Preview

importance of awareness of the security knowledge

Good Essays
Open Document
Open Document
933 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
importance of awareness of the security knowledge
This assignment attempts to show the importance of awareness of the security knowledge that will make us more aware about threats like escrow services fraud, spams and spoofing. There’s statistics demonstrates the recent trends of these types of threats that people usually face in the Internet. The impacts mostly negative and sometimes there are big losses. The research studies the potential of cyberattacks to increase loss, scams and spoofing, both locally and worldwide.

Social networking sites turned to be at the top of the targets for attackers. Rafter said (2011), these social network sites are like a treasure trove of prized information for cyberattackrs. The reason why they’re focusing on social network sites is because it has million’s of users which means a lot of fraud opportunities. In such a popular open software applications, it’ll be easier for the hackers to reach and access personal information. One of the newest types of scams is email spoofing. Rafter defined email spoof as fake email messages, that looks like it’s a friend request. It comes with attached file as picture of the account asking for a request. These sorts of emails must carry some type of virus, for example a Trojan horse that steels password and other important information; it works if the receiver clicks on the attachment.

Phishing campaign means, when the email is demonstrating a page that’s shows the login pages of any social network site in the content of the email. In addition, its fake, and any private information that entered in this page such as password is directly transferred to the hacker. In YouTube scam, spammers create fake YouTube accounts, and send requests to others YouTube users through email asking them to see their profiles. For sure, if someone went to the link its going to transfer them to the spammer’s website (Rafter, 2011). In the Gulf countries 25 percent of tablet users and 20 per cent of smartphone owners received mails



References: Ogunjobi, T. (2011). SCAMS - and how to protect yourself from them (First ed., pp. 94-95). N.p.: Tee Publishing. Rafter, M. (2011). Social Networking Security Scams. In Norton. Retrieved May 18, 2012, from :http://us.norton.com/yoursecurityresource/detail.jsp?aid=security_scams Buller, A. (2012). 62% Of UAE Cannot Recognise A Phishing Message http://gulfbusiness.com/2012/11/62-of-uae-cannot-recognise-a-phishing-message/ D’Souza, C ( 2012). Complaints mount on late night text spam in UAE. http://gulfnews.com/news/gulf/uae/society/complaints-mount-on-late-night-text-spam-in-uae-1.1036439 Majorie,. L. (2012) SMS spam menace: UAE mobile users frustrated. http://www.emirates247.com/news/sms-spam-menace-uae-mobile-users-frustrated-but-you-can-du-says-telco-2012-11-12-1.482666 Agarib, A. (2014). Fraud, blackmailing top list of cyber crimes in Dubai. http://www.khaleejtimes.com/kt-article-display-1.asp?xfile=data/crime/2014/May/crime_May9.xml&section=crime

You May Also Find These Documents Helpful

  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Earl Jones Ponzi Scheme

    • 1183 Words
    • 5 Pages

    SOCS10261G Scams Frauds Identity Theft Crimes of Deception in the Information Age - Term 1129, Class 75036…

    • 1183 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    Baker, Emiley; Wade Baker, John Tedesco (2007). "Organizations Respond to Phishing: Exploring the Public Relations Tackle Box". Communication Research Reports…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    However, the issue of trust is on the rise on social networks as many people fear that their personal identifying information can be used for commercial purposes following recent research on impersonations and cyber criminals. In a statement, Facebook spokesman Barry Schnitt told CNN that impersonation schemes affect less than one per cent of Facebook 's 150 million…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Today, this is happening a lot more. Hackers will try to hack ones Facebook account to find out personal information, or they will create another account claiming the other account has been hacked, when it is actually that account that is the hacker. There are a lot of strange people in the world today, that have strange mindset. So when someone receives a strange text message ask for banking information, social security, or forward this message and good things will happen, do not do it. Sometimes they do not want to know personal things, they want to hack ones phone…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging, and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Social networks are beneficial in many ways, for example they make being able to keep in touch with family and friends easier, reconnecting with long-lost friends or make new ones, gaining business contacts, advancing a career, discovering others with similar interests, and more; society is beginning to lack the needed social skills for life, as well as leaving themselves vulnerable to cyber crime by isolating themselves with social networks throughout the internet. Partly because the web is available nearly everywhere and smartphones are common and affordable, cybercrime is on the rise and society is opening…

    • 2198 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Stereotypes

    • 1235 Words
    • 5 Pages

    Cited: Editor, Focus. "The Security Risks of Social Networks." Focus. Web. 29 Mar. 2012. <http://www.focus.com/fyi/security-risks-social-networks/>.…

    • 1235 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    anti virus, anti spyware, firewalls, and spam filters are also effective ways of decreasing the risk of phishing scams associated with email.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    undercover

    • 473 Words
    • 2 Pages

    Click fraud is a type of fraud that occurs on the Internet in pay per click online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad 's link. Click fraud has recently emerged as a topic of discussion and debate regarding the potential of undermining the pay-per-click revenue model that has made Google and Yahoo the financial success that they are today. Search engine marketers believe that click fraud does occur and diminishes the success rate of many online marketing programs.…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet Scam

    • 1316 Words
    • 6 Pages

    Thesis Statement : Why many students victimized in Internet Scam? The aim of this chapter…

    • 1316 Words
    • 6 Pages
    Good Essays