Preview

importance of awareness of the security knowledge

Good Essays
Open Document
Open Document
933 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
importance of awareness of the security knowledge
This assignment attempts to show the importance of awareness of the security knowledge that will make us more aware about threats like escrow services fraud, spams and spoofing. There’s statistics demonstrates the recent trends of these types of threats that people usually face in the Internet. The impacts mostly negative and sometimes there are big losses. The research studies the potential of cyberattacks to increase loss, scams and spoofing, both locally and worldwide.

Social networking sites turned to be at the top of the targets for attackers. Rafter said (2011), these social network sites are like a treasure trove of prized information for cyberattackrs. The reason why they’re focusing on social network sites is because it has million’s of users which means a lot of fraud opportunities. In such a popular open software applications, it’ll be easier for the hackers to reach and access personal information. One of the newest types of scams is email spoofing. Rafter defined email spoof as fake email messages, that looks like it’s a friend request. It comes with attached file as picture of the account asking for a request. These sorts of emails must carry some type of virus, for example a Trojan horse that steels password and other important information; it works if the receiver clicks on the attachment.

Phishing campaign means, when the email is demonstrating a page that’s shows the login pages of any social network site in the content of the email. In addition, its fake, and any private information that entered in this page such as password is directly transferred to the hacker. In YouTube scam, spammers create fake YouTube accounts, and send requests to others YouTube users through email asking them to see their profiles. For sure, if someone went to the link its going to transfer them to the spammer’s website (Rafter, 2011). In the Gulf countries 25 percent of tablet users and 20 per cent of smartphone owners received mails



References: Ogunjobi, T. (2011). SCAMS - and how to protect yourself from them (First ed., pp. 94-95). N.p.: Tee Publishing. Rafter, M. (2011). Social Networking Security Scams. In Norton. Retrieved May 18, 2012, from :http://us.norton.com/yoursecurityresource/detail.jsp?aid=security_scams Buller, A. (2012). 62% Of UAE Cannot Recognise A Phishing Message http://gulfbusiness.com/2012/11/62-of-uae-cannot-recognise-a-phishing-message/ D’Souza, C ( 2012). Complaints mount on late night text spam in UAE. http://gulfnews.com/news/gulf/uae/society/complaints-mount-on-late-night-text-spam-in-uae-1.1036439 Majorie,. L. (2012) SMS spam menace: UAE mobile users frustrated. http://www.emirates247.com/news/sms-spam-menace-uae-mobile-users-frustrated-but-you-can-du-says-telco-2012-11-12-1.482666 Agarib, A. (2014). Fraud, blackmailing top list of cyber crimes in Dubai. http://www.khaleejtimes.com/kt-article-display-1.asp?xfile=data/crime/2014/May/crime_May9.xml&section=crime

You May Also Find These Documents Helpful

  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    Baker, Emiley; Wade Baker, John Tedesco (2007). "Organizations Respond to Phishing: Exploring the Public Relations Tackle Box". Communication Research Reports…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging, and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Stereotypes

    • 1235 Words
    • 5 Pages

    Cited: Editor, Focus. "The Security Risks of Social Networks." Focus. Web. 29 Mar. 2012. <http://www.focus.com/fyi/security-risks-social-networks/>.…

    • 1235 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    anti virus, anti spyware, firewalls, and spam filters are also effective ways of decreasing the risk of phishing scams associated with email.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    However, the issue of trust is on the rise on social networks as many people fear that their personal identifying information can be used for commercial purposes following recent research on impersonations and cyber criminals. In a statement, Facebook spokesman Barry Schnitt told CNN that impersonation schemes affect less than one per cent of Facebook 's 150 million…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Better Essays

    To avert an identity thief from obtain your personal information from your dumpster or recycling bin, shred all insurance forms, credit card offers received in mail, change receipts, bank and check statement and copies of credit application. Phishing can be prevent by verify a source before sharing your credit or debit card, avoid pop-up emails, avoid using easy access information; and don’t give your personal information to any company through mail or over the internet without knowing who you’re doing business with. To avoid getting caught the traditional way, lock all personal in a safe place and secure purses and wallets, travel with information needed. Medical identity theft can be prevent by sharing health information only with trusted providers and keeping copies of health-care records in case of a dispute (Prevention of medical theft, 2008). Identity thieves also uses phone call their victims as another way to fain information. Contact you financial institution directly to verify personal finances and avoid giving it out over the phone. As people become aware of scams, fraudster change their methods of scamming and come up with new methods (how to detect, 2014). The three D’s strategy are very helpful. Deter identity thieves by safeguarding your information, detect suspicious activity by routinely monitoring financial account and bill statement, and defend…

    • 1429 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    sociology

    • 1309 Words
    • 6 Pages

    Social networking sites tend to encourage most people to be public regarding their personal lives which ultimately lead to lose of privacy. Most of information on social networking sites is public meaning anyone with an internet connection can access it. Social networking sites often require one to submit personal information such as name, location, age, gender, images or photos and contact details. In some of the sites, people share information about with whom, where and what they are doing. Publicizing such information is risky considering one cannot know whether it falls into the wrong hands or not. This lack of anonymity exposes one to countless risks and breaches a person’s privacy. As one is a friend, who also has a network of friends, a person’s information and uploads can be shared and re-shared with strangers, not the initial recipients. Nothing posted on social…

    • 1309 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Social networks are beneficial in many ways, for example they make being able to keep in touch with family and friends easier, reconnecting with long-lost friends or make new ones, gaining business contacts, advancing a career, discovering others with similar interests, and more; society is beginning to lack the needed social skills for life, as well as leaving themselves vulnerable to cyber crime by isolating themselves with social networks throughout the internet. Partly because the web is available nearly everywhere and smartphones are common and affordable, cybercrime is on the rise and society is opening…

    • 2198 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    undercover

    • 473 Words
    • 2 Pages

    Click fraud is a type of fraud that occurs on the Internet in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad 's link. Click fraud has recently emerged as a topic of discussion and debate regarding the potential of undermining the pay-per-click revenue model that has made Google and Yahoo the financial success that they are today. Search engine marketers believe that click fraud does occur and diminishes the success rate of many online marketing programs.…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet Scam

    • 1316 Words
    • 6 Pages

    Thesis Statement : Why many students victimized in Internet Scam? The aim of this chapter…

    • 1316 Words
    • 6 Pages
    Good Essays