Free Essay

Scammers

In:

Submitted By jhelfi
Words 2106
Pages 9
| Internet Scam Artists | | | [Type the author name] | 4/25/2012 |

Abstract
Scam Artists have been around for centuries. As technology increased so has a new breed of con artist; the online scammer. Using the Internet, the online scammer has become more successful in defrauding a large target audience. This success is the focus of much concern in the past few years. Much is being done on multiple levels of government and within the public and private sectors; online fraud is still continuing to thrive. As long as the scammer is motivated by greed and able to deceive others, fraud will always be in existence.

This paper examines the emergence of the scammer in cyberspace. Furthermore, I will discuss a few tactics and methods the online scammer uses in their attempt to successfully deceive others. It will provide a profile of those individuals who are victimized by scammers. Finally, it will list the steps being taken to help deal with the issue of online fraud.

Scammers: Who They Are And Motives
Virtual scam-artists are similar to the traditional scam artists encountered in the real world. Their fundamental motive is greed. However, there is one distinct difference; they utilize a completely different means in their mission to ultimately accomplish their goal of successfully deceiving others. The traditional scammer starts their venture off in a similar manner to that of a business entrepreneur. In regards to financing their operation, a relatively small amount of money is required. It is believed that funds in the range of one hundred to one thousand dollars are needed to allow the operation to get up and running. As little as one individual to as many as twenty can staff a typical operation. Some operations can be small and generally done on one’s spare time, while others may involve full time work and as much as office space. No matter how sophisticated the operation may be, each scammer must rely on their ability and motivation to find the weaknesses of their target audiences and exploit them (Matusic, 2001). During the months of May 2000 through November 2000 the Internet Fraud Complaint Center (IFCC) conducted an extensive study. The IFCC is a partnership between the National White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI) to help address the issue of fraud committed through the Internet. In this survey, the IFCC was able to compile data, which allowed a general profile of a typical online scammer to be made (About the Internet Fraud Complaint Center). According to the survey, the data suggests that individuals who are involved in fraudulent activities via the Internet are generally, individuals and not businesses. Furthermore, these individuals are predominantly males residing in largely populated states. The data also suggests that these individuals have diversified international backgrounds with representation in the United States, Eastern Europe and Canada (IFCC: Six Month Data Trends Report (May-November 2000)). In a recent article relating to the emergence of Internet fraud stemming from the recent terrorist attacks on the World Trade Center and the Pentagon (fake donation funds, etc.), an official at Britain’s National Criminal Intelligence Service (NCIS) stated "scammers typically exploit human misery, so they invariably create human misery. They are without scruples because this is how they make money. It is very grubby money" (IFCC: Internet Auction Fraud: May 2001). There is a saying: "another day, another dollar". If there is a dollar to be made, the scammer will do what it takes to make it.

Types of Online Scams Used by Scammers: Auctions
According to a study released in May 2001 by the IFCC, Internet auctions fraud account for sixty-four percent (64%) of all online fraud (IFCC: Internet Auction Fraud: May 2001). Online auctions are very similar to a real life auctions with the exception that an online auction has global reach and does not require an auction house. Online auctions it is quite possible to have multiple bidders and a limitless number of potential bidders for a specific item. According to the IFCC’s May 2001 study, "Internet auction fraud involves the following: non-delivery, misrepresentation, triangulation fee stacking, black market goods, multiple bidding and shill bidding" (IFCC: Internet Auction Fraud: May 2001). Non-delivery is a type of fraud involving an auction on items that do not exist. Misrepresentation happens when the seller deceives potential buyers. Basically, the seller lists false values and conditions for the items up for bid. Triangulation involves the buying of a stolen item (by the perpetrator) using fake identities and payment information to a bidder at an online auction web site. The winning bidder and online merchant are later questioned as to how they came across the stolen merchandise. Fee stacking is a type of fraud that involves tacking on extra fees by the seller after an auction closes. Black-market goods are another type of Internet auction fraud, and are generally shipped to the winning bidder without a box, instructions or manufacturer’s warranty. Multiple bidding occurs when the buyer places multiple bids for the same item using different aliases. Once the other potential bidders have lost interest and the auction is coming to a close, the high bids are withdrawn and the item is won at a lower bid. In shill bidding the seller, using different aliases, bids on the item, which results in driving the price of the item (IFCC: Internet Auction Fraud: May 2001).

