Computer Crime Techniques
Computer Crime Techniques
1.Mock Phishing Method
Phishing has become a common aspect of cyber crime in the modern world. It encompasses a situation in which internet users are duped to provide confidential information such as access codes, bank details and credit card passwords. As a result of phishing, hackers can easily access private accounts. Following is a design of a mock phishing method frequently observed today.
•Users receive an email that appears to come from a website they have previously subscribed.
•The email highlights an information systems’ problem and thus justifies the need for the user to confirm personal details. These details include credit card information, access codes, geographical location, age and personal contacts.
•The client is persuaded to offer the details as soon as possible in order to safeguard his or her account.
•The user provides the details but they are redirected to malicious websites.
•Unauthorized users access the account (e.g. bank account or social networks) using the details.
2.Features of Phishing Scams
There are various characteristics that would help in identifying an email from a phishing scam. Firstly, such emails have a high likelihood of bad grammar and poor spelling. An authentic email from a professional firm would rarely have grammatical mistakes. Another attribute of phishing scam emails is that they provide external links. The links are tactics to direct users to malicious websites (Brenner, 2010). Almost all phishing emails threaten the users with some undesirable consequences. For instance, the email might threaten the user of potential loss closure of account if they do not provide personal details. Some phishing scams also include phone calls. Such phone calls are a strategy to gain the trust of users.
A.Cyber-Terrorism Attacks
1.Types of Cyber-terrorism attacks
Cyber-terrorism refers to the proliferation of terrorist operations through the internet (Brenner, 2010). Cyber-terrorists have different aims such as crippling an organization’s activities or disrupting communications. The first type of cyber-terror attacks is hacking. Hackers access the computer networks and systems of other people or organizations without the owner’s consent. Hacking is a common form of cyber-terrorism and victims might lose terabytes of data or sensitive information. Virus attack is another form of cyber-terrorism.
This encompasses the use of malicious programs to disrupt the normal functioning of computer networks or systems. Computer viruses appear as useful programs but are extremely harmful once they gain entry into computer systems. For instance, they might result into the total collapse of operating systems. Organizations use different strategies to counter the danger of cyber-terrorism. The use of anti-virus programs is a common strategy in most organizations. The encryption of computer networks is also another strategy for minimizing these types of attacks.
2 .Response to Cyber-terrorism Attacks
In response to the increasing threats of cyber-terrorism, the US military established the United States Cyber Command. This agency has the responsibility of synchronizing all military information systems in order to ensure security (Brenner, 2010). This agency is also responsible for overseeing the country’s interest in the international cyberspace.
The Federal Bureau of Investigations has strict policies that seek to repel the threat of cyber-terrorism. Through the use of modern technological intelligence, the FBI seeks to enhance the standards of security within the American cyberspace. Under the law, perpetrators of cyber-terrorism in the United States face stern penalties such as lengthy sentences and hefty fines. Such measures reflect the government’s zero tolerance on cyber-terrorism.
B.Patterns of Behavior
1.Early Adapters versus Followers
Followers and early adapters have different types of attributes or traits. Early adapters respond quickly to new innovations. This mostly applies to technological innovations. They attempt to use new technologies even if they are unfamiliar with all its components (Stair, 2008). This category of individuals comprises approximately 14% of the population. On the other hand, followers comprise a category of individuals who are last to embrace innovations. Followers are skeptical about the potential risks of new innovations.
Consequently, they only embrace these innovations when they are sure about its implications. Early adapters provide competitive advantage. For organizations to remain competitive, they must demonstrate exceptional standards of innovativeness. Innovative trends provide organizations with an upper hand in terms of attracting new clients. This is not possible with the pattern of behavior evident among followers. In essence, followers would drag an organization in terms of innovativeness.
2.“Heat Seekers” and “Followers”
Both categories of individuals can co-exist in the same organization. Although they exhibit different attributes, they can act in a complimentary manner. Having a similar group of individuals dominate an organization is risky because conflicts of opinion can occur. Heat seekers are aggressive and are intent on experimenting new innovations. This is beneficial to the organization because it enhances competitive advantage. However, this category has minimal interest in other people’s opinion. This might be a source of weakness within an organization. The followers are less aggressive and they are less likely to cause conflicts. It is easy to direct followers towards the attainment of organizational goals. However, they are less innovative and rarely take risks in new technologies.
C.Knowing the Industry
1.Information Systems and Leveraging
Information systems are critical components in the modern day industries. They are essential in terms of analyzing market trends as well as consumer preferences. Consequently, information systems are core components of strategic planning. An organization determines the resources needed to attain its corporate goals by using information systems. This forms the basis of operational efficiency (Stair, 2008). Organizations can also develop computer programs or software that conforms to the industry demands. This is also an aspect of leveraging information systems for specific industries. Corporate culture is a critical factor that influences competitive advantage. This is because it affects the organization’s image and nature of public relations. When competition in the industry is high, organizations must re-strategize in order to remain competitive. Information systems are also essential in evaluating the prevailing industry trends. They then develop marketing tactics that are based on these trends.
2.Competitive Applications of Technology
Online marketing is among the most notable examples of competitive technology. Through the World Wide Web, organizations can broadcast online advertisements. This promotional strategy is highly effective even within the information systems industry. Online transactions also form another competitive application of technology. Instead of depositing cash payments for products and services, technology provides excellent platforms for online transactions (Stair, 2008).
Such transactions are not only fast but also secure. Within the information systems industry, another technological application pertains to market research. The applications for market research are highly efficient. This helps organizations to enhance their market share. These perspectives illustrate the different competitive applications and their use in the information systems industry.
References
Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace, Santa Barbara, CA: ABC-CLIO
Stair, R. M. & Reynolds, G. (2008). Fundamentals of information systems, Mason, OH: Cengage Learning
Is this your assignment or some part of it?
We can do it for you! Click to Order!