Mitigating Computer Fraud in the Online Environment

Topics: Information security, Computer security, Security Pages: 7 (2288 words) Published: February 8, 2013
Mitigating Computer Fraud in the Online Environment

Crime on the Internet is creating stunning losses for people as well as organizations of all kinds (Internet Crime Complaint Center, 2009; Mensch & Wilkie, 2011). The necessity to inform and educate faculty, staff, and students of the diversity of threats and methods to protect and mitigate organizations and individuals from these threats is practically a moral imperative. People who lack the fundamental skills and knowledge to safeguard themselves and the institutions they attend or work for, cost those institutions and themselves billions of dollars every year, and the cost is rising (Custer, 2010; Internet Crime Complaint Center, 2009). This lack of fundamental skills and knowledge paired with the overall lack of education and information security by a preponderance of educational institutions and business makes it progressively more probable that cybercrime damages and costs will continue to burgeon (Guy & Lownes-Jackson, 2011; Khansa & Liginlal, 2009). In 2011, the fiscal cost of cybercrime was valued at 114 billion dollars (Ivan, Milodin, & Sbora, 2012). Responding to the escalated danger to educational organizations from cybercrime, a number of schools have been assigned to create programs for training students in Information Security Management (Kuzma, Kenney, & Philippe, 2009). Consistent with the necessity for instruction is the subsequent discussion of cyber threats and responses to them. Threats in an Online Environment

Spam is the sending of unsolicited e-mails to unsuspecting victims. Spam is responsible for many of the threats that will be discussed (Burgunder, 2011). Spam harmfully effects computer systems because it’s sheer volume, with eighty percent or more of e-mail shown to be spam. Spam affords the method of deploying numerous kinds of threats. These threats can be divided into application based threats and human based threats. According to two international studies, businesses do not put sufficient emphasis on information technology security (Labodi & Michelberger, 2010). Human-based Threats

Viruses, spyware, zombies, bots, and worms are all computer programs that are applied to destroy, corrupt, or glean data (Burgunder, 2011; Ivan et al., 2012). These are examples of human-based threats since systems are affected as a consequence of something that a human does. A virus is a computer program that typically contaminates systems through a spam e-mail or by clicking of a random advertisement, and then replicates itself over and over again. Trojan horses are a nonreplicating type of virus that appears useful, but is intended to corrupt or destroy files and programs. Spyware is designed to facilitate identify theft by delivering personal identifying data to cybercriminals. Zombies and bots can perform helpful purposes, but are used to collect data concerning the utilization of a system or computer. Worms are similar to viruses but do not need to piggyback on a file to be delivered from one system to another. Federal laws enacted make it a crime to deliberately generate harm to any computer system (Burgunder, 2011). Phishing is when someone poses as a legitimate company to collect personal information from unknowing victims. Phishing typically begins with an authoritative looking and sounding e-mail that directs the victim to a website that appears to be a legitimate business but is utilized to collect personal data (Burgunder, 2011; Custer, 2010). Phishing is currently the most widespread and well-known technique of fraud by electronic measures (Ivan et al., 2012). Software programs that either utilize a rainbow table or endeavor to deduce a password to get into a database or network is considered password sniffing (Kara & Atalay, 2012). After an administrator’s password is deduced it is probable that further accounts will be breached (Custer, 2010 Much too frequently transferable...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Fraud and Techniques Essay
  • Essay on Computer Fraud
  • Marketing Research in Online Environment Essay
  • computer Essay
  • environment Essay
  • Online Fraud and Identity Theft Essay
  • White Collar Crim: Computer Fraud Essay
  • Computer Fraud and Crimes Essay

Become a StudyMode Member

Sign Up - It's Free