Preview

How Not To Get Hooked By A Phishing Scam

Powerful Essays
Open Document
Open Document
3034 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Not To Get Hooked By A Phishing Scam
Information Security
ISSC361

6/23/2012

Jerry Cade

Internet Security
Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According
…show more content…
Despite widespread public perception that FTC. How Not to Get Hooked by a ‘Phishing” Scam. June 2004. The Internet is a major contributor to the rise in identity theft, surveys indicate that comparatively few individuals who know how a thief acquired their personally identifiable information (PII) cite the Internet. Some attribute the rise in identity theft instead to carelessness by businesses in handling PII, and by credit issuers that grant credit without proper checks. The Internet may play a role, however. Today, attention is focused on a relatively new scam called “phishing.” Phishing refers to a practice where someone misrepresents their identity or authority in order to induce another person to provide PII over the Internet. Some common phishing scams involve e-mails that purport to be from a financial institution, ISP, or other trusted company claiming that a person’s record has been lost. The e-mail directs the person to a website that mimics the legitimate business’ website and asks the person to enter a credit card number and other PII so the record can be restored. In fact, the e-mail or website is controlled by a third party who is attempting to extract information that will be used in identity theft or other crimes. The FTC issued a consumer alert on phishing in June 2004. Several laws restrict the disclosure of consumer information and require companies to ensure the security and integrity of the data in certain contexts — Section 5 of the Federal Trade Commission Act, the Fair Credit Reporting Act (FCRA), and Title V of the Gramm-Leach-Bliley Act. Congress also has passed several laws specifically related to identity theft: the 1998 Identity Theft and Assumption Deterrence Act; the 2003 Fair and Accurate Credit Transactions (FACT) Act; and the 2004 Identity

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    “You have $92.13c left in your Chase bank account, contact us today with your details to switch from telephone banking to online banking” - I was in the country barely 72 hours and I was already subject to someone attempting to steal my Identity! I am referring to the past summer that I spent in America working under a student visa. After registering my mobile phone and opening my first American bank account, I started getting texts like the one above. This my was my first personal exposure to the problem of Identity theft, and after a quick Google search to enquire what I was dealing with, I found that it was a very common occurrence in America; More than 57 million American adults receive “phishing” attack emails & texts every year – from hackers or cyber thieves who pretend to be trusted service providers to steal consumer account information, and more than half of those who responded become victims of Identity Theft (Gartner Research, Phishing Attack Victims Likely Victims for Identity Theft). Lucky I didn’t respond to that text then, aren’t I?…

    • 3601 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Today 's risk of surfing the internet has increased as a variety of threats have emerged. However; many people fail to understand the importance of internet security. A number of people do not apply or just apply the basic of security software until they realise there is a risk. Consequently, their computers are being infiltrated or infected. Some people are unaware of personal information being stolen or misused, which can present many security issues to the user. As one part of privacy, personal information has to be protected by internet users due to the many attacks that are intended to obtain your personal information for profit.…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    Identity Theft Effect

    • 3103 Words
    • 13 Pages

    A major growing problem within the United States is identity theft. Identity theft is the stealing and use of someone's personal information used primarily for monetary gain. I will elaborate on how identity theft occurs and I will describe what criminals can do with the information they obtain. I will also explain some of the prevention plans that companies have put into place to protect themselves and discuss how individuals can protect themselves as well. The Federal Trade Commission estimates that ten million Americans were victims of identity theft in 2002. 27.3 million Americans have been victims of some form of identity theft from 1998 to 2003. In 2004, merchandise…

    • 3103 Words
    • 13 Pages
    Better Essays
  • Better Essays

    Identity theft is one of the fastest growing crimes statistically according to the Federal Trade Commission. Roughly 27.3 million Americans have fallen victim to this form of theft/fraud. According to last year the loss of money for businesses and financial institutions are in the billions and with consumers out of pocket expenses has been about 5 billion dollars. "Identity theft" refers to crimes in which someone wrongfully obtains and uses another person's personal data (i.e., name, date of birth, social security number, driver's license number, and your financial identity— credit card, bank account and phone-card numbers) in some way that involves fraud or deception, typically for economic gain (to obtain money or goods/services). There are a few ways that people are able to obtain such information and some of the ways you will find that it is out of your control if you do not protect yourself. A few of the forms in which predators are able to easily extract your information and use it while damaging your life and credit. Some are done from people internally stealing business records of their personal information. Other means from what they call shoulder surfing. This is an easy way where someone is standing behind you at your desk while you are trying to visit a site that is personal. They are able to look at your keyboard and remember your login and passwords. Another big one would be dumpster diving. People do not realize that just by simply not shredding your personal information and just tossing it in the garbage people will go through your garbage to collect information about yourself. Once your trash can is at the end of your driveway this is now considered public property. Another means is to deceive the victim through the means of posing as someone else to obtain information such as a landlord or even posing as an employer trying to get your personal information. Another one would be from what they call skimming. This is done by stealing…

    • 3646 Words
    • 15 Pages
    Better Essays
  • Good Essays

    Identity Theft Thesis

    • 209 Words
    • 1 Page

    Identity theft has been at the forefront as a societal problem for several years. The public has been made aware of the dangers of identity theft, particularly to personal and financial security. Many studies have been completed concerning the size and scope of victimization. The government, credit card and other financial service industries have responded by putting tighter controls in place. On the other hand, the insidious threat of identity fraud has not been similarly acknowledged. Both the public and private sectors must understand and confront the enormity of the identity fraud problem so that it can be solved. Identity fraud, which encompasses identity theft, is the use of false identifiers, false or fraudulent documents, or a stolen…

    • 209 Words
    • 1 Page
    Good Essays
  • Good Essays

    Cyber Law

    • 662 Words
    • 3 Pages

    Elaborating on the concept of ‘phishing’, in order to lay down a precedent in India, the court stated that it is a form of internet fraud where a person pretends to be a legitimate association, such as a bank or an insurance company in order to extract personal data from a customer such as access codes, passwords, etc. Personal data so collected by misrepresenting the identity of the legitimate party is commonly used for the collecting party’s advantage. court also stated, by way of an example, that typical phishing scams involve persons who pretend to represent online banks and siphon cash from e-banking accounts after conning consumers into handing over confidential banking details.…

    • 662 Words
    • 3 Pages
    Good Essays
  • Good Essays

    History of the Internet

    • 377 Words
    • 2 Pages

    The Internet, also known as the World Wide Web, has been around for longer than most people would have thought. It started out as a small military project by ARPANET in 1969 that connected a computer from Stanford University to UCLA, with the use of Leonard Kleinrock’s packet switching, in an attempt to send a message, which soon paved the way to the future of absolute human ingenuity. The Internet has become one of the most significant and powerful military inventions ever conceived, and it has changed and impacted the majority of people around the world: socially, economically, and politically.…

    • 377 Words
    • 2 Pages
    Good Essays