Types of Online Scams Used by Scammers: Investment Fraud
Online investment fraud is a type of Internet fraud, which is becoming more common. Several brokerage firms are providing clients with great incentives to manage their accounts online. Furthermore, several websites have popped up within the past few years that offer financial advice. In a recent study conducted by ABCNews.com, it was found that seven million Americans used the Internet to trade investments. This figure suggests that approximately twenty five percent of all investment trades made by individual investors take place online (Raphael, 2000). This allows the scammer several different tactics that they can employ when attempting to commit investment fraud. Typically, scammers generate and distribute online newsletters. Such newsletters, which are commonly found on web site bulletin boards or via e-mail, often carry no subscription fee and offer the online investor information about specific stocks or corporations. If the scammer spends a little time in developing the newsletter and making it appealing they may be successful in deceiving some of those in his targeted audience. Based on the information they obtain from such newsletters, many individual investors may chose to either buy or sell a particular stock featured in the newsletter. The scammer profits considerably from either investing or selling the stocks they feature in the newsletters (SEC.gov). Scammers can also commit investment fraud through the Internet by making their way into chat rooms. There they can engage in real-time conversations with individuals who are interested in investing. This allows them to easily disseminate information to those in the chat room they intend to deceive.

There are several categories of Internet Investment fraud. One is known as the .pump and dump scam. In this scam, the scammer creates in their target’s mind the need to either buy or sell a stock immediately. Usually the scammer creates newsletters or posts on message boards claiming knowledge of inside information on a particular stock. In reality, this is just a deception the scammers use to reel their victims in. The scammer typically owns shares in this company and wants others who are gullible to buy the stock. By promoting a stock, the scammer is pumping this part of the scheme. Once the stock price has increased, the scammer will then dump the stock. As a result, the investors lose money, while the scammer profits enormously from the scheme. Scammers frequently use this ploy with small, lightly-traded companies due to the ability to manipulate a stock when there’s little or no information available about the company (Raphael, 2000). Some less common schemes conducted by scammers targeting online investors are those that fall into the following categories: risk free, fraud, and off shore frauds. Risk free fraud involves investment opportunities associated with selling too-good-to-be-true investments. Usually, such deals are offered via the Internet and it doesn’t take much money or effort for the investor to become involved. In actuality the investment is non-existent. Offshore fraud involves investments in overseas countries or markets. With the use of the Internet previous checks and balances, which prevented many from becoming involved in such investments, have been eliminated. These investments are particularly risky because they are in areas outside the United States and they become difficult to investigate if the investor suspects fraud (Raphael, 2000).

A Profile of the Victims
Between May and November, 2000 the Internet Fraud Complaint Center (IFCC), conducted a profile of a typical online fraud complainant. The report noted that the typical complainant was usually a single male between the ages of 30 and 50. Furthermore, the majority of the complainants reside in the United States, Canada and the United Kingdom. In the United States majority of the complainants reside in California, Washington, Florida, and New York (About the Internet Fraud Complaint Center).

The IFCC’s report is skewed. The report focuses on individual complaints and not those of businesses. Furthermore, the data that was collected only allows for analysis on victims who have actually filed complaints with the IFCC. Unfortunately, many victims do not contact law enforcement or file complaints. Internet Fraud often goes unreported because victims are either embarrassed or simply unaware of how to properly file a complaint (About the Internet Fraud Complaint Center).

Steps Being Taken
Internet fraud has become a very serious issue. Due to public concern the United States government has begun to take action on dealing with the matter. The IFCC is one example of how the US government is trying to do its part. The IFCC, is a partnership that exists between both the FBI and NW3C. Its mission is "to develop a national strategic plan to address fraud over the Internet and to provide support to law enforcement and regulatory agencies at all levels of government for fraud that occurs over the Internet" (About the Internet Fraud Complaint Center). There has also been a joint effort by the FBI, NW3C, the United States Postal Service (USPS) and the Securities and Exchange Commission (SEC) to combat Internet fraud. In May 2001, Operation Cyber Loss was initiated. During one of its operations, the FBI was able to capture and arrest 90 suspected online scammers. Recently, the Federal Trade Commission announced that they have compiled a database that it believes helpful in combating Internet fraud. The database is named Consumer Sentinel and takes information from those who have been victimized by alleged Internet abusers. All anyone needs to do to report a potential abuser is to click the site’s complaint button. Also the site offers consumers easy to find online information on the top cyber scams (SEC.gov). With the rise in online investment fraud, the SEC has been actively taking complaints from investors who feel they have been victimized by online scammers. Congress has held hearings on the future of Internet commerce. These hearings address Internet commerce safety issues. Furthermore, members of the House Telecommunications Subcommittee have held hearings to address how the nation is going to go about boosting consumer confidence levels while shopping for goods online. Many individuals believe that e-commerce will grow steadily into the future. Obstacles will be met along the way, and matters such as Internet fraud are just one of the many that need to be dealt with (About the Internet Fraud Complaint Center).

