Different Kinds of Scams and Fraudulent Acts on Computer Networks
Verified
Added on  2023/01/19
|12
|3315
|76
AI Summary
This article discusses the various types of scams and fraudulent acts that can occur on computer networks, such as phishing email scams, Nigerian scams, and credit card number scams. It also provides tips on how to protect your network from data theft over the internet.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORKING2 QUESTION ONE The different kinds of scams and fraudulent on computer network over the internet They are various kinds of scams and fraudulent acts that one can fall when on the internet. One of the scam is phishing email scam. These are types of malicious attachments sent to someone when they are online. Phishing scams are based on the online communication made through email or ion the social networks. In here cyber criminals sends users messaged or emails by trying to trick them to provide sensitive and valuable data. These emails seems to come from an official source such as banking institution or any other financial authority which is said to be legitimate. Some of the common techniques used are social engineering where scammers create a sense of urgency. Another common known scam is the Nigerian scam. This scam involves the use of emotional emails, text messages or social engineering messages. Another known online scam is the credit card number scam. This is a type of scam where the scammers sign-up to freely monitor credit card numbers of individuals. In addition, the scam is used to watch over people accounts closely. Some types of frauds are identity theft fraud. This is a type of fraud which uses computer intrusion techniques where cyber criminals steal PIN numbers of individuals. Credit card fraud is another type of fraud where users are duped into submitting information of their credit card on websites which are deceitful. Other types of frauds are auction fraud where buyers are not able to get the services that they paid for or the item that they bought. Other types of frauds are investment fraud where hackers pretend to have knowledge and connections in finance bait people to invest on a venture or a company, work-at-home scam which promises financial independence and huge money for little effort of work when at home(Blanc & Cotton, 2014).
NETWORKING3 How to protect one network from data theft over the internet To protect one smartphone and computer from data theft over the internet, one need to have an up-to-date security software. The most effective software which is currently utilized by most of the organizations is Kaspersky’s or Norton antivirus; first is to learn to spot scams and spams. This can be achieved is never to click on click that appears to malicious. Third, one need to use a very strong password; a combination of special characters, numbers and letters. Third, one need to monitor their credit scores and review it regularly. Third one need to use sites which are valid when making purchases and avoid those companies that one have never heard of their reputation. Always stays alert for false information on credit reports which includes addresses and social credit card numbers. In addition, one need to be wary of the public WiFi. Also one need to stay alert on getting new credit cards and having their credit approved or denied or being subjected to high-interest rate for no apparent reason (Imperva, 2018). Privacy and security settings for any well-known browser Optimizing one browser’s setting is a very important step if one wants to use internet privately and securely. The current internet browsers have inbuilt security features but most are the times computer users fail to optimize their browser security settings during the installation of the browser. Some of the tips for secure browsing using google chrome can be accessed via advanced settings or through navigating through chrome then to settings. To implement security on Google chrome one needs to enable malware and phishing protection which is done under privacy section. The other settings is turning off instant search feature which ought to be done for optimal security. The other security setting is not to sync i.e. one ought not to synchronize their email account from their browser under the tab “person stuff”. Lastly, one ought to configure content settings by configuring cookies, in here one needs to keep local data until they quit on the browser. Second, one need not to allow any site to run
NETWORKING4 JavaScript or show pop-ups or even track their physical location. Lastly, one needs to disable all autofill and deselect(Kurose & Ross, 2017). QUESTION TWO How different types of spyware and malware can threaten one computer. There are different types of malware example are viruses, adware, fake security software, and spyware. Trojan types of computer viruses can threaten one computer as there are usually bundled with other software and can be installed without the knowledge of the users. Second once adware are in one computer they are very difficult to remove as they hide in unexpected places examples in system files thus making their removal time consuming and complicated. Third, fake security software threatens once privacy; fake security software is known to threaten once privacy by gathering information on the computer and relying on it to advertise other parties. Third malware usually threatens the privacy of the computer security. To prevent one computer from these types of malwares one need to first know those times when the computer have malwares. Some of the features are browser closing unexpectedly or it stops responding. When one views when toolbars are added onto the computer browser unexpectedly, and poor system performance. Second one needs to install once computer with anti-virus programs such as Norton and Kaspersky’s program. The main legislations regarding cyber-crimes in New Zealand Cybercrime is one of the problems in the current 21stcentury. There are specific legislative provisions in New Zealand designed to counter cybercrimes. These legislations are specifically designed to address specific problems presented by cybercrimes. To start with in New Zealand cybercrime is defines as the process of using computers and internet to carry out an illegal action.One of the provisions is hacking and related offences. This hacking is related to unauthorized access to the organization computer
