StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Phishing as a Cybercrime - Coursework Example

Cite this document
Summary
The paper "Phishing as a Cybercrime" focuses on the critical analysis of phishing as a cybercrime. Phishing would be based on playing with one’s trust. As a recently terminated employee, s/he would use this trust by employees of the former employer, Finance Bank to commit a cybercrime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Phishing as a Cybercrime
Read Text Preview

Extract of sample "Phishing as a Cybercrime"

Such attacks would only be avoided by training staff on computer security and the importance of keeping information confidential (Granger, 2002; Pietre-Cambacedes, 2011).

Being an industrial spy, I would send emails to the staff of Glassy Chemicals, a chemical company. These emails would be sent to plant software, such as Poisonlvy, used to attack 48 companies in China, and Stuxnet targeted Iran’s nuclear centrifuges as documented by Neef (2011). The message would entail psychologically tricking the recipient to install the software unknowingly, cited by Granger (2002) as a common way through which hackers accomplish their objectives. This software would tap trade secrets from the company and would be accessed by the cyber attacker. This could be avoided by installing firewalls and active antivirus software that would scan all attachments before opening (Knapp, 2009). In addition, the company should ensure that its security control limits software installation powers to system administrators only.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 250 words - 2”, n.d.)
Retrieved from https://studentshare.org/information-technology/1591340-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 2)
https://studentshare.org/information-technology/1591340-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 2”, n.d. https://studentshare.org/information-technology/1591340-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Phishing as a Cybercrime

Cybercrime and Privacy

Significance, scope and extent of the problem: “Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations' security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy.... The issue of cybercrime, has been growing consistently and is now known to be one of the most serious and globally recognized internet crimes in recent times, causing millions of dollars worth of losses every year in the U....
9 Pages (2250 words) Research Paper

Security Risks on the Web: Problems and Solutions

In order to curb such acts and to place preventive measures against such crimes, cybercrime complaint centers have been established.... Most countries that have established strong operational cybercrime centers have obtained their knowledge from their own experiences since the Internet became popular and got widely available in the 90s.... tealing money using fraudulent methods is just one form of cybercrime; there are many ways in which people fall victims to high-tech crimes....
7 Pages (1750 words) Research Paper

Cybercrime - Illegitimate Use of Internet

As the paper "cybercrime - Illegitimate Use of Internet" tells, computer technologies and the internet have become essential elements in the day-to-day life of individuals.... Illegitimate uses of these services through the internet, as a source of adequate information and economically beneficial way of communication, have become a prime cause of criminal activities over the internet, commonly referred to as 'cybercrime'.... The origin of cybercrime can be attributed to the technological advancements of the late 1980s and the 1990s....
9 Pages (2250 words) Research Paper

Anti hacking techniuqes

cybercrime is one of the problems being faced by everyone using computer systems and networks.... The occurrence of cybercrime is all over the world.... One of the stated cybercrime which is very popular is hacking.... n recent times, hacking is not only used to victimize and exploit others but also, hackers indulge in hacking cybercrime to utilize their knowledge to gain quick benefits....
7 Pages (1750 words) Report

Computer Crimes Categories

Primarily, cybercrime does utilize the computer to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft.... Another type of cybercrime that may exist includes hacking of important webpages and spamming....
6 Pages (1500 words) Essay

Security Risks on the Web

Most countries that have established strong operational cybercrime centers have obtained their knowledge from their own experiences since the Internet became popular and got widely available in the 90s.... tealing money using fraudulent methods is just one form of cybercrime; there are many ways in which people fall victim to high-tech crimes....
8 Pages (2000 words) Term Paper

Internet Law and the Privacy Act 1988

One of the major polemics as regards cybercrime relates to its very definition.... There is no consensus about that, as there is no consensus as regards the nature of cybercrime.... The literature is abounding with definitions of cybercrime, which are sometimes almost identical, and sometimes quite different (Bologna 27).... As stated by the United Nations the term cybercrime has been a topic for debate for the last 30 years and scholars have mainly concentrated in their articles on three levels of schemes: the computer as a crime subject, the computer as a crime object, or the computer as a crime instrument....
18 Pages (4500 words) Assignment

Differences between Investigating Traditional Criminal Offences and Cyber Offences

Compared to traditional crimes, cybercrime is relatively easy to commit, but often hard to detect, investigate, and prosecute.... Compared to traditional crimes, cybercrime is relatively easy to commit, but often hard to detect, investigate, and prosecute.... Compared to traditional crimes, cybercrime is relatively easy to commit, but often hard to detect, investigate, and prosecute.... In addition, the effects of cybercrime may be felt across a large area and even across many countries when the systems such as computers that are used to commit the crimes are interconnected....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us