logo

Phishing as Effective Cybersecurity Issue | Report

   

Added on  2022-09-18

6 Pages1622 Words39 Views
Running head: PHISHING AS EFFECTIVE CYBERSECURITY ISSUE
Phishing as effective cybersecurity issue
Name of the student:
Name of the university:
Author Note

PHISHING AS EFFECTIVE CYBERSECURITY ISSUE
1
Journal Article:
Alsharnouby, M., Alaca, F. and Chiasson, S., 2015. Why phishing still works: User strategies
for combating phishing attacks. International Journal of Human-Computer Studies, 82, pp.69-
82.
Introduction:
The phishing is a rising cybercrime, where the targets that can be contacted through emails,
text messages and telephones. This can happen from anyone who is found to pose as a legitimate
instituting for luring people in delivering sensitive information. This includes credit card and
banking details, passwords and personally identifiable information. In the following study, an
analysis of this cybercrime is done as per the above article. It intends to demonstrate the
comprehensive analysis of main crimes types along with different criminological issues. Next, the
primary security vulnerabilities can be made on the infrastructure of data storages. Further, a
comprehensive understanding of the threats to physical infrastructures and computer networks are
done. Ultimately a comprehensive assessment of the important practices and procedures related to
managing of cybersecurity challenges and various countermeasures are investigated here.
Article Critique:
Hereafter, the comprehensive understanding of the main crime types along with criminology
issues, are discussed from the above article. The primary kinds of crime include the deceptive
phishing and spear phishing. In the former case the attacker attempts gaining confidential data from
victims. Here, the attackers make use of the data for stealing money and launching other attacks. The
later one targets particular individuals rather than a broad group of individuals (Akerlof and Shiller
2015). Here, the attackers are found to make research on victims through social media and other

PHISHING AS EFFECTIVE CYBERSECURITY ISSUE
2
types of sites. This way, they can customize the communications and been appearing to be more
authentic (Alsharnouby, Alaca and Chiasson 2015).
Regarding criminological issues, the phishing is the activity of expansion of commerce over
the Internet. Here, face-to-face transactions have been needed for buying services and good. This is
useful to transfer the values and engage the transactions regulating various identity aspects. It gives
scopes to the criminals in committing various fraudulent tasks in various methods (Thomas et al.
2017). Firstly, there is the pretending of another person over the Internet and abusing the facility of
credit or debit card. Next, there is the retention of other person’s during transactions with person’s
financial provider or bank. Further, there is the assumption of the identity of other people and
utilizing the identity for incurring liabilities and debts in that name.
Moreover, the authors make a critique and evaluation of the key security vulnerabilities
related to data storage infrastructure. Firstly, the phishing of emails has been casing a broad net. It is
seen that tens of thousands have been going outside in indiscriminate way from the senders. This has
been remarkably looking like the bank and others. Spearphishing has been attacking the target
specific groups of users and users. For instance the employees can be considered here. Besides, this
has been appearing to be coming from anyone who is known already and trusted. This email
signature can be spoofed for that reason exactly (Cui et al. 2017).
Next, the article makes a comprehensive understanding of different threats to the computer
networks along with physical infrastructure. At first, the phishing threats towards employers can be
considered. Irrespective of the fact whether any staff is performing their online research and
banking, as they access any fake phishing site from their computer along with downloading
executable malware, the entire network can be affected (Wang, Li and Rao 2016). Next, there can be
hissing threats to the data. It is applicable as any employee reacts to phishing email. This is about the
bank account and account that needs login and password and personnel emails and social media

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Technology | Essay | Assignment
|10
|2508
|20

Cyber Crime: Problems and Solutions
|7
|2138
|193