{"id":41872,"date":"2022-09-12T14:23:29","date_gmt":"2022-09-12T14:23:29","guid":{"rendered":"https:\/\/nursingstudybay.com\/?p=41872"},"modified":"2022-09-12T14:23:31","modified_gmt":"2022-09-12T14:23:31","slug":"discussion-3-web-based-criminal-activity","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/discussion-3-web-based-criminal-activity\/","title":{"rendered":"Discussion 3: Web-based Criminal Activity"},"content":{"rendered":"<p>Discussion 3: Web-based Criminal Activity<br \/>\nThe selected web-based criminal activity is phishing. This is a method of pulling out confidential information like credit card numbers and username password combinations by masquerading as a genuine enterprise (Akerlof &amp; Shiller, 2016). As such, the attacker sends misleading messages to unsuspecting web users through email or other channels. The receiver is then deceived into clicking the malicious link, which can then cause malware to be installed, the system to freeze as part of a ransomware attack or the disclosure of confidential information. The attack can generate devastating effects. For individuals, this encompasses purchases that are unauthorized, their money being stolen, or identity theft. Examples of phishing activity include fake websites, malware, suspicious emails etc.<br \/>\nDiscussion 4: Methods to Steal Identities<br \/>\nIdentity thieves are constantly coming up with ways of stealing people\u2019s financial and personal information. Some of the techniques include but are not limited to mail theft, skimmer devices, pretext calling, phishing, and shoulder surfing. The method in focus in this case is pretext calling. It is basically the practice where thieves obtain people\u2019s personal information under false pretenses (Vallabhaneni, 2019). Humans generally want to be helpful. Thieves take advantage of this inclination by calling and pretending to be a genuine company that one does business with. They request for ostensibly insignificant information such as the birth date. They then utilize that information to learn more about the person from other sources, and eventually steal or sell one\u2019s identity. For example, a pretexter may call a person and allege that he\/she is from a survey firm and ask several questions. Once the thief gets the information they want, they use it for steal one\u2019s identity. Another example is where a pretexter calls and pretends to be a banker at one\u2019s bank and goes on to ask several questions that relate to one\u2019s financial information. The gathered information is then used to steal an identity.<br \/>\nReferences<br \/>\nAkerlof, G. A., &amp; Shiller, R. J. (2016). Phishing for Phools: The economics of manipulation and deception. Princeton University Press.<br \/>\nVallabhaneni, S. R. (2019). Wiley CIA exam review 2020, Part 2: Practice of internal auditing. John Wiley &amp; Sons.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussion 3: Web-based Criminal Activity The selected web-based criminal activity is phishing. This is a method of pulling out confidential information like credit card numbers and username password combinations by\u2026<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1040],"tags":[5135],"class_list":["post-41872","post","type-post","status-publish","format-standard","hentry","category-in-a-page-paper","tag-discussion-3-web-based-criminal-activity"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/41872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=41872"}],"version-history":[{"count":1,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/41872\/revisions"}],"predecessor-version":[{"id":41875,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/41872\/revisions\/41875"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=41872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=41872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=41872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}