StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

E-mail and social media investigations - Article Example

Cite this document
Summary
Numerous ways are used to obtain the information fraudulently such as through scam emails that lure individuals into communication that leads to obtaining sensitive information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
E-mail and social media investigations
Read Text Preview

Extract of sample "E-mail and social media investigations"

E-mail and social media investigations E-mail and social media investigation Question Phishing involves a criminal activity that aims at gaining sensitive information in a fraudulent way. Numerous ways are used to obtain the information fraudulently such as through scam emails that lure individuals into communication that leads to obtaining sensitive information such as an individual’s credit card information, driver’s license and even one’s social security details (Van, 2013). Spear phishing is an email scam that has the aim of obtaining access to sensitive information to a specific group or organization through trusted e-mails unlike phishing.

Pharming involves a hacker installing a spiteful code on a private computer or one’s server that later redirects to a webpage that was not expected and smishing involves the use of text messages to entice customers (Van, 2013).Question 2 The advantages of circular logging is that it helps provide recovery from any transaction failure or any form of system crash through that may occur (Van, 2013). The logs are retained until the integrity of the current transactions is ensured. The disadvantage, however, is that it is difficult to restore the database and roll it forward in case a failure occurs.

Question 3 When investigating an e-mail abuse, one needs to detect how the server registers and handles the email upon receiving it. This is because the e-mail can either in the form of a flat file or the users’ e-mail (Van, 2013). Question 4 The information available on social media may be used in investigation, since social media acts a snitch (Van, 2013). The information can be used through scrolling through the current updates and the feeds that the site might have. This means that the sites can be used as crime detection partners through provision of evidence.

Proof of integrity and validity can be accessed through finding the origin of the report and the reporters of the same (Van, 2013).ReferenceVan, N. (2013). Attribution of Spear Phishing Attacks: A Literature Survey. NY: PN Publishers.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words”, n.d.)
E-mail and social media investigations Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1691711-e-mail-and-social-media-investigations
(E-Mail and Social Media Investigations Article Example | Topics and Well Written Essays - 250 Words)
E-Mail and Social Media Investigations Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1691711-e-mail-and-social-media-investigations.
“E-Mail and Social Media Investigations Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1691711-e-mail-and-social-media-investigations.
  • Cited: 0 times

CHECK THESE SAMPLES OF E-mail and social media investigations

Criminalistics 40656300

Within seconds internet offers vast range of information making it the fastest media of information than any other communication method in the world.... The use of internet to solve crimes Introduction The internet provides wide range of information on any topic today.... hellip; Today the Crimes increase in numbers as well as the variety and complexity....
4 Pages (1000 words) Essay

The UK Phone Scandal

Legal, economic, and social context in which the media is allowed to function lead to an ultimate contribution in an individual's political life will.... Communication practices and media of communication have with time mutated, becoming self-organized, and wholly evolving to new forms (McQuail, 2008:214).... portray incidences where the popular press use their press freedom as a justification of their unwarranted media intrusion in people's privacy....
8 Pages (2000 words) Essay

Production of the Revealed Program

I have been keen to follow some past productions among which was an exposition of the internally organized malicious drug business that involved great political figures and which resulted in serial killings of all investigating teams in a bid to conceal important information gotten through such investigations.... Moreover, the investigations commenced after the confiscation of the drugs ran for years without the report on findings being brought out to the public, which elicited reactions from the public....
7 Pages (1750 words) Essay

Empire of the Wolves (2002)

In these four films, we will be able to see if the products of media today films are more of reality and are already foreseeing the future.... hellip; Televisions, radios, and newspapers are types of media.... This media product though is not far from impossible to happen in the near future....
6 Pages (1500 words) Term Paper

Who Is Jack the Ripper

Historical analysis of the print media would show that it was mainly the newspaper which added fury to the living conditions of East London.... Where the murders that took place in 19th century managed to haunt the citizens of East London for decades; its after-effects are still felt by the Western world due to literary evidences… In addition to the horrifying and abhorrent methodology of conducting murders and mutilating victims' bodies, the fact that Ripper remained unidentified, forced many citizens of This fear was further aggravated due to social and economic conditions of the-then London....
9 Pages (2250 words) Research Paper

Challenges in Handling Electronic Evidence

From the paper "Challenges in Handling Electronic Evidence" it is clear that e-evidence has grown to become increasingly important in the court of law.... The amount of information that is stored online can prove to be a lethal substance as they often contain incriminating proof.... nbsp;… Generally, computer forensics has become a booming trade as it is important to unearth data and then further analyze it to make it applicable in the criminal case....
7 Pages (1750 words) Coursework

The Movie the Whistleblower

ot to say that once she commits herself to the mission, Kathryn not only finds scarce help and cooperation from her colleagues and the local police but rather she is viciously time and again dissuaded from carrying on with her investigations.... This assignment "The Movie the Whistleblower" discusses the issue of human trafficking, suffering and oppression the main character witnesses, challenges and struggles Kathryn faces as she confronts the reality of the situation in Bosnia and the scenes of violence towards women....
7 Pages (1750 words) Assignment

The Police Use of the Media in Missing Persons Investigations

Depending on the age, the only media that police use at this stage is social media.... An analysis of Facebook or Twitter account reveals the last time the person was available on social media.... If he used social media currently, it is a clear indication that he might be safe.... If from the day the person was lost has never used social media then that can be a source of suspicion.... t this stage the main idea that the media and specifically social media can help identify the person actually....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us