Works Cited
About the Internet Fraud Complaint Center. (n.d.). Retrieved April 25, 2012, from FBI.gov: http://www.fbi.gov/hq/cid/fc/ifcc/about/about_ifcc.htm
IFCC: Internet Auction Fraud: May 2001. (n.d.). Retrieved April 24, 2012, from IFCC: http://www.ifccfbi.gov/strategy/AuctionFraudReport.pdf
IFCC: Six Month Data Trends Report (May-November 2000). (n.d.). Retrieved April 24, 2012, from FBI.gov: http://www.fbi.gov/hq/cid/fc/ifcc.htm
Matusic, K. (2001, September 19). Beware of Internet Appeals. Retrieved April 24, 2012, from CBS News: http://www.cbsnews.com/now/story/0,1597,311791-412,00.shtml
Raphael, R. (2000, July 7). Online Investment Scams. Retrieved April 24, 2012, from ABC News: http://abcnews.go.com/onair/2020/2020_000707_onlineinvesting_feature.html
SEC.gov. (n.d.). Retrieved April 24, 2012, from Internet Fraud: How to Avoid Internet Investment Scams: http://www.sec.gov/investor/pubs/cyberfraud.htm

Similar Documents

Premium Essay

10 Internet Scam

...10 Internet Scam 1. Phishing scams Phishing email try to trick the intended victim into visiting a fraudulent website disguised to look like a valid eCommerce or banking site. The victim thinks they are logging into their real account, but instead everything they enter on the fake site is being sent to the scammers. Armed with this information, the scammer can wipe out the victim's accounts, run up their credit cards, or even steal their identity. 2.Nigerian 419 Scams Nigerian 419 scams (aka Advanced Fee Fraud) date back to the days when fax machines and snail mail were the primary business communication tools. Today, email is the preferred method of these scammers and there are more Nigerian 419 Advanced Fee Fraud scams - and victims - than ever before. 3. Lottery Winning Scams Lottery winner scams attempt to trick recipients into believing they have won large sums of cash, and then bilks them out of their own dough in a similar fashion to the Nigerian 419 scam. 4.Scareware Scams Scareware erroneously claims the system is infected and instructs the user to purchase a 'full version' in order to clean the bogus infections. Sometimes, fake antivirus software gets installed by the user who became a victim to an advertising scam. Other times, a rogue antispyware scanner may be installed by exploit, a so called 'drive-by install'. Regardless of how the rogue software gets installed, the user is often left with a hijacked, crippled system. To avoid becoming a victim, before installing...

Words: 850 - Pages: 4

Premium Essay

Catfish

...problem who lost their partner, being anti-social, or better at expressing themselves by altering their persona via dating profiles. Online dating can target people who have the same interests. In other words, many people think that it is an easy outlet to peoples’ dark dreams, by paying a small amount of fees in order to log in into a ”guaranteed” website that people are willing to invest in. However, people now are looking for a solution to prevent scammers from innocent victims, who believed in finding a perfect match on a dating site. Scammers are those who prey on desperate people in order to capture those who are vulnerable, with their magical words. These words are the only “weapon” they can use in the online dating world. According to scammerswatch.org, they said that scammers target victims by creating fake profiles on legitimate internet dating services. Dr. McGraw, who earned a B.A. from Midwestern State University along with an M.A. and a Ph.D. in clinical psychology from the University of North Texas, identifies a scammer as a person who pretends to be someone they are not, by using social media to create a false identity in order pressure deceptive online romances. Scamming has become a real job for some people and they rely on it for their livelihood. A large majority of people believe that they will not get scammed. As a matter of fact, in the article The Online Romance Scam, written by Monica T. Whitty who has a...

