Nobody downloaded yet

Cyber Crime and Information Systems Security: The Concept of Phishing - Research Paper Example

Comments (0) Cite this document
The goal of this paper is to examine the techniques used in cybercrime as well as to provide an overall definition of information systems security. In order to focus on one crime and in-depth analysis of it, the following pages describe Phishing in details as a crime against the information systems…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Cyber Crime and Information Systems Security: The Concept of Phishing
Read TextPreview

Extract of sample "Cyber Crime and Information Systems Security: The Concept of Phishing"

Download file to see previous pages Users can log in to their banks' website, credit card site, or share markets for any online transactions. No doubt, this provides convenience but it also comes with its own price of managing the security of the transactions. Crimes against Information systems is a growing concern amongst the Cybersecurity experts and Federal Law agencies as this has the potential to bring down a system and operation which otherwise would run smoothly.
These crimes are illegal activities where computers are used as the primary interface. These types of crime have cost and continue to impact the economies of the worlds by many billions of dollars annually. Using the computer as a tool to conduct the crime involves some unethical use of a computer system. Other common security threats identified as computer crime/abuse are as below -
The process of gaining access to a system by faking the identity of a genuine user is called impersonation. This activity necessarily needs either knowing or guessing the genuine user's password. The unauthorized programming instructions are hidden within a real program in a Trojan attack. A logical bomb consists of instructions which are not visible to users getting affected. In this technique, the virus remains dormant until a certain trigger event takes place. For example, date/time trigger, invoking certain applications. In one of the case, a logic bomb was installed in an organization's financial system. The trigger event of deleting an entry from the database invoked the virus which cleaned the database hence generating a huge loss for the victim organization.
Computer viruses & Malware
Computer viruses are fairly common and well known attacking mechanism of a hacker. The usage of the internet by a wide majority of people has resulted in frequent attacks of malware or spyware. Virus, spyware or malware are designed to bring the victim's computer to a halt by infecting the kernel of the operating system. The latest antivirus software is found to be helpless against "always" new variant of these virus attacks. The worst part of virus attack is that it affects anyone using the infected computer even if the user simply inserts his flash drive or diskette. The impact is immediate and often affects any other computer wherever infected flash drive or diskette is used.
Phishing as a study
In order to focus on one crime and in-depth analysis of it, the following pages describe Phishing in details as a crime against the Information Systems.
Phishing is defined as the attempt to steal personal details like user ids, password, and other similar details by posing as the real person/institution in a cyber environment. Communications which seem to be from auction sites, social web pages, internet payments or IT Admins are most commonly used to entice the general users.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber Crime and Information Systems Security: The Concept of Phishing Research Paper”, n.d.)
Cyber Crime and Information Systems Security: The Concept of Phishing Research Paper. Retrieved from
(Cyber Crime and Information Systems Security: The Concept of Phishing Research Paper)
Cyber Crime and Information Systems Security: The Concept of Phishing Research Paper.
“Cyber Crime and Information Systems Security: The Concept of Phishing Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Crime and Information Systems Security: The Concept of Phishing

Information warfare and cyber security

...include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime group" (cited in, SARC, A Backbone Security Center of Excellence, 2011). Steganography as a tool for cyber terrorists was first revealed in a newspaper, ‘USA Today,’ in 2001 in the articles, "Terrorist instructions hidden online" and "Terror groups hide behind...
40 Pages(10000 words)Research Paper

Information systems security management

...wide computing systems, supply chain management systems, manufacturing resource planning systems and customer relationship management systems. The fundamental principle on which the technologies are based depends on e-commerce, not on the Internet. 3 Business: Basics Concepts The interest and enthusiasm in the field of e-commerce provides infrastructure, business management applications for the prospective investments. Modern technologies are employed in firms and organizations with new techniques of producing and managing business. Moreover, new methods help in changing the techniques and plans of existing firms. The previous techniques and methods are...
6 Pages(1500 words)Research Paper

Cyber Security and Information Security

...espionage is becoming a bigger risk. This may be because the benefits that come from understanding the organizational structure and what the company is working on may be extremely beneficial to some individuals, and there are those that are willing to pay more to understand how the company works. The article does note that the relative risk is changing, because Phneah (2013) suggests that insider risk may actually become more important from the dangers from outside the organization. Another interesting thing to consider is that there may be a risk from collaboration between insiders and outsiders, which could pose a significant risk to information security. The risk is noted to be changing because...
4 Pages(1000 words)Assignment

