Discussion 3: Web-based Criminal Activity
The selected web-based criminal activity is phishing. This is a method of pulling out confidential information like credit card numbers and username password combinations by masquerading as a genuine enterprise (Akerlof & Shiller, 2016). As such, the attacker sends misleading messages to unsuspecting web users through email or other channels. The receiver is then deceived into clicking the malicious link, which can then cause malware to be installed, the system to freeze as part of a ransomware attack or the disclosure of confidential information. The attack can generate devastating effects. For individuals, this encompasses purchases that are unauthorized, their money being stolen, or identity theft. Examples of phishing activity include fake websites, malware, suspicious emails etc.
Discussion 4: Methods to Steal Identities
Identity thieves are constantly coming up with ways of stealing people’s financial and personal information. Some of the techniques include but are not limited to mail theft, skimmer devices, pretext calling, phishing, and shoulder surfing. The method in focus in this case is pretext calling. It is basically the practice where thieves obtain people’s personal information under false pretenses (Vallabhaneni, 2019). Humans generally want to be helpful. Thieves take advantage of this inclination by calling and pretending to be a genuine company that one does business with. They request for ostensibly insignificant information such as the birth date. They then utilize that information to learn more about the person from other sources, and eventually steal or sell one’s identity. For example, a pretexter may call a person and allege that he/she is from a survey firm and ask several questions. Once the thief gets the information they want, they use it for steal one’s identity. Another example is where a pretexter calls and pretends to be a banker at one’s bank and goes on to ask several questions that relate to one’s financial information. The gathered information is then used to steal an identity.
References
Akerlof, G. A., & Shiller, R. J. (2016). Phishing for Phools: The economics of manipulation and deception. Princeton University Press.
Vallabhaneni, S. R. (2019). Wiley CIA exam review 2020, Part 2: Practice of internal auditing. John Wiley & Sons.

βœ“ 100% Plagiarism-Free
βœ“ PhD & Master's Writers
βœ“ On-Time Delivery
βœ“ Free Unlimited Revisions
βœ“ APA / Harvard / MLA
βœ“ 256-bit SSL Secure
Verified Academic Expert
This article was written and reviewed by a verified academic professional with postgraduate qualifications. All content is original, evidence-based, and written to assist students in Australia, UK, UAE, Kuwait, Canada, and USA.

Frequently Asked Questions