Words: 2254 - Pages: 10

Free Essay

Review of Business Fraud

...was in process within the Bank of America organization for potential business fraud. A Bank of America employee had manage to copy the personal information of over 300 of the bank’s customers. The security breach allowed the Bank of America employee to communicate the sensitive information of the customers to a ring of scammers. Customer information compromised included the customers’ names, physical addresses, Social Security numbers, contact numbers, checking account numbers, savings account numbers, routing numbers, driver's license numbers, date of births, email addresses, mother's maiden names, PINs and the balances on their accounts. Scammers used this information to start up credit cards and to spend the money available on the customers’ bank accounts. The leaking of the confidential information to scammers resulted in total losses of $10 million. Investigators conducted the arrest of 95 suspects, including the ring of scammers and the former employee. Auditors and management aided in the investigation that involved the Federal Bureau of Investigation. The FBI stated that they believe that the former Bank of America employee and the ring of scammers had gang...

Words: 1489 - Pages: 6

Premium Essay

Phishing Scams Analysis

...Scammers use a technique known as phishing, an attempt to get the victim to divulge financial information and can be avoided by not giving out financial information over the phone and using virus protection. In a phishing scam, the thief poses as an employee of a business asking for sensitive information. This can take place in two different forms, Vishing, and Smishing. Vishing uses voice communication to lure potential victims into giving away sensitive information like usernames and passwords or financial information. Such vishing scams have been carried out by scammers impersonating the Internal Revenue Service. The IRS mentions these scams in a public notice where the scammers use fake names, IRS badge numbers and even alter their caller...

Words: 457 - Pages: 2

Premium Essay

Cyber Scam

...CYBER SCAM AND ITS EFFECTS November 27, 2011 SUBMITTED BY: FETALVER, FRANCIS VIOLETA, ROGENE CRIS SUBMITTED TO: MRS. MARY GRACE P. ALFANTA I Introduction Background of the Study Experts and law-enforcement officials who track Internet crime say scams have intensified in the past six months, as fraudsters take advantage of economic confusion and anxiety to target both consumers and businesses. Thieves are sending out phony emails and putting up fake Web sites pretending to be banks, mortgage-service providers or even government agencies like the Federal Bureau of Investigation or the Federal Deposit Insurance Corp. Cell phones and Internet-based phone services have also been used to seek out victims. The object: to drain customer accounts of money or to gain information for identity theft. Most scams are done by e-mail (Spam). They entice users to give them critical information like usernames, passwords, credit card information, or other types of account information. Most of these e-mails can easily be identified as fraudulent, by identifying a couple of general characteristics. If someone pretending to represent a company or organization contact you by e-mail to supply them with usernames, passwords or other critical information by e-mail, then you can be certain it’s fraudulent. Today we have something we call SSL (Secure Socket Layer). E-mail is one of the most un-secure methods to send user information and passwords. Most organizations...

Words: 2516 - Pages: 11

Free Essay

Shopping for Danger

...Kimberly Danielle H. Uy EN10 – E05 Explanation Essay Shopping for Danger The dawn of the modern technology has made the lives of every human convenient. In fact, gadgets nowadays contain everything a person needs. One can do anything with just one touch. Along with this, people found a way to make shopping convenient. Several online shops have been made that helped a lot in making shopping easier. This advancement has been appreciated by many especially teenagers and workers who do not have much time to go out and shop. However, the popularity of this “Online shopping” does not solely give a positive effect to shoppers. The risk of overspending, cyber-crimes, and merchandise frauds, are some of the dangerous and deadly effects brought by online shopping. Shopping online can be very addictive especially for compulsive buyers. Along with this, the risk of overspending online might affect funds that are meant to support medical health needs and might affect important personal necessities. Online shopping is more dangerous to one’s finances because compulsive buyers don’t feel guilty when they shop online. They use credit cards to pay for purchases instead of cash that creates the illusion of not actually spending money (Todd). Without limitations, they are free to spend and spend until they reach their credit limit. Realizing that they do not have the enough budget to pay their debts, they opt to use funds that are meant to support medical health needs and compromise properties...

Words: 1500 - Pages: 6

Premium Essay

The Reshipper Scams

...According to Parris, “As a reshipper you will receive packages at your home that are often filled with tech devices such as laptops, iPhones, etc.” “You’ll open these packages, sometimes testing to ensure that they work, and then repackage them and ship them to an overseas location” (Parris, 2016, p.1). The reshippers scam is to scam people who are looking for jobs. In most cases scammers like to concentrate on students, single mother’s, and people below the poverty level. Scammers scam people into actually believing reshipping is an actual job. How does it work? It starts by sending a person an email to their personal email address, asking if they would like to work for a company that is affiliated with the United States Postal Service. Once...

