OtherPapers.com - Other Term Papers and Free Essays
Search

Electronic Robberies

Essay by   •  May 31, 2016  •  Essay  •  1,679 Words (7 Pages)  •  1,055 Views

Essay Preview: Electronic Robberies

Report this essay
Page 1 of 7

Running Head: Electronic Robberies

Electronic Robberies

[Name of the Writer]

[Name of the Institute]


Electronic Robberies

Introduction

Cyberspace, infinite information stored on the web, resembles the sea where float open data and other encapsulated by security. In this great ocean pirates, electronic criminals who try to get into inside information to commit theft operate. The computer crimes are diverse. They range from the theft of a personal account email address to write messages that denigrate their image or that of others. Electronic access criminals also use secret codes to improperly credit card or steal money from a savings account (Al Zaabi & Tubaisht, 2015).

Another important detail in cyberspace is that all codes and keys are in number, although we rely on words or letters which can easily be decoded. It was previously thought that was enough a key six letters or numbers, today, in some cases at least eight are asked and suggested combining letters and numbers signs. The hackers have special programs, once the central data have account numbers, can take three to four days to give the password. Many times people do not realize the damage shortchanged because criminals to avoid suspicion, minimum amounts subtracted in proportion to the balance. In some cases even cents, but get to do a good bag because they can intercept many accounts (Dupont, 2012).

Discussion

For starters consider that anyone can be a victim of fraud over the Internet. One of the ways most commonly used is the installation of software malware while surfing so before clicking on any link or window display check carefully where appropriate, also to receive an email from unknown origin avoid clicking on links bring or give your passwords or other private information (Dupont, 2012).

It is very important to have an antivirus installed and it must be kept updated and published daily new virus that your antivirus can not recognize unless you are a day. It is also recommended that you have an anti-spyware and firewall or firewall tool activated. For your passwords, these should be as robust as possible and should include letters, numbers and symbols (Holt et.al, 2012, pp. 891).

One of the most common forms of electronic crimes is stealing bank accounts as well as purchases by unauthorized impersonation and also unauthorized access to email accounts and social networks. If you are a victim of these crimes you must denounce and cancel all transactions have been made ​​without your permission. Usually criminals take advantage of the vulnerability of the bank security. The most widely used method is the electronic delivery of a fake page of a company or a bank, asking for updating personal data. Create links, the person full formats, but that information actually goes to a criminal in the form of an email (Marley & Mooney, 2015, pp. 49).

Avoid using simple passwords such as words or dates that are easy to meet other people, either you use your first or last name or obvious combinations such as ABC or 12345. If you are asked to create security questions avoid using those people close to you can deduct. If you use public computers whether in business or in your center of studies always remembers to close your session. In this type of equipment never log in to your bank accounts or pages that are related to money, you must do this from home (Ogunniye & Afolabi).

The mechanism most commonly used is generating a fake email that simulates coming from a certain company, whose clients it aims to deceive. This message contains links that point to one or more web pages that imitate in whole or in part the appearance and functionality of the company, of which the receiver is expected to, maintain a business relationship. Regarding the relationship between spam and phishing, it seems clear that this type of bulk messages can be an efficient way to capture used by cybercriminals (Pelton & Singh, 2015).

In fact, one of the most common methods of contact for the commission of cybercrime is email. However, the contact channel to carry out these crimes is not limited to email, it is also possible phishing attacks via SMS, known as phishing, or IP telephony, known as phishing. In phishing the user receives a text message trying to convince you to visit a fraudulent link. In phishing the user receives a phone call that simulates come from a bank asking you to verify certain information (Al Zaabi & Tubaisht, 2015).

Network malwares are also used to steal precious information. This type of malware use network resources for the purpose of distribution. Its name implies that can penetrate from one computer to another like a worm. They do it through email, instant messaging systems, file-sharing networks (P2P), IRC channels, local networks, global networks, etc. Its propagation speed is very high. When penetrating a computer, the worm attempts to obtain the addresses of other computers on the network to start sending the copies. They also tend to use the data from the book of the e-mail client contacts. Most worms are spread as files but there is a small amount of worms that spread as network packets and directly penetrate the RAM of the victim machine, which then run your code memory (Al Zaabi & Tubaisht, 2015).

Trojan malware includes a wide variety of programs that perform actions without the user's knowledge and without their consent: collect data and send the criminals; destroy or alter data with criminal intent, causing damage to computer operation or use computer resources for criminal purposes, such as mass mailing of unsolicited mail. They are not classic virus that does not infect other programs or data. Trojans cannot penetrate the equipment itself, but spread by criminals under the sail of a "desirable" software. They are capable of causing much more harm than classic viruses (Dupont, 2012).

...

...

Download as:   txt (10.4 Kb)   pdf (150.6 Kb)   docx (10.3 Kb)  
Continue for 6 more pages »
Only available on OtherPapers.com