Information and Systems Security

...: Computer Security", Purdue University, Found at: Harold Tipton & Micki Krause (2007), "Information Security Management Handbook", Auerbach Publications, 6th Edition. (2007), "Articles on Data Risks and Solutions", Online Web Content Found at: Jacobson, "Computer Crimes", (2002) Vol. 39 American Criminal Law Review, 273. Standler,Ronald B., (2002), "Computer Crime". O'Brien Timothy L. (2000), "Aided by Internet, Identity Theft Soars", Online Article, found at:...
3 Pages(750 words)Essay

Business Security: Phishing

...Court for the Western District of Washington. It said that the lawsuits accuse "John Doe" defendants of using various methods to obtain passwords and confidential information. March 2005 also saw Microsoft collaborates with the Australian government to teach law enforcement officials how to combat various cyber crimes, including phishing. In addition it said that Microsoft announced a planned further 100 lawsuits outside the U.S. in March 2006, citing (Espiner, Tom (2006). 3. On a personal level what could be done to avoid becoming the next victim? While actions are being done by governments and the firms industry, the consumer or user, who would be the...
6 Pages(1500 words)Essay

Information systems security incident

...Concepts of Operations Project Information Systems Security Incident This paper defines CONOP for ‘B Concepts’. The mission of B-Concepts CIRT is: “To protect communications and promote standards that give us a unique advantage”. To fulfill this mission the operational framework for security of the software, hardware and data associated with information systems is defined based on ISO 17799. CONOP outlines the key players, their roles and responsibilities in the event of information security incident. The CONOP is defined to control the...
8 Pages(2000 words)Essay

Information Systems Security

...Information Systems Security Intrusion and attack prevention had always been an important topic for businesses particularly those dealing with financial matters. However, with the recent increase in global security concerns, governments have woken up to the security threat of an intrusion coming from a source that wants to harm national interests. America paid the heaviest price possible for a lack of security with the events of 9/11 as even the Pentagon was unable to avoid carnage. After the attacks however, security became a paramount concern and that included digital security. At the same time,...
3 Pages(750 words)Essay

Cyber Security and Cyber Crime

.... Deloitte. “Cyber Crime: A Clear and Present Danger. Combating the Fastest Growing Cyber Security Threat.” Deloitte Development LLC. 2010. This publication done for Deloitte by DeZabala and Baich, the National Managing Principal and Principal respectively acknowledge the rampant increase in cyber crimes in organizations following its CSO Cyber Security Watch Survey in 2010. It unearths some of the stealth techniques used by cyber criminals today. It points to future indicators with a disclaimer of the severity and complexity expected in future. The authors sum up this publication by...
3 Pages(750 words)Annotated Bibliography

Cyber Security, Cyber Crime and Cyber Forensic

... is not limited to boundaries. Loop holes in information protection results in diverse kind of crimes, ranging from defense to finance. References Santanam, R., &Sethumadhavan, M. (2011).Cyber Security, Cyber Crime and Cyber Forensic: Applications and Perspectives. Idea Group Inc. Print Finklea, K. M., &Theohary, C. A. (2013).Cybercrime: Conceptual Issues for Congress and U. S. Law Enforcement.Congressional Research Service.... institutions. (2) Investigation of digitals crimes that concern the federal interest. The department of justice – this department is chaired by the attorney general who is charged with the mandate to represent the state in matters that desire a legal approach. He also offers advisory...
2 Pages(500 words)Assignment

Information Systems Security Survey get feedback on their performance in meeting the organizations requirements. Security Area Responsible Party / Office of Primary Responsibility (OPR) Known Vulnerabilities / Risks Countermeasures / Risk Mitigation Strategy Acquisition (systems/services) Procurement Department Counterfeits and/or poor quality systems and services  Making all procurement procedures public, such that any tenders are accounted for by the organizations to which tenders are awarded.  Asset management Operations Department  Vandalism, theft and burglary. Enforcing physical security measures.  Audit and accountability  Information Technology (IT). Misuse and abuse of...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cyber Crime and Information Systems Security: The Concept of Phishing for FREE!

Contact Us