Words: 260 - Pages: 2

Premium Essay

Cybercrime

...that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering scam and if discovered, the trace goes right back to the recipient. There are many instances which the scammer tells the recipient that they have a job offer for them and that the recipient needs to send them his or her personal information to be paid. These scammers can send checks via mail to the recipient hoping that he or she cashes them and wires the scammer the money to an account...

Words: 340 - Pages: 2

Premium Essay

Online Dating Risk

...Connor Osborne IDS 1010 11-5-14 Detailed Outline & Main Point Revised Thesis Statement Online dating comes with the high possibility of getting involved with different types of fraud accounts. Detailed Outline I. Intro A. Thesis Statement B. Fraud Account Characteristics C. Scams From Fraud Accounts D. Romance Scams II. To avoid fraudulent activity online daters must be aware of the characteristics of these fake accounts. A. Over Romantic a. Take things fast b. Very serious long relationships c. Financial assistance B. Guiltiness a. Make you feel bad b. Certain phrases C. Photos, Characteristics, Hobbies a. Repeated photos b. Essays of hobbies c. Flirty descriptions III. Many scams take place from people becoming involved with fraud accounts. A. How a. Identity fraud by acquiring sufficient information through romance scams b. Hacking into similar online accounts. EBay and such c. “Teams” of people B. Protections against a. Don’t open files b. Use one credit card only online c. Before disposing of an old computer, use a utility program to “wipe” your hard drive C. Examples a. Robert Frost b. Nigeria IV. A big problem with online dating isn’t only money scams and such but also romantic scams. A. Why a. Desperation b. Are not comfortable with himself or herself in person c. Money B. Protection against fraud accounts a. Do not commit so early b. Report any suspicious accounts ...

Words: 2989 - Pages: 12

Premium Essay

Data Breach

...millions of members need is a data breach case. But unfortunately “On May 28, 2009, Aetna Insurance contacted 65,000 users to let them know that their personal data may have been compromised”. (Kirk, 2009) After tons of emails sent out the customers asking for their personal email, Aetna was finally alerted that something was going wrong. This would be a 2nd data lost incident, after an employee laptop was stolen back in 2006. According to About.com Business Security, “Although the data theft took place between June 2004 and October 2007, On May 1, 2009, LexisNexis disclosed a data breach to 32,000 customers”. (Kirk, 2009) As many scammers seem to do the thefts set up fake post office boxes, causing an investigation for the USPS. Scammers are usually smart and seem to find a great way to get around the system and began to hack, as far as Aetna case the scammers retrieved the customer’s emails from the website. Could the breach been prevented? After a hack or scam has been done, everyone wants to point a finger at two of the people or person to blame, but in cases like this who can you really blame? Well According to The federal information Security Management Act (FISMA); which is the Federal Information Security Management Act of...

Words: 623 - Pages: 3

Premium Essay

Elderly Scams Research Paper

...seniors that they have been in an accident, are stuck in jail or need medical assistance. Because technology allows criminals to find information on the internet about family members names and information, the person posing as the relative often has detailed information that makes them sound credible. Your loved one should verify if their grandchild is actually in need of money through other family members before providing assistance. Utility Scams Your loved one may receive a phone call from their electric, gas or water company stating that services will soon be cut off due to unpaid bills. The scammers will demand money immediately over the phone to prevent services from stopping. Inform your loved one of this scam and encourage them to always hang up and call back the utility company's account services number to verify any problems before rendering payment. IRS Scams Scammers prey on people's fear of the IRS when they call and fraudulently pretend to be collecting taxes. Your loved one may be urged to pay their overdue taxes immediately to prevent being arrested or fined. If there is a problem with your loved one's taxes, the IRS will contact them with a letter. Your loved one should never pay over the phone and should never divulge any personal...

