StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Phishing, Pharming, and Vishing: Computer Security - Coursework Example

Cite this document
Summary
This work "Phishing, Pharming, and Vishing: Computer Security" focuses on a detailed analysis of the main security concerns and problems faced during online working. The author outlines computer security related issues, phishing, pharming, and vishing. This work comprises the main steps and tools for effective security implementation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Phishing, Pharming, and Vishing: Computer Security
Read Text Preview

Extract of sample "Phishing, Pharming, and Vishing: Computer Security"

Running head: Computer security Phishing, Pharming, and Vishing: Computer Security Affiliation June 23, 2009 Table of Contents Table ofContents 2 Overview 3 Background 4 Crime Rate 5 Phishing 5 Pharming 6 Vishing 7 Identity and Privacy Crisis 8 Online Security Measures 9 Personal Security Measures 10 Keeping information safe 11 Conclusion 12 Bibliography 12 Abstract This paper presents a detailed analysis of the main security concerns and problems faced during online working. Basically, this research deals with the online crimes. This paper presents a detailed analysis of the Phishing, Pharming, and Vishing. These terms are mostly used in the scenario of the online hacking and crimes. This paper will outline the main concerns that are increasing with the technology improvements. Now we are no more secure in the web based environment. We are facing online criminal attacks from different sides. It is time now to understand these different shapes of online criminal activities and try to avoid them. This will facilitate us to minimize the potential damage regarding the online business and working. Overview As technology evolves, it brought lot of facilities regarding the better online communication, data transfer, business, marketing, management, etc. This improvement of technology also brought few problems regarding the online working. Online frauds are the new shape of the online criminal activities. That involves the information and data handing and later on use of that information to perform for illegal activities. This can be cash based scandals. Numerous modern and up-to-date technologies in the industrial period have fashioned innovative openings for carrying out criminal activities. Information Technology, especially Internet is open for everyone and it also give the opportunities to criminal people, to steal, new ways to steal them, and new techniques to harm others. Computer crime is acknowledged as the unlawful actions by using a computer or against a computer system. The Internets user-friendliness and convenience have fashioned modern ways for computer crime, well-known forms of which are phishing, pharming, and vishing (Laudon & Laudon 1999, p. 147). Phishing, pharming, and vishing are most commonly used terms for the online criminal and negative activities. This paper will present a deep insight into these terms and their distinction from each other. Background This section will present the detailed historical analysis of the online crime and negative activities. The 1980s was the opening of the massive marketplace application of the WWW (World Wide Web). By means of its accomplishment and usage there appears a growth in the capability to infect mass quantities of computers systems. Through transferring SPAM crafted to seem alike to an authorized demand from any organization like that an online university or bank, we might be trapped in to following a web based link to an internet site that was hosting malware or some infection that transfers to our system. This in point of fact could have the similar outcomes as we click on a dirty email file attached to any message (Rodriguez, 2007). The subculture transformed once more in the 1990s in the way of financiers. By means of the similar fundamental practice, that engages the transmission of the email SPAM formed to seem similar to it was derived through an officially authorized organization as well as in that way trapping us to go after a web-link to a wrong website that had been shaped to as well seem similar to it belonged to a genuine organization, we could be trapped in to sensational individual data and information regarding our-self that is also known as the Phishing (Rodriguez, 2007). The recompense was twofold. The executor of this act could go behind doesnt matter what economic capital we had like that our credit or debit card number, bank account, etc or they could copy or steal enough data and information from our computer to obtain our identity. This type of online fraud is acknowledged as the identity theft. Identity theft possibly being even additional shocking to the original person for the reason that a hacker could make use of our individuality to open up credit and debit cards, bank accounts as well as carry out other negative activities and crimes concealed at the back of our identity. Crime Rate Acceding to an online research carried out by the FTC, over 670,000 customer online frauds of identity theft complaints in the US were recorded in year 2006. The victim of these frauds is 29 percent of those people those are between the ages of 18 to 29 (National Criminal Justice reference Service, 2008). Here we have five percent people those have age above 30. This demonstrates that the targets of these types of crimes are youngsters. There are more awful figures in the later years. This situation is going to be serious with the passage of time. At the present time, lots of steps have been taken by the government of different nations for the establishment of the criminal acts and punishments for these activities (National Criminal Justice reference Service, 2008). Phishing In the field of the online computer technology and security, phishing is the unlawfully deceptive procedure of trying to get hold of sensitive data and information like that passwords, usernames, and credit card information through hidden and fake means as a dependable entity in an online and electronic communication (Tan, 2009). Online communications declaring to be from