logo

CYBER FRAUD. CYBER FRAUD Name of the Student Name of th

Students are required to choose one case study from a provided list and answer discussion questions related to the chosen case study. They must analyze the case study using relevant empirical literature.

9 Pages2103 Words21 Views
   

Added on  2022-12-19

CYBER FRAUD. CYBER FRAUD Name of the Student Name of th

Students are required to choose one case study from a provided list and answer discussion questions related to the chosen case study. They must analyze the case study using relevant empirical literature.

   Added on 2022-12-19

ShareRelated Documents
Running head: CYBER FRAUD
CYBER FRAUD
Name of the Student
Name of the University
Author Note
CYBER FRAUD. CYBER FRAUD Name of the Student Name of th_1
CYBER FRAUD1
Answer 1
Equifax is among the three primary organizations that deals in the credit information of
the customers. Equifax was affected by the crimes of the cyber fraud. It fell victim to the
misconducts of cyber-attack done by the hackers (Gressin, 2017). Equifax is an agency that takes
care of the sensitive special information of various people all over the United States. These
information and data was compromised. The hackers and cyber lawbreakers committed the
offence of compromising such personal data. The hackers gained access to the private data of the
customers of Equifax. This attack on the organization is among the biggest risks to sensitive
private data in the current years (Berghel, 2017). The outbreak was the third risk in relation to
cyber security since the year 2015. The customers of Equifax suffered the major effect. Around
143 million population of the nation of United States, that is, half the population of the country,
suffered at the hands of cyber criminals. Data regarding the addresses, driver licenses, birth dates
and social security numbers including credit information of the customers of Equifax were
compromised. This violation is considered to be among the most dangerous breaches of private
data ever done.
Answer 2
The infringement of personal data of many people can be done in several ways. In the
case study of Equifax, the type of cyber fraud that was done is hacking. In the words of a
common person, hacking shall be considered as the act of accessing the computer without the
permission of an individual. Hacking may include other forms of cybercrimes such as phishing,
which is, extracting personal data from online users by making use of a fraudulent mail-ID and
CYBER FRAUD. CYBER FRAUD Name of the Student Name of th_2
CYBER FRAUD2
hacking includes the misconduct of the private data in order to steal various identity information.
Hacking also means the misuse of different computer websites and networks (Gunkel, 2018).
The criminals committing the offence of hacking are known as the ‘hackers’. These
offenders are generally computer programmers, who have a cutting-edge knowledge about the
computers and usually abuse the knowledge for scheming motives like exploiting the people for
their personal sensitive data. Other scheming motives most commonly includes power and greed.
Some individuals do the crime simply out of interest. The hackers are technology buffs who have
a high degree of expertise in one or many software languages and programs. Their motives are
basically the reasons that causes them to hack into the online information in relation to a bank or
a corporation or the monetary data of private individuals. However, on many occasions, the
hackers do the hacking to get famous in order to receive job opportunities regarding online
security specialists with the large multinational organizations (Powell, 2016). ‘Grey Hat’ is term
that is used in cases of such individuals. In the past, many of the geniuses with computer
background have used their expertise to help build and develop technology and are now
considered as technological giants. For instance, Shawn Fanning developed Napster and Mark
Zuckerberg created Facebook (Hurlburt, 2016).
Answer 3
The internet, in today’s world, is an invention of technology that has changed the life of
the people of the world, for better and worse both. The worst part is that internet gave rise to
cybercrime. Cybercrime, unlike the real or conventional crime, is committed with the help of
technology and computers, which creates difficulty to trail and search the offender. In the area of
criminology, there are various theories that provide explanation as to why the offenders commit
crime. It describes the reasons as to why do the criminals behave in the way they do. Although,
CYBER FRAUD. CYBER FRAUD Name of the Student Name of th_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Fraud, Scam and Identity Theft
|10
|2775
|272

Equifax Data Breach and PlayStation Outage: Security Issues in Information Technology
|11
|2188
|409

Understanding and Preventing Cyber Fraud
|9
|2125
|442

Cyber Defense in Web Based Attacks Report 2022
|4
|728
|16

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Cyber Crime and the Role of Hackers in Russia
|13
|3237
|475