Discussion 3: Web-based Criminal Activity
The selected web-based criminal activity is phishing. This is a method of pulling out confidential information like credit card numbers and username password combinations by masquerading as a genuine enterprise (Akerlof & Shiller, 2016). As such, the attacker sends misleading messages to unsuspecting web users through email or other channels. The receiver is then deceived into clicking the malicious link, which can then cause malware to be installed, the system to freeze as part of a ransomware attack or the disclosure of confidential information. The attack can generate devastating effects. For individuals, this encompasses purchases that are unauthorized, their money being stolen, or identity theft. Examples of phishing activity include fake websites, malware, suspicious emails etc.
Discussion 4: Methods to Steal Identities
Identity thieves are constantly coming up with ways of stealing peopleβs financial and personal information. Some of the techniques include but are not limited to mail theft, skimmer devices, pretext calling, phishing, and shoulder surfing. The method in focus in this case is pretext calling. It is basically the practice where thieves obtain peopleβs personal information under false pretenses (Vallabhaneni, 2019). Humans generally want to be helpful. Thieves take advantage of this inclination by calling and pretending to be a genuine company that one does business with. They request for ostensibly insignificant information such as the birth date. They then utilize that information to learn more about the person from other sources, and eventually steal or sell oneβs identity. For example, a pretexter may call a person and allege that he/she is from a survey firm and ask several questions. Once the thief gets the information they want, they use it for steal oneβs identity. Another example is where a pretexter calls and pretends to be a banker at oneβs bank and goes on to ask several questions that relate to oneβs financial information. The gathered information is then used to steal an identity.
References
Akerlof, G. A., & Shiller, R. J. (2016). Phishing for Phools: The economics of manipulation and deception. Princeton University Press.
Vallabhaneni, S. R. (2019). Wiley CIA exam review 2020, Part 2: Practice of internal auditing. John Wiley & Sons.
Frequently Asked Questions
Yes β our service is legally available to students across Australia (RMIT, UniMelb, ANU), UK (UCL, Manchester), Canada (UofT, UBC), UAE, Kuwait (AUM), and the USA. We provide original model papers for reference and learning purposes, 100% confidential.
Get My Paper Written βYes. Every paper is written entirely from scratch by a human expert β not AI-generated or recycled. Our human-written papers typically achieve under 8% similarity on Turnitin. A free plagiarism report is available on request.
Get My Paper Written βWe accept orders with deadlines as short as 3 hours for standard essays and from 24 hours for research papers and dissertation chapters. Our 98.7% on-time delivery record speaks for itself.
Get My Paper Written βWe cover all levels from undergraduate through PhD across 100+ subjects including Nursing, Law, Business, Engineering, Computer Science, Education, Psychology, Marketing, and STEM disciplines.
Get My Paper Written βAbsolutely. Your name, email, institution, and payment details are never shared with third parties. All payments are PCI-compliant and 256-bit SSL encrypted. Your order is fully confidential.
Get My Paper Written β