acknowledged community websites, online disbursement processors, public sale sites, or else Information Technology managers are generally engaged to attract the innocent community (Tan, 2009). Phishing is normally carried out through E-mail or else through the instant messaging, as well as it normally directs online system users to go through particulars at a false website whose appearance or interface are approximately alike to the genuine one. Even when carrying out server verification, it can demand great expertise to distinguish that the website is false. Phishing is a case of community engineering methods which are used to make fool to online users, as well as exploits the concentrated usability of present web safety expertise. Effort to tackle the growing amount of reported phishing events needs public awareness, user training, legislation, as well as technical safety procedures (Tan, 2009). Pharming Pharming is a form of the hacking attack planned to forward a websites load or traffic to a different fake website. Pharming is carried out through changing the host’s user file on a target’s system or by making use of the susceptibility in Domain Name Server (DNS) software. Domain Name Server is computers in charge for examining Internet website names into their genuine online addresses. They are the "signposts" of the web based atmosphere. Compromised Domain Name Server are occasionally acknowledged as "poisoned" (Scams?, 2005). The name pharming is a neologism which is based on the farming as well as phishing. Phishing (which has been described above) is a kind of communal engineering assault to get right of entry credentials like that passwords and usernames. At the present time, hackers use combination of both phishing and pharming for online individuality stealing data and information. Pharming has turned out to be a major concern to online banking websites as well as business hosting ecommerce. Complicated actions acknowledged as anti-pharming are obligatory to defend beside this grave danger (Scams?, 2005). Spyware removal software and Antivirus software are not able to defend against pharming (Scams?, 2005). Pharming hits are mostly planned on the online shopping and banking services and facilities. Entering the appropriate web browser address as well as double inspection the meaning is one of the significant conducts to get away from Pharming attacks. Vishing Vishing is the against the law activity of employing social engineering in excess of the telephone system, sometime employing features helped through VoIP (Voice over IP), to achieve right of entry to confidential financial and personal data and information from the community for the purpose of economic return (Johanson, 2009). The term is a mixture of "voice" as well as phishing. Vishing makes use of the publics faith in landline phone services that have usually completed in substantial positions which are recognized to the telephone corporation, as well as linked by means of a bill paying person. The victim is frequently ignorant that Voice over IP creates previously difficult-to-abuse features/tools of caller ID spoofing, complex computerized structures or IVR, small price, and secrecy for the bill-payer extensively accessible. Vishing is generally employed to take credit card numbers or else other data and information employed in identity theft plans from individuals (Johanson, 2009). Vishing is tremendously difficult for official establishments to detect or trace. To defend themselves, customers are directed to be extremely doubtful when getting messages through them to call as well as offer bank or credit card numbers. Relatively than offer some information, the customer is inform to their credit card corporation or bank straightly to confirm the legality of the message. The major remedy from Vishing hit is to utilization of balanced as well as active caution (Schacko, 2007). Identity and Privacy Crisis This section comprises the main Identity and Privacy Crisis that are major subjects at the present time. This crisis is due to lot of reasons. These reasons are given below (Cavoukian, 2006); Getting higher identification requirements pose privacy troubles Web based fraud as well as safety alarms are restrained self-assurance, faith and the expansion of e-commerce; Fears of online observation and extreme gathering, utilization and revelation of identity data and information through others are also retreating self-assurance in the Internet; Should have personal user control and empowerment online over one’s own private information; Password exhaustion: reused, weak passwords Here what should be done? We have to take care for following things regarding the effective online security implementation and execution (Cavoukian, 2006): An enhanced user control, Data minimization techniques Privacy protection, and Stronger security Online Security Measures This section discusses a number of security measures that we can take into the account regarding the safety for the online Phishing, pharming, and vishing attacks. Pharming hits are hard to identify as well as to beat matters similar to DNS cache poisoning, a safe edition of Domain Name System safety Extensions (DNSSEC) could be put into practice for enhanced online security. For the enhanced security and its flourishing implementation can be achieved through the appropriate utilization of the of anti products similar to Symantec Multi-tier defense could to a sure level stop malware similar to zero-day threats, trojans, worms, adware, viruses, bots, spyware, and rootkits. Also the utilization of proxy servers employing Websense and Microsoft ISA server could defend clients from phishing hits. Proxy servers aid to build up safety through malicious software and filtering website content (Schacko, 2007). The use of the Websense Web safety set offers defense against malicious mobile code, spyware, as well as phishing hits, Web based threats, bots, and other new threats. Websense ThreatSeeker feature, proactively finds out Web safety threats through examining 600 million Websites for each week. This application as well recognizes malicious protocols, Websites, HTTP traffic and