logo

Computer Criminals, IoT, CRM and Communication Methods for Organizations

Write a report on the different criminal offences that can occur within an organization, steps to mitigate the risk, and the impact of IoT on an organization and its productivity.

10 Pages3100 Words491 Views
   

Added on  2023-05-28

About This Document

This article discusses different types of computer criminals, mitigation techniques, impact of IoT on organizations, negative impacts of IoT on daily life, benefits of CRM, QR code, and communication methods used for an organization. It also covers laws developed to address the issue of hacking and data breaching. The article provides expert advice on Desklib.

Computer Criminals, IoT, CRM and Communication Methods for Organizations

Write a report on the different criminal offences that can occur within an organization, steps to mitigate the risk, and the impact of IoT on an organization and its productivity.

   Added on 2023-05-28

ShareRelated Documents
Enterprise Systems and Internet Technologies
Computer Criminals, IoT, CRM and Communication Methods for Organizations_1
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
1
Task 1:
(a) Different types of computer criminals
In the area of computer system there are numerous kinds of criminal faced by
organizations which are described below:
Denial of service attacks
Malware attack
Phishing scams
DOS attack
In the field of computer science, denial of service attack is a cyber-crime which occur
due to the use of unauthentic servers or network. Hacker’s uses botnet process to
produce traffic signals and transfer these on the consumer network system due to
which employees can lose their personal data (Jouini, Rabai, and Aissa, 2014). It is one
of the common criminal offences which are faced by many organization and consumers.
Mainly, hackers generate traffic signals and spam links with the help of malicious
software and transfer to the consumer network that reduces the performance of their
server. In the last five years, the rate of DDOS attack has increased by 45% and
thousands of computer devices were hacked by the criminals.
Malware attack
It is defined as software which is designed by hackers to damage the human-computer
system and servers. It blocks employee’s devices and hacks their private details like
login ID and password. In such kind of criminal offense, attackers produce a huge
amount of viruses and send to the victim by which they can easily access the devices of
users and lose their private details.
Phishing scams
The term phishing is defined as a form of fraud in which a criminal masquerades as a
reputable entity. Mainly, attackers utilize phishing mails in order to transfer malicious
links which can perform numerous functions for example account information. It is the
fraud attempt which is used by hackers to obtain the personal data or information of
consumers, for example, username, passwords, debit card number, and bank details. In
Computer Criminals, IoT, CRM and Communication Methods for Organizations_2
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
2
the year 2016, the rate of phishing scam has increased by 44% because consumers and
employees used the unauthentic servers and spam links which are developed by the
attackers. In this criminal offense, attackers transfer the fraud and unwanted emails to
the organization and employees which create uncertainty in the system. With the help
of spam emails hacker identify and collect the bank account, credit, and debit card
numbers and other information.
There are many liver examples of such criminal offences due to which many users were
lost their personal information, for example, Facebook Cambridge analytica, Sony
PlayStation, GitHub, and many more. All these are real examples where companies were
faced the malware, DOS and phishing attacks.
(b) Mitigation
There are following steps can be used to avoid such kind of cyber-crimes:
Use firewall and antivirus
Adopt encryption and cryptography technique
Update software on a regular basis
Use only authentic servers (Buczak, and Guven, 2016).
Make sure the security tools are working properly
Block the spam and fraud emails from computer
Employees should ensure that they access their accounts in only authentic
networks
The organization should develop and implement security policies and motivate
their employees in order to handle criminal offenses
Employees can adopt backup plans to secure important data files from criminals
Make a weekly report regarding the criminal offense and identify the key factors
that increase the criminal offenses and attacks
Assist the risks and issues associated with the security tools and technique
The organization should configure the computer networks as per guidelines and
process to avoid the issue of conflict
For reducing malware, DOS, and phishing attacks companies should adopt
firewall and cryptography technologies
Computer Criminals, IoT, CRM and Communication Methods for Organizations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to Cyber Security
|14
|3209
|388

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Smartphones Security Issues and Mitigation Tools
|10
|706
|305

Assignment on Cyber Scams 2022
|5
|769
|19

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15

Hackers Without Borders: A Legal Response
|11
|2715
|251