and computer systems. Sometimes scare tactics are used by the perpetrators to solicit funds from victims.
  • Phishing/Spoofing: Both terms deal with forged or faked electronic documents. Spoofing generally refers to the dissemination of e-mail which is forged to appear as though it was sent by someone other than the actual source. Phishing, also referred to as vishing, smishing, or pharming, is often used in conjunction with a spoofed e-mail. It is the act of sending an e-mail falsely claiming to be an established legitimate business in an attempt to deceive the unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account information after directing the user to visit a specified website. The website, however, is not genuine and was set up only as an attempt to steal the user's information.
  • Ransomware: A form of malware targeting both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and/or systems. Ransomware is frequently delivered through spear phishing emails to end users, resulting in the rapid encryption of sensitive files on a corporate network. When the victim organization determines they are no longer able to access their data, the cyber perpetrator demands the payment of a ransom, typically in virtual currency such as Bitcoin, at which time the actor will purportedly provide an avenue to the victim to regain access to their data.

Protecting Privacy

  • Don’t give private information to anyone you don’t know or who doesn’t have a legitimate need for it.
  • Don’t provide personal, sensitive or confidential information online unless you are using a trusted, secure web page.
    • At a minimum, look for “https” in the URL to indicate that there is a secure connection.
    • Get to web sites by typing the web address in directly. Don’t click or cut and paste links in unsolicited emails.
    • Remember that links and web sites that look legitimate can really be bogus sites designed to steal information or infect your computer.
  • Don’t put sensitive information in locations that are accessible from the Internet. Even unlinked web pages can be found.

Protecting information in Email and IM/Texts

  • Never assume that email, instant messages (IM), texts or attachments are private or confidential.
  • Avoid sending large attachments.
  • Use the “Bcc” (blind carbon copy) line for large numbers of recipients. This protects the email addresses of the recipients by hiding them and makes your email easier to read.

Security Cautions

Don’t click on unknown links or attachments in email, texts, social networking sites, or pop-up ads/windows. These could compromise your computer or take you to malicious web sites designed to steal information.

  • Just opening a malicious web page or attachment can infect a computer. Make sure you know where you’re going before clicking on a link or opening something.
  • Instead of clicking on an unknown link – including “tiny URLs” – look up the website yourself (e.g. Google it) and go there on your own. If you can't verify that something is legitimate, DELETE IT!

File sharing and IM
Be extremely careful with file sharing software (BitTorrent, Kazaa, eDonkey, Limewire, etc.) and Instant Messaging (IM).

  • File sharing can expose your computer to malicious files and attackers. Files may not always be what they say they are.
  • Improperly configured filesharing software can allow others access to your entire computer.
  • Also, if you share copyrighted files, you risk being disconnected from the campus network, as well as serious legal consequences.
  • Some anti-virus programs cannot detect viruses in P2P/IM/chat files, so viruses and other malicious code can be spread this way.