applications; this system also blocks the right of entry at the Internet gateway (Schacko, 2007). Primary level protection against the phishing is to protect the computer by means of group policies, antivirus software, spyware prevention tools; windows safety models service packs in addition to safety patches, etc. Execution IDS and honey can considerably augment protection besides the phishing attacks (Schacko, 2007). Personal Security Measures For the personal security implementation from phishing, spamming, and other online threats we have to take actions for the better security implementation. Now I will present the main steps for the effective security implementation at user level and detection of the potential hazards and threats. A Phishing Filter characteristic obtainable on the IE aids to make a distinction between phishing entity and websites. A phishing detection filter carries outs three steps to distinguish and defend phishing scams. Almost straight away the website address goes through the phishing detection processor: the authority would be evaluated by means of a directory of legal websites accounted to Microsoft that is accumulated nearby in the computer. After that position is to inspect websites by means of widespread uniqueness of a phishing site. In the previous step by means of clients permission filer drives website addresses to Microsoft for additional confirmation beside stated phishing sites. If that exacting website occurs to be in the catalog of stated phishing sites, Internet Explorer will give you a warning. When Phishing Filter transmits address of a site to Microsoft, it captures the client IP address, Internet Explorer or browser category and Phishing Filter edition. IE 7 shows an additional layer of defense when we go to a websites that uses EV or Extended Validation SSL Certificates; address bar turns out into the green and shows additional information similar to individuality of the Website proprietor (Schacko, 2007). The majority e-mail application approach through incorporated anti-phishing discovery by design removes the email message or shifts it to the junk folder relying on the SCL or Spam Control Level (Schacko, 2007). Keeping information safe In this section I will present few steps regarding the better information safety. In all types of the online hacking and criminal activities one thing is important that is information. Hackers retrieve information to present a danger for the individual. These steps will provide better understanding regarding the process of the better information safety and preservation. Main steps are given below these can be effective for organizational information safety: (Bonnette, 2008): Aggressively save from harm mobile devices that hold responsive information. Update safety constantly as well as modify passwords regularly. Store responsive information and data in a password sheltered region of the system, as well as allowance right of entry on a need only basis. Stock up paper credentials in safe cabinets Place glare safeguards on laptops and computer screens. Encrypt every wireless network link Bound data exhibit as well as revelations Consult with IT experts regarding utilization of security software. Construct as well as utilize virtual isolation networks addicted to office workstations For an organization it is necessary to hire an information security officer. Train the staff in the confidentiality strategies of the office. Conclusion This paper has presented a detailed analysis of the computer security related issues, phishing, pharming, and vishing. This paper has outlined the whole idea for the better user understanding. This research has pointed out the main security concerns and anxieties regarding the online negative activities. This research has pointed out the main security areas those require extensive safety practice. This paper also comprises the main steps and tools (software) for the effective security implementation. Bibliography Bonnette, L. G. (2008, June 13). Phishing, pharming and other means of ID theft. Retrieved 06 18, 2009, from Phishing, pharming and other means of ID theft: http://www.blbva.com/ Cavoukian, A. (2006). The Case for Privacy-Embedded Laws of Identity. Toronto, Ontario, Canada: Information & Privacy Commissioner of Ontario. Johanson. (2009). The State of Homograph Attacks . Retrieved 06 18, 2009, from Web Attacks : http://www.shmoo.com/idn/homograph.txt. Laudon, K. C., & Laudon, J. P. (1999). Management Information Systems, Sixth Edition. New Jersey: Prentice Hall . Monk, E., & Wagner, B. (2009). Concepts in Enterprise Resource Planning, 3rd.ed. Boston: Course Technology Cengage Learning. National Criminal Justice reference Service. (2008, 09 15). In the Spotlight, Identity Theft - Facts and Figures . Retrieved 06 23, 2009, from NCJRS, National Criminal Justice reference Service: http://www.ncjrs.gov/spotlight/identity_theft/facts.html Rodriguez, M. (2007). Phreaking, SPAM, Phishing, Botnets, Pharming, Vishing, SMiShing & SPIM oh my. CTSO @ Western Illinois University. Scams?, P. a. (2005). How Can We Stop Phishing and Pharming Scams? CSO Magazine. Schacko. (2007, November 25). Phishing, Pharming and Vishing. Retrieved 06 18, 2009, from Phishing, Pharming and Vishing. Shelly, Cashman, & Vermaat. (2005). Discovering Computers 2005. Boston: Thomson Course Technology. Tan, K. (Retrived on 18-06-2009). Phishing and Spamming via IM (SPIM). Internet Storm Center. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Phishing, Pharming, and Vishing: Computer Security Coursework, n.d.)
Phishing, Pharming, and Vishing: Computer Security Coursework. https://studentshare.org/information-technology/1725184-phishing-pharming-and-vishing
(Phishing, Pharming, and Vishing: Computer Security Coursework)
Phishing, Pharming, and Vishing: Computer Security Coursework. https://studentshare.org/information-technology/1725184-phishing-pharming-and-vishing.
“Phishing, Pharming, and Vishing: Computer Security Coursework”. https://studentshare.org/information-technology/1725184-phishing-pharming-and-vishing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Phishing, Pharming, and Vishing: Computer Security

