Author Question: In two or three paragraphs, explain how a phishing attack could be used to perpetrate identity ... (Read 125 times)

Tazate

  • Hero Member
  • *****
  • Posts: 532
In two or three paragraphs, explain how a phishing attack could be used to perpetrate identity theft.

Question 2

In a paragraph or two, explain what spear phishing is and describe how it differs from other forms of phishing attacks.



Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

Large criminal organizations can be highly efficient perpetrators of identity theft because they can exploit large amounts of personal information very quickly and efficiently. These organizations can use phishing attacks to gather personal information and then use it to perpetrate identity theft and other crimes. These criminal organizations often sell or trade information that they cannot use immediately to other organized crime entities around the world. Some of these criminal transactions are even conducted online. For example, a hacker who has planted zombie programs on a large number of computers (thus creating a zombie farm) might sell the right to use the zombie farm to an organized crime association that wants to launch a phishing attack (when a zombie farm is used this way, the attack is sometimes called a pharming attack). Individuals who commit these crimes have always posed a serious threat, but organized crimes entry into this activity increases the threat.

Answer to Question 2

The basic structure of a phishing attack involves an attacker who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site. The e-mail message tells the recipient that his or her account has been compromised and it is necessary for the recipient to log in to the account to correct the matter. The e-mail message includes a link that appears to be a link to the login page of the Web site. However, the link actually leads the recipient to the phishing attack perpetrators Web site, which is disguised to look like the targeted Web site. The unsuspecting recipient enters his or her login name and password, which the perpetrator captures and then uses to access the recipients account. Once inside the victims account, the perpetrator can access personal information, make purchases, or withdraw funds at will.
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called spear phishing. The spear phishing perpetrator must do considerable research on the intended recipient, but by obtaining detailed personal information and using it in the e-mail, the perpetrator can greatly increase the chances that the victim will open the e-mail and click the link to the phishing Web site.
The basic structure of a phishing attack involves an attacker who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site. The e-mail message tells the recipient that his or her account has been compromised and it is necessary for the recipient to log in to the account to correct the matter. The e-mail message includes a link that appears to be a link to the login page of the Web site. However, the link actually leads the recipient to the phishing attack perpetrators Web site, which is disguised to look like the targeted Web site. The unsuspecting recipient enters his or her login name and password, which the perpetrator captures and then uses to access the recipients account. Once inside the victims account, the perpetrator can access personal information, make purchases, or withdraw funds at will.
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called spear phishing. The spear phishing perpetrator must do considerable research on the intended recipient, but by obtaining detailed personal information and using it in the e-mail, the perpetrator can greatly increase the chances that the victim will open the e-mail and click the link to the phishing Web site.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

More than 20 million Americans cite use of marijuana within the past 30 days, according to the National Survey on Drug Use and Health (NSDUH). More than 8 million admit to using it almost every day.

Did you know?

Excessive alcohol use costs the country approximately $235 billion every year.

Did you know?

According to animal studies, the typical American diet is damaging to the liver and may result in allergies, low energy, digestive problems, and a lack of ability to detoxify harmful substances.

Did you know?

Before a vaccine is licensed in the USA, the Food and Drug Administration (FDA) reviews it for safety and effectiveness. The CDC then reviews all studies again, as well as the American Academy of Pediatrics and the American Academy of Family Physicians. Every lot of vaccine is tested before administration to the public, and the FDA regularly inspects vaccine manufacturers' facilities.

Did you know?

Atropine, along with scopolamine and hyoscyamine, is found in the Datura stramonium plant, which gives hallucinogenic effects and is also known as locoweed.

For a complete list of videos, visit our video library