Kindly revert for any queries

Thanks.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Using your experiences and the internet as your guides, write an essay (at least 500 words)...
Using your experiences and the internet as your guides, write an essay (at least 500 words) with an introduction and a conclusion in which you address the following topics. List all resources used in standard format at the end of your paper. 1. Identify a cultural group to which you belong. Explain why you consider it a culture by describing some of its characteristics and providing examples of the kinds of experiences and knowledge shared by its members. (4 points)...
The Fraud Triangle LO 5-2 Explain the components of the Fraud Triangle. Donald R. Cressey, a...
The Fraud Triangle LO 5-2 Explain the components of the Fraud Triangle. Donald R. Cressey, a noted criminologist, is mostly credited with coming up with the concept of a Fraud Triangle. Albrecht points out that, while researching his doctoral thesis in the 1950s, Cressey developed a hypothesis of why people commit fraud. He found that trusted persons become trust violators when they conceive of themselves as having a financial problem that is nonsharable, are aware that this problem can be...
TASK TWO(10%, 500 words) This task is all about you and your approach to learning! You...
TASK TWO(10%, 500 words) This task is all about you and your approach to learning! You are required to reflect on your experiences during your participation in this unit this semester. In particular, discuss what (if any) aspects of the unit challenged or strengthened your assumptions, beliefs, or expectations about yourself as a student of finance, and how this might affect your future studies in this discipline.Use the three-step reflective framework below to structure your response. (You may use some...
Please reply to this post by a classmate. 150 words minimum. This topic is very interesting...
Please reply to this post by a classmate. 150 words minimum. This topic is very interesting to me as I have never thought about my strengths or weaknesses of my writing skills. I believe a strength that I have in writing is the fact the I read and reread everything that I type before I send it on to anyone. I look to make sure all words are spelled correctly and that all my grammar is used correctly. I try...
Properties of water to test at home: Experiment 1 Materials needed – one paper clip and...
Properties of water to test at home: Experiment 1 Materials needed – one paper clip and a glass of water Procedure: place a paper clip (laying flat) on the surface of the water and observe. Observations: What happened when you placed the paper clip on the surface of the water? Procedure: Place the paper clip long ways (up and down) onto the surface of the water. Observations: What happened when you placed the paperclip long ways on the surface of...
Create a function in MIPS using MARS to determine whether a user input string is a...
Create a function in MIPS using MARS to determine whether a user input string is a palindrome or not. Assume that the function is not part of the same program that is calling it. This means it would not have access to your .data segment in the function, so you need to send and receive information from the function itself. The program should be as simple as possible while still using necessary procedures. Follow the instructions below carefully. Instructions: ●...
Read the LDC Cloud Systems Case Study and answer the question below: THE EMAIL The email...
Read the LDC Cloud Systems Case Study and answer the question below: THE EMAIL The email had been sent from one mid-level accounting manager at headquarters to another about six months earlier. The message read: Bill, here are the accounting issues I mentioned, and as you know, some of these go back a ways. The data that supports these accounts are not always clear and keep changing, and we are not sure what the correct accounting treatment is for these...
Provide a summary of the article below (200-400 words) that includes/addresses the following: Why you selected...
Provide a summary of the article below (200-400 words) that includes/addresses the following: Why you selected this article. Describe at least two things you learned from the article including how they add to your knowledge of Global Information Technology. 5G vs. 4G Cellular Technology: What Businesses Need to Know 5G networks are rolling out worldwide. Verizon, AT&T, Comcast, T-Mobile, and Sprint are among the leading 5G internet service providers. Mobile and fixed 5G services are still limited in geographic reach,...
Employee Handbook Presentation Assignment to be presented. This week, you have received the following email from...
Employee Handbook Presentation Assignment to be presented. This week, you have received the following email from a friend of yours, Helen Mayer. Helen is the owner of a local eco-friendly toy store, EcoGioco. There are two locations now open and each store employs 22 employees. You help Helen with her HR and employee issues in your spare time. She doesn’t have enough legal-related issues to justify hiring a full-time HR professional but does need guidance on what to do to...
Explain the different goals that a firm might have and compare and contrast the goals that...
Explain the different goals that a firm might have and compare and contrast the goals that event organisers seem to have with the goals of resale companies like Stubhub and Viagogo. Word limit - 160 words The market for ticket prices in the entertainment industry In April 2020, the United Kingdom’s Competition and Markets Authority (CMA) launched an investigation into the £4billion merger between two ticket resale companies, Viagogo and Stubhub. In the past in the UK there were a...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT
Active Questions
  • Question One: Basic security concepts and terminology                         (2 marks) Computer security is the protection of...
    asked 34 seconds ago
  • In program P83.cpp, make the above changes, save the program as ex83.cpp, compile and run the...
    asked 8 minutes ago
  • the determination of aspirin in commercial preparations experment explain why the FeCl3-KCl-HCl solution was ased as...
    asked 20 minutes ago
  • Describe important events and influences in the life of Wolfgang Amadeus Mozart. What styles, genres, and...
    asked 23 minutes ago
  • 3.12 Grade Statistics Write a python module "school.py" that prints school information (first 3 lines of...
    asked 24 minutes ago
  • Using python, please explain. The factorial of an integer N is the product of the integers...
    asked 28 minutes ago
  • alamoto Co. manufactures a single product that goes through two processes — mixing and cooking. The...
    asked 33 minutes ago
  • QUESTION 21 _______ is the ease of use with which network users can access the network...
    asked 38 minutes ago
  • Configure IP static routing using 6 pc's, 3 routers & 3 switches by using CISCO PACKET...
    asked 50 minutes ago
  • Write a C++ program that calculates the series and parallel resistance for a group of resister...
    asked 1 hour ago
  • 1. A host computer is assigned the IP address 192.168.12.8 and a subnet mask of 255.255.255.192....
    asked 1 hour ago
  • Employees checking their cell phones and whispering to each other during a meeting are causing which...
    asked 1 hour ago