logo

Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security

Research the assigned topic and prepare a 5-minute video presentation, including a description of the topic, its significance from a business perspective, and any current or future developments. Also, prepare five multiple-choice questions for a quiz and submit the video presentation and PowerPoint slides.

11 Pages1381 Words117 Views
   

Added on  2022-11-23

About This Document

This presentation covers the basics of Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security. It also provides information on how to protect data and software using IT security solutions.

Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security

Research the assigned topic and prepare a 5-minute video presentation, including a description of the topic, its significance from a business perspective, and any current or future developments. Also, prepare five multiple-choice questions for a quiz and submit the video presentation and PowerPoint slides.

   Added on 2022-11-23

ShareRelated Documents
Cyber-Security
Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security_1
What is Phishing ?
The term phishing was coined from the notorious generations of hackers in the 1960s-
1970s. The phone phreaks started a long standing tradition of cyber warfare which was
hilarious by blowing a toy whistle into phone receivers aiming to mimic a hertz tone.
The whistle tricked phone companies into switching the circuits giving the phreaks a
free chance to call.
This was a hacking innovation at that time but might sound ridiculous for us today but it
exploited vulnerability in free call switches which largely relied on in band signaling
(Abomhara, 2015).
Phishing is a hacking technique that which is the digital equivalent of net casting. It is a
trap and specifically occurs when an email is send that is designed to bait and lure a
user into clicking on the link or the URL.
The URL lands to a page that sends up to a known brand name such as Microsoft.
The purposes of the web form is to extract personal information without the user’s
knowledge such as the login credentials (AlDairi, 2017).
Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security_2
Spear Phishing
Spear Phishing on the other hand is similar phishing but the attacker in this
one is after something in particular.
Spear phishing targets an individual and not a large net of consumers.
Hackers in spear phishing pretend to know you in person. It’s more of a
friend scamming you.
It may include a business email compromised to show one as a senior
employee of the company, for example a bank manager requesting their
junior to wire direct transfers to fraudulent companies (Essa, et al,2018,).
The hacker impersonates people you know and engages in social
engineering.
The attacker reaches this by researching the target on the social media
platforms or getting information from data breaches using P2P protocols
like Torrent.
Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security_3
Ransomware
It is a malware that tries to force or frighten end computer users into
paying ransoms by restriction of their access to devices that have
been infected by the malware or threatening legal action.
Ransom ware can cause the affected computer to be completely
inoperable.
Cyber-Security: Phishing, Spear Phishing, Ransomware, Scareware and Enterprise Information Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber-Security and Phishing Attacks: Research and Defence Strategies
|10
|2206
|112

Phishing Attacks: Research and Defense Strategies
|8
|2164
|404

Cyber security Attacks | Assessment 1
|7
|1374
|30

(Solved) Cyber security challenges Assignment
|8
|2715
|216

Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Cyber Security and Phishing Attacks on Customers and Companies
|8
|1902
|456