logo

Different Kinds of Scams and Fraudulent Acts on Computer Networks

   

Added on  2023-01-19

12 Pages3315 Words76 Views
Running head: NETWORKING
NETWORKING
(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)

NETWORKING 2
QUESTION ONE
The different kinds of scams and fraudulent on computer network over the internet
They are various kinds of scams and fraudulent acts that one can fall when on the
internet. One of the scam is phishing email scam. These are types of malicious attachments
sent to someone when they are online. Phishing scams are based on the online
communication made through email or ion the social networks. In here cyber criminals sends
users messaged or emails by trying to trick them to provide sensitive and valuable data. These
emails seems to come from an official source such as banking institution or any other
financial authority which is said to be legitimate. Some of the common techniques used are
social engineering where scammers create a sense of urgency. Another common known scam
is the Nigerian scam. This scam involves the use of emotional emails, text messages or social
engineering messages. Another known online scam is the credit card number scam. This is a
type of scam where the scammers sign-up to freely monitor credit card numbers of
individuals. In addition, the scam is used to watch over people accounts closely.
Some types of frauds are identity theft fraud. This is a type of fraud which uses
computer intrusion techniques where cyber criminals steal PIN numbers of individuals.
Credit card fraud is another type of fraud where users are duped into submitting information
of their credit card on websites which are deceitful. Other types of frauds are auction fraud
where buyers are not able to get the services that they paid for or the item that they bought.
Other types of frauds are investment fraud where hackers pretend to have knowledge and
connections in finance bait people to invest on a venture or a company, work-at-home scam
which promises financial independence and huge money for little effort of work when at
home (Blanc & Cotton, 2014).

NETWORKING 3
How to protect one network from data theft over the internet
To protect one smartphone and computer from data theft over the internet, one need to
have an up-to-date security software. The most effective software which is currently utilized
by most of the organizations is Kaspersky’s or Norton antivirus; first is to learn to spot scams
and spams. This can be achieved is never to click on click that appears to malicious. Third,
one need to use a very strong password; a combination of special characters, numbers and
letters. Third, one need to monitor their credit scores and review it regularly. Third one need
to use sites which are valid when making purchases and avoid those companies that one have
never heard of their reputation. Always stays alert for false information on credit reports
which includes addresses and social credit card numbers. In addition, one need to be wary of
the public WiFi. Also one need to stay alert on getting new credit cards and having their
credit approved or denied or being subjected to high-interest rate for no apparent reason
(Imperva, 2018).
Privacy and security settings for any well-known browser
Optimizing one browser’s setting is a very important step if one wants to use internet
privately and securely. The current internet browsers have inbuilt security features but most
are the times computer users fail to optimize their browser security settings during the
installation of the browser. Some of the tips for secure browsing using google chrome can be
accessed via advanced settings or through navigating through chrome then to settings. To
implement security on Google chrome one needs to enable malware and phishing protection
which is done under privacy section. The other settings is turning off instant search feature
which ought to be done for optimal security. The other security setting is not to sync i.e. one
ought not to synchronize their email account from their browser under the tab “person stuff”.
Lastly, one ought to configure content settings by configuring cookies, in here one needs to
keep local data until they quit on the browser. Second, one need not to allow any site to run

NETWORKING 4
JavaScript or show pop-ups or even track their physical location. Lastly, one needs to disable
all autofill and deselect (Kurose & Ross, 2017).
QUESTION TWO
How different types of spyware and malware can threaten one computer.
There are different types of malware example are viruses, adware, fake security
software, and spyware. Trojan types of computer viruses can threaten one computer as there
are usually bundled with other software and can be installed without the knowledge of the
users. Second once adware are in one computer they are very difficult to remove as they hide
in unexpected places examples in system files thus making their removal time consuming and
complicated. Third, fake security software threatens once privacy; fake security software is
known to threaten once privacy by gathering information on the computer and relying on it to
advertise other parties. Third malware usually threatens the privacy of the computer security.
To prevent one computer from these types of malwares one need to first know those
times when the computer have malwares. Some of the features are browser closing
unexpectedly or it stops responding. When one views when toolbars are added onto the
computer browser unexpectedly, and poor system performance. Second one needs to install
once computer with anti-virus programs such as Norton and Kaspersky’s program.
The main legislations regarding cyber-crimes in New Zealand
Cybercrime is one of the problems in the current 21st century. There are specific
legislative provisions in New Zealand designed to counter cybercrimes. These legislations are
specifically designed to address specific problems presented by cybercrimes.
To start with in New Zealand cybercrime is defines as the process of using computers
and internet to carry out an illegal action. One of the provisions is hacking and related
offences. This hacking is related to unauthorized access to the organization computer

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods
|12
|2636
|382

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Review of Fraud in the Banking Industry in Australia
|12
|3708
|15

Assignment on Cyber Scams 2022
|5
|769
|19

Phishing Attacks: Research and Defense Strategies
|8
|2164
|404

Cyber Security and Phishing Attacks on Customers and Companies
|8
|1902
|456