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
NETWORKING5 systems. This is restricted by telecommunications Act 1987. Another bill which was passed in June 2015 by the New Zealand parliament is harmful digital communication bill. This legislations establishes complaint mechanism for victims like revenge on porn, harassment, and cyberbullying. Another legislation which has been laid down is the crime act 1961. In here one is liable for imprisonment for a term not exceeding seven years who indirectly or directly accesses any computer system by deception or by dishonest. In addition under this legislation, one is liable for imprisonment for a term which does not exceed five years who access a computer or the internet to cause harm or loss to another person or to obtain privilege or any property. Legislation which can help prevent cyber-crimes in New Zealand Some of the legislations in New Zealand which can assists in preventing cyber-crimes are the ten communication principles in cyber-crimes where digital communication ought not to disclose sentitive personal facts about another person. Second, any form that can denigrate an individual by reasons of their race or color. Third, a digital communication ought not to be obscene(Vasudevan, 2017). QUESTION THREE The different kinds of Denial of Services (DoS) and how DoS can interrupt one networking systems. Denial of service (DoS) is a network system attack with the main intention of denying legitimate user(s) access to a system resource, operation or even a function. It has become a very common threat to modern computer networks. There are different kind of Denial of Services which includes; TCP SYN Flooding which is an attack to the server and consume network protocols where client’s address are forged resulting to half open connection. ICMP Smurf Flooding is another DoS which depends on misconfigured network where attacker send numerous IP packets using a stolen
NETWORKING6 address across all computers in a network and then amplifies themInvalid source specified.. LAND Attack is an attack that send spoof TCP SYN packet to targeted computer which causes it to constantly respond to itself and eventually cause it to crash. Lastly, User Datagram Protocol (UDP) is a fraggle attack where attacker uses UDP echo traffic using a fake address. DoS can be use either network based attacks or host based attacks. On network based attacks, DoS utilizes network protocols to gain access to a networking systems. On the other hand, host based attacks exploits either algorithms, memory structure, implementation, authentication protocols (Crosby & Wallach, 2003; Cowan et al. 2003) A network design protected from different kinds of malwares and DoS attacks Figure 1: A network design protected different kinds DoS attacks and malwares Figure one above shows a network design; the design is protected from malware and Dos types of attacks through firewall, routers, and IPS devices. The firewall installed has both network and host-based features. Specifically the firewall is used to monitor
NETWORKING7 communication between outside sources and inside computers. The firewall can be used to restrict certain sites and IP addresses and services which can Denial of Service. The host- based feature is used to monitor local computers from email viruses, pop-ups windows and cookies. IPS is used to detect any form of attack onto the organization network. The tool also have the ability of performing logging on real-time analysis and IP networks. In case a virus is detected the device raises an alarm to the system administrator. Router device is used to monitor network protocols QUESTION FOUR Software tools to secure one network from malware and spyware There are various software tools utilized by organizations to prevent the organization from spyware and malwares. One of the software tools utilized is avast. This is an anti-virus for windows. The anti-virus is said to score high on malware detection tests. Some of the security features offered by the software are network security inspection, pass management, software updater, file cleaning to free up hard drive space. Another common anti-virus is the AVAG anti-virus. This is software anti-malware tool which offer data protection, email and web protection. Malwarebytes is another anti-malware tool. The tool is specifically used to scan registry and performing heuristic analysis so as to find any resilient spyware and unknown rootkits and viruses. The tool also offers real-time protection, browser protection and scheduled and automatic scanning. Another common security tool is the adware; this is a security tool used to block an incoming spyware before it can infect the organization PC. The security tool offers protection against registry attacks, suspicious processes and rootkits. Another common type of anti-malware software is Emsisoft emergency kit; this is a type of software which is able to detect and remove spyware, rootkits, key loggers, and malwares. Spybot is another common type of software anti-malware the software is used to search and destroy any type of malware existing in the computer system. The anti-malware software tool
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
NETWORKING8 also comes with startup tools, rootkit scanning and system immunization. To protect one organization network one needs to use avast, Norton, or Kaspersky’s type of ant-malware programs. The different types of cryptography used to protect one network from the attackers Cryptography is the art of secret writing; there are five functions of cryptography currently being used these are key exchange, non-repudiation, integrity, authentication, privacy and confidentiality. The three types of cryptography used to protect a network are has functions, public key cryptography, and secret key cryptography. The hash function type of cryptography uses mathematical transformation to encrypt information, and to provide digital finger print. Specifically this type of cryptography is used to provide message integrity. Public Key cryptography uses only one key for encryption and the other decryption. The encryption key is used by the sender while decryption key is used by the person receiving the message. Specifically this type of cryptography is used for authentication, key-exchange, and non-repudiation. Public key type of encryption is used also used in digital signatures such as RSA and digital signature algorithm. The last type of cryptography is the secret key cryptography which is also known as symmetric encryption; this is as shown in figure 1 below. This type of encryption uses only one key for decryption and encryption; the sender sends a message to encrypt a plain text and then sends the cipher text to the receiver of the message. The receiver then applies the same key to decrypt the message or to recover the plain text specifically this key used for confidentiality and privacy purposes. Some of the common Secret key cryptography used today are data encryption standard and advanced encryption standard (AES)
