StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Hackers Tools and Techniques: PayPal - Term Paper Example

Cite this document
Summary
The financial services sector is the most vulnerable as it involves people’s money. PayPal, dealing in micropayments, has 133 million users worldwide. PayPal has been the target for phishing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Hackers Tools and Techniques: PayPal
Read Text Preview

Extract of sample "Hackers Tools and Techniques: PayPal"

Download file to see previous pages

They also used malware to extract personal data. PayPal attempts to minimize the incidence of risk by educating and guiding the customers. They maintain a separate department engaged in checking fraud and they work in close cooperation with the ISPs, the law enforcement bodies and the technology companies to protect the interests of their customers. PayPal is the most important of all the electronic banking and commerce institutions and has the best chance of delivering secure, trusted e-commerce transactions.

It is an online transaction and bill-paying service preferred by millions of eBay auction users (Rubenking, 2003). Since eBay acquired PayPal in 2002, the electronic payments have experienced growth at a very fast pace. This has also made it a very attractive target for hackers. In the third quarter of 2004, PayPal had a payment volume of $4.6 billion (Lundquist, 2005). PayPal has 133 million users worldwide using its online payment service (Vijayan, 2007). It is an example of the micropayment system which involves transactions of very small amounts of money (Patel, Qi & Wills, 2010).

It is one of the most recognized Internet brands and is all set to lead the financial sector in transacting electronic business. However, it is also one of the most frequent targets for phishing attacks. Attackers’ motivations differ. Most often hackers are notorious high school children who are always at their computers and find newer ways to attack computer systems (Shimonski, 2002). Very often employees that have been unhappy with their employers also seek revenge and they engage in hacking the system.

There are others who just feel elated at the challenge of entering into a secure system. PayPal is the primary target by hackers for two reasons (Vijayan, 2007). PayPal has a very large customer base (133 million) and they have a simple business model that makes it easy for these 133 million users to move money between them. Thus, both PayPal and its

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hackers Tools and Techniques: PayPal Term Paper”, n.d.)
Hackers Tools and Techniques: PayPal Term Paper. Retrieved from https://studentshare.org/miscellaneous/1570050-hackers-tools-and-techniques-paypal
(Hackers Tools and Techniques: PayPal Term Paper)
Hackers Tools and Techniques: PayPal Term Paper. https://studentshare.org/miscellaneous/1570050-hackers-tools-and-techniques-paypal.
“Hackers Tools and Techniques: PayPal Term Paper”, n.d. https://studentshare.org/miscellaneous/1570050-hackers-tools-and-techniques-paypal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hackers Tools and Techniques: PayPal

Case of Vasiliy Gorshkov and Alexey Ivano

The targets of the computer crime include Nara Bank, Speakeasy Network, paypal, National Bank of Waco, and many other companies.... Introduction In this case study of Vasiliy Gorshkov and Alexey Ivanov we are going to examine whether the FBI investigative techniques went too far in apprehending the two Russian cyber criminals.... hellip; With readily available hacker tools that can be used by unskilled people, the police have to intervene to ensure the general public is safe from computer criminals attacks....
4 Pages (1000 words) Essay

Internet Safety: How to Protect Yourself

It also shows cross-site scripting (abbreviated as CSS or XSS) as one of the most common application-level attacks that hackers use to slink into web applications today.... It will also provide a discussion and recommendation that will help organizations against hackers and other criminal activities directed in breaching their security....
15 Pages (3750 words) Case Study

Law: Computer Misuse

You work as a researcher for the Association of Police Force Chiefs England and Wales (a fictitious group) who are concerned that the law in England and Wales in unable to meet the challenges of e-crime.... They would like you to research on the following area: The Internet has… Countless individual Internet users and companies become subjected to ever increasing e-crimes because Government has failed to provide The cost of the crime in many cases is immense....
7 Pages (1750 words) Essay

Hackers Tools and Techniques

The research proposal "hackers tools and techniques" proposes to conduct a study into the hacking tools used by the hackers in the banking and financial services industry, with a focus on PayPal.... The tools and techniques also vary from password cracking to finding access vulnerabilities.... While it has become essential to keep a tab on the professional hackers, the banks are facing huge losses due to constant evolvement of the hacking tools and techniques....
1 Pages (250 words) Research Proposal

Hacking: Definition, Types, and Facts

An example of a computer crime is use of various techniques to corrupt or compromise data stored in a computer system.... However, it must be noted that not all hackers are bad (Kumar, 2012), since the government and some huge companies use hackers to maintain their computer network security in order (Rogers 1994).... Ethical intrusion is associated with ethical hackers who tend to utilize their knowledge in hacking to improve the system (Doss, Smith &Yurcik, 2001)....
9 Pages (2250 words) Essay

Investigation of Crytolocker: Trace Analysis With Wireshark and Windows 2003 Server

These include paypal scams, advertisements that are run on the internet, and people deceived on winning fake lotteries, the fake inheritance scams as well as the eBay scams (Richard, 2013).... This coursework "Investigation of Crytolocker: Trace Analysis With Wireshark and Windows 2003 Server" discusses the Investigation of Cryptolocker....
18 Pages (4500 words) Coursework

E-Payment Systems

The Internet is as well-positioned as one of the most excellent business tools nowadays.... The main aim of "E-Payment Systems" research is to elaborate on the concept of the E-Payment Systems, its emergence, types, benefits, and potential threats.... E-Payment or electronic payment is a new way of payment that does not include the customary practice of physical cash transfer....
10 Pages (2500 words) Research Paper

Factors That Are Contributing to the Increasing Vulnerability of Organizational Information Assets

These hackers can get access to an organization's network and launch a variety of security attacks such as: (Prentice Hall, 2010; KingCounty, 2009; Turban et al.... The paper "Factors That Are Contributing to the Increasing Vulnerability of Organizational Information Assets" describes that risk avoidance is the process of recognizing a risk as well as formulating a decision to no longer involving in the activities linked with that risk....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us