Security Strengths and Weaknesses of the Internet

This report "security Strengths and Weaknesses of the Internet" discusses a better understanding of what internet security actually is.... The main purpose of implementing internet security measures is to reduce the occurrence of risks related to the transfer of information over the internet.... hellip; Internet security provides various significant benefits to internet users.... Internet security is very important for a person who keeps or sends important data over the network....
6 Pages (1500 words) Report

Technological Advancements, Data and Information Security

INDIVIDUAL PROJECT: TECHNOLOGY EVALUATION AND RECOMMENDATION Individual Project: Technology Evaluation and Recommendation Author Author's Affiliation Date Executive Summary Nowadays enterprise and business data is subject to an overwhelming variety of threats regarding security point of view.... Additionally, data and information security has come on top on the list of the main issues that are being faced by information systems executives nowadays.... In this scenario, there are numerous aspects and factors that cause serious issues to data and information security....
3 Pages (750 words) Research Paper

Information Management Systems

Browser security refers to the application of internet security measures to web browsers so as to protect computer systems and data across networks from malware or from t=other third parties that may breach privacy of individuals using the internet.... DLP in data security is an abbreviation for Data Loss Prevention.... If I were responsible for security of a small firm, I would definitely recommend Snort.... Some of them gain access through systems in conventional ways that can be prevented if adequate security measures are taken (Haag, Cummings, McCubbrey, Pinsonneult, and Donovan, 106)....
4 Pages (1000 words) Essay

The Issue of Identity Theft

According to The Federal Trade Commission (FTC) identity theft is "when someone… uses your personally identifying information, like your name, Social security number or credit card number, without your permission, to commit fraud or other crimes.... The FTC has estimated Personal data like Social security number, credit card number, bank account, etc.... To prevent any kind of fraudulent use of one's identity one must have a security policy and certain guidelines in place about what personal information should not be given to third parties especially through electronic means like the email....
10 Pages (2500 words) Essay

The Value of Digital Privacy in an Information Technology Age

They are personal, crafty and deceitful messages that easily pass security protections.... According to security software maker RSA, about one in every 300 emails in 2011 was a phish.... Private data in the hands of criminals may be detrimental, while the same may be of great benefit in the hands of security agents.... Hackers access computer networks either legally or illegally by finding out and exploiting the weaknesses in a computer program....
4 Pages (1000 words) Research Paper

Nuclear Plant Password Policy

Activity 1-21) The three most fundamental goals of computer security are: (Select all that apply.... Once an identity is, the system checks and confirms that the user allowed leaving the lobby and entering the facility, and the Nuclear Plant Password Policy Insert Insert Activity 1 As an information officer, what are the information security goals that you need to keep in mind while defining the protection you shall need?... This an example ofMAC 4) At the end of the day, the security personnel can view electronic log files that record the identities of everyone who entered and exited the building along with the time of day....
4 Pages (1000 words) Essay

E-mail and social media investigations

Numerous ways are used to obtain the information fraudulently such as through scam emails that lure individuals into communication that leads to obtaining sensitive information such as an individual's credit card information, driver's license and even one's social security details (Van, 2013).... Pharming involves a hacker installing a spiteful code on a private computer or one's server that later redirects to a webpage that was not expected and smishing involves the use of text messages to entice customers (Van, 2013)....
1 Pages (250 words) Article

Internet Enhanced Concern on Data Mining, Internet Cookies, and Search Engines

As the internet has evolved, it has become a part of our daily life.... The paper "Internet Enhanced Concern on Data Mining, Internet Cookies, and Search Engines" looks at the ways in which the internet has caused an ethical debate on our information privacy.... hellip; The use of the internet has increased with connections getting cheaper....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us