NETWORKING9 Figure 2: Secret key type of cryptography The appropriate types of cryptography used to secure a computer network Why one need to for secret key to secure their network This paper will goes for secret key cryptography. This because this type of cryptography is faster and encrypted data can be transferred on the communication link even if there are chances that the data can be intercepted. In addition, this type of cryptography used password authentication to prove the identity of the receiver. In addition, this type of cryptography can provide digital signatures which can repudiated. QUESTION FIVE Ten hacking tools used to explore network vulnerabilities There is lots of information both in the cloud and in organizations network. This has resulted to attackers developing sophisticated attacks. One of the top ten hacking tools is John the Ripper. This one of the most popular tools used to crack passwords. This hacking tools uses brute force technology to decipher algorithms and passwords like Kerberos AFS, HASH lm, AND des, Blowfish and MD5. Metasploit which can be used to execute remote attacks, and evade detection systems. Nmap widely known as Network mapper used to detect open
NETWORKING10 ports on remote hosts and launch massive DNS queries against sub-domains and domains. Wireshark is used by hackers to monitor network packets. IronWASP is another hacking tool used by hackers to hack web servers and exporting results to RTF and HTML file format. SQLmap is another hacking tool used by hackers to perform SQL injection tests top a database server. SQLNinja another common tool used by attackers to exploit web apps. This tool performs different types of modes like verbose mode and test mode. Wapiti is another hacking tool developed in python used by hackers to find security flaws in a web application. Maltego is another hack tool use for data reconnaissance and Intel gathering. The tool is also used to look, for online API services and investigate the correlation between internet-based infrastructures. Three tools used to protect one network from hackers There are various tools implemented by organizations to protect one network from attack. One of the tool used is virtual private network tool. This is a privacy tool used to encrypt and protect one network connection. When an organization uses this tool, it is able to hide real IP address so that hackers cannot monitor or see the organization’s browsing activities. In addition, with this tool makes it impossible for hackers to penetrate into a network protected with VPN. Other benefits of this tool include protecting financial transactions and uses not able to access malicious sites. The second tool is firewall protection tool. This is a security tool which creates a barrier around the organization Operating System. The tool protect the organization from brute force attacks. It also triggers security alarm after any attempt by hackers to penetrate into an organization network. It closes all the entry points used by hackers immediately. Anti-spyware and antivirus is another security tool used by organizations to prevent an organization from viruses. It also increases the device security. It also helps in protecting the organization system from threats. Other security tool utilized by organizations include file encryption tool; used to encrypt important organization files.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
NETWORKING11 Vulnerabilities on the target system SSYN flood is a type of DoS attack which exploits parts of TCP three way handshake. By implementing OpenVAS software tool, some of the vulnerabilities found are OS command injection, buffer overflow, missing authorization, use of broken algorithm, cross- site scripting and forgery, and SL injection Mitigation of the vulnerabilities First one needs to implement micro-block technique. This a technique where the IT administrators allocates a micro-record into the organizational server for each of the SYN request. The second method is the use of SYN cookies where the server sends SYN-ACK response. The third method is the use of RST cookies; this is a technique where the server is able to tell that something is wrong after the client generates the RST packet. The forth method is the use of stack tweaking. In here the administrator is required to tweak TCP stacks so as to mitigate the effect of SYN floods which involves the reduction of timeout until a stack frees the memory or it selectively drops any incoming connections. The last method is installing IPS/IDS system so as to detect DoS attacks(Imperva, 2018).Other mitigation strategies are blocking users from visiting some websites, filtering internet activity by day and applying what computer scientist refer to as bandwidth checks and completing a report on tools one need to have to let one demo0nsttrate effectiveness of web security and analyzing on browsing activity(Odom, 2009).
NETWORKING12 References Blanc, R. P., & Cotton, I. W. (2014).Computer networking by Robert P Blanc(2nd ed.). Amsterdam: RTU Publishing House. Imperva. (2018).What is a SYN flood attack. Retrieved April 18, 2019, from https://www.imperva.com/learn/application-security/syn-flood/? utm_campaign=Incapsula-moved Kurose, J. F., & Ross, K. W. (2017). Computer networking : a top-down approach.Computer networking. Matthews, J. (2007).Computer networking : Internet protocols in action(1st edition ed.). New York: Springer. Odom, W. (2009).Computer networking first-step by Wendell Odom(3rd ed.). New York: John & Wiley Press. Vasudevan, S. K. (2017).Computer networking. by Shriram K Vasudevan(1st ed.). New York: Oxford Press.