Words: 433 - Pages: 2

Premium Essay

U.S. Safe Web Act

...U.S. SAFE WEB ACT Miguel Hurtado ITMG381: Cyber Law and Privacy in a Digital Age Professor Thomas Foss November 30, 2013 Introduction: Many bills and laws are passed each year regarding cyber security and cyber law. The very laws that help somewhat govern the vast reaches of the internet. One such law, the U.S. Safe Web Act, is in essence, much like the global war on terrorism. The U.S. Safe Web Act is the United States’ response to spam, scams, spyware and internet fraud, directed at the internet, and ultimately keeping United States citizens safe and sound from the evils of the “interwebs”. How can a law help in keeping a safe web environment for U.S. citizens – How can a beast like the internet be tamed? To jump in on the United States Safe Web Act, special interest items will be covered, for example a little background on its inception and early beginnings. The Federal Trade Commission will also be covered, along with the Act’s basic elements, jurisdiction, inadequacies and finally some major advantages stemming from the Act. Background: With cyber-crime being the growing buzz word in today’s society, we dive into a few key aspects of this particular crime and come to find out, despite the nature of it – there aren’t any weapons involved… nobody is ever robbed at gunpoint, but it is still a very scary experience that might not rob of one’s life (i.e. homicide) but just as bad, it can rob of one’s identity or drain their savings, messing with someone’s livelihood...

Words: 1279 - Pages: 6

Premium Essay

Akuadalahlelaki

...Matt Moss BUS 381 Chapter 7 7-26-13 1. (10 points) How is the security of a firm's information system and data affected by its people, organization, and technology? How can a firm's security policies contribute and relate to the six main business objectives? Give examples. The security of a firm's information system and data by exposing it to threats such as people because employees may have access to data not shared on the internet. The organizations goals could also be a factor because hackers could target them for that reason alone. Technology may also be a factor, whether or not the organization uses the most recent tech or old outdated tech that hackers can easily access. A Firms security policy can contribute to the 6 main business objective by supporting them. 2. (10 points) Why is software quality important to security? What specific steps can an organization take to ensure software quality? Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measurers for a firm to take to protect itself from this? Is full protection feasible? Why or why not? If poor software is implemented in an information system, it could possible lead to all sorts of security vulnerabilities. An organization can ensure software quality by employing software metrics and rigorous software testing. The most important protection that a firm can use is Anti-virus and Firewalls. Full protection is not feasible because vulnerabilities...

Words: 502 - Pages: 3

Premium Essay

Lsrp App

...the admin must watch the bank robbery to administer the roleplay etc. There must be 30 police officers online, admins must be informed how you plan on doing the robbery. There is no roof entry to the bank. As soon as weapons are pulled out in the bank, silent alarms will wring and either your or the admin would PM a PD officer of the robbery. Robberies are not allowed to happen in certain areas (e.g police department, or city hall, airport, mall etc.) because it would be not RP to rob people in an area where officers would most likely be. Unless the robber leads the victim to an acceptable area, the consequence for this would be admin jail. Scamming can only be done ICly, and the scammers can only take up to $50,000 worth of goods or money unless admins approve on taking further. The scammer and the victim must be levels 10 or higher. House, business and vehicle scams are not allowed - the result of ignoring these rules can be admin jails and return of all goods, or a ban for severe cases. The punishment for robbery can also result in an admin jail. Rape is not allowed unless both people agree OOCly to do so. Q4 : Metagaming, otherwise known as MG, is when OOC text is used in an IC situation - for example, if a person...

Words: 370 - Pages: 2

Premium Essay

Conduct Online Transactions

...Conduct online transaction Assessment 2 TSL – Transport layer security: a set of rules or protocol for secure communication, so sites that use TLS require users to enter a password to log in, and if valid password is entered all subsequent information is sent via an encrypted channel Password authentication – every user of a site is given a unique user name and password, therefore unauthorised users who attempt to access the site with incorrect passwords will be denied entry, so the first line of defense against breaches of security and privacy Anti-virus programs – need to be installed on all computers and servers and should be updated regularly to avoid data and to be destroyed or stolen Secure payments – can be organised by banks or other payment processing organisations and instruct an organisation how to establish the necessary systems to provide end-to-end encryption of customer credit card or bank account information between the customer’s computer, the organisation’s website and the bank or payment processing service Firewall – designed to ensure that only authorised and legitimate information can come into and go out of computer Security certificates – are issued by licensed certification authorities and once seen confirm that valid security certificates are in place Encryption – protects information by changing it into a coded language that appears to be nonsensical and cannot then be read of they are intercepted Fingerprint recognition devices – automated...

Words: 1109 - Pages: 5