Author Question: In two or three paragraphs, explain how a phishing attack could be used to perpetrate identity ... (Read 389 times)

Tazate

  • Hero Member
  • *****
  • Posts: 532
In two or three paragraphs, explain how a phishing attack could be used to perpetrate identity theft.

Question 2

In a paragraph or two, explain what spear phishing is and describe how it differs from other forms of phishing attacks.



Carliemb17

  • Sr. Member
  • ****
  • Posts: 325
Answer to Question 1

Large criminal organizations can be highly efficient perpetrators of identity theft because they can exploit large amounts of personal information very quickly and efficiently. These organizations can use phishing attacks to gather personal information and then use it to perpetrate identity theft and other crimes. These criminal organizations often sell or trade information that they cannot use immediately to other organized crime entities around the world. Some of these criminal transactions are even conducted online. For example, a hacker who has planted zombie programs on a large number of computers (thus creating a zombie farm) might sell the right to use the zombie farm to an organized crime association that wants to launch a phishing attack (when a zombie farm is used this way, the attack is sometimes called a pharming attack). Individuals who commit these crimes have always posed a serious threat, but organized crimes entry into this activity increases the threat.

Answer to Question 2

The basic structure of a phishing attack involves an attacker who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site. The e-mail message tells the recipient that his or her account has been compromised and it is necessary for the recipient to log in to the account to correct the matter. The e-mail message includes a link that appears to be a link to the login page of the Web site. However, the link actually leads the recipient to the phishing attack perpetrators Web site, which is disguised to look like the targeted Web site. The unsuspecting recipient enters his or her login name and password, which the perpetrator captures and then uses to access the recipients account. Once inside the victims account, the perpetrator can access personal information, make purchases, or withdraw funds at will.
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called spear phishing. The spear phishing perpetrator must do considerable research on the intended recipient, but by obtaining detailed personal information and using it in the e-mail, the perpetrator can greatly increase the chances that the victim will open the e-mail and click the link to the phishing Web site.
The basic structure of a phishing attack involves an attacker who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site. The e-mail message tells the recipient that his or her account has been compromised and it is necessary for the recipient to log in to the account to correct the matter. The e-mail message includes a link that appears to be a link to the login page of the Web site. However, the link actually leads the recipient to the phishing attack perpetrators Web site, which is disguised to look like the targeted Web site. The unsuspecting recipient enters his or her login name and password, which the perpetrator captures and then uses to access the recipients account. Once inside the victims account, the perpetrator can access personal information, make purchases, or withdraw funds at will.
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called spear phishing. The spear phishing perpetrator must do considerable research on the intended recipient, but by obtaining detailed personal information and using it in the e-mail, the perpetrator can greatly increase the chances that the victim will open the e-mail and click the link to the phishing Web site.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

About 60% of newborn infants in the United States are jaundiced; that is, they look yellow. Kernicterus is a form of brain damage caused by excessive jaundice. When babies begin to be affected by excessive jaundice and begin to have brain damage, they become excessively lethargic.

Did you know?

About one in five American adults and teenagers have had a genital herpes infection—and most of them don't know it. People with genital herpes have at least twice the risk of becoming infected with HIV if exposed to it than those people who do not have genital herpes.

Did you know?

Although puberty usually occurs in the early teenage years, the world's youngest parents were two Chinese children who had their first baby when they were 8 and 9 years of age.

Did you know?

The first oncogene was discovered in 1970 and was termed SRC (pronounced "SARK").

Did you know?

If you could remove all of your skin, it would weigh up to 5 pounds.

For a complete list of videos, visit our video library