scholarly journals Study on Cyber-Attacks Based on E-mails

2014 ◽  
Author(s):  
Florian-Cosmin BUTOI

A particularly dangerous and now common type of spam known as "Phishing” attempts to trick recipients into revealing personal and sensitive data, such as passwords, login ID’s, financial information or social security numbers. Recipients are directed to counterfeit and fraudulent websites that are exact duplicates of well-known and respected companies such as eBay, PayPal or large banking institutions and prompted to enter account information. This white paper addresses current issues associated with phishing scams and argues the most probable and likely direction phishing scams will follow in the future. Recommended safe user guidelines are included to help protect users from both current and future phishing attacks.

2019 ◽  
Vol 10 (6) ◽  
pp. 489-500
Author(s):  
Andrea Valente ◽  
◽  
David Atkinson ◽  

This study aimed to investigate the conditions in which Bitcoin has developed as a leading cryptocurrency and, according to Nakamoto (2008), could become an instrument for everyday payments around the world. In comparison to other digital payment solutions, Bitcoin is based on a peer-to-peer electronic cash system using “the blockchain”. This innovative technology allows for decentralised storage and movement of currency in a fully anonymous way, introducing advantageous methods for encrypted security and faster transactions (Hagiu & Beach, 2014). Scepticism regards Bitcoin’s foundation, energy consumption and price volatility, however, did not take long to arise (Holthaus, 2017). Ten years from its white paper release, Bitcoin is further supported by the same drivers which could sustain its growth as the future of digital payments (Russo, 2018). In order to investigate the key drivers and feasibility of acceptance, a London based survey was used to understand the desirability of Bitcoin as a day-to-day tool for digital payments. Additionally, this research analysed Bitcoin’s stakeholders and forecast drivers of sustainability for its application to become the future of the payment industry. A space which relies on policies that involve multiple layers of society, governments, regulators and tech-firms, all on a global scale. The findings confirmed how the increasing lack of trust of political and financial institutions, coupled with the increasing cases of data-breaches by tech-firms, encouraged over 70% of respondents to consider more decentralised and anonymous methods for their day-to-day actions; like payments. Policy makers need to cope with societies increasingly separating politically but gathering together digitally (LBS, 2017). For Bitcoin to truly establish itself as a global digital payment solution, key stakeholder acceptance must converge alongside the introduction of more robust regulation.


2021 ◽  
Author(s):  
Samar Khalifa

Abstract Background: Frontotemporal dementia is a common type of dementia and is a group of progressive neurodegenerative syndromes usually caused by the accumulation of pathological tau or TDP-43 proteins. The review is identifying the clinical measures including neuropsychological scores and functional measures. Methods: A systematic review was conducted covering the clinical trials done to investigate the Frontotemporal Dementia. The sample was taken from Pubmed library. 28 results were found in a range of time from 2016 to 2021. The excluded papers were 17. Results: A total of 10,349 articles were identified at the first stage of papers selecting. All records were screened in order to include and exclude by title/abstract and then based on full text. After excluding articles by year and type of papers, a total of 28 articles were identified through the databases. Following this, the irrelevant papers from databases were removed from original articles, and finally 11 articles were included based on their title/abstract. Full articles were then sourced for about 600 references. It included 732 patients and 195 controls as a total. Conclusions: The review describes the clinical and RCT trials for FTD in the last five years so it can be very updated information for the researchers to cover information required for their researches in the future ones.


1978 ◽  
Vol 33 (2) ◽  
pp. 673
Author(s):  
Richard Burkhauser ◽  
Alicia H. Munnell
Keyword(s):  

Author(s):  
Irina Tatomur

Introduction. With the rapid adoption of computer and networking technologies, educational institutions pay insufficient attention to the implementation of security measures to ensure the confidentiality, integrity and accessibility of data, and thus fall prey to cyber-attacks. Methods. The following methods were used in the process of writing the article: methods of generalization, analogy and logical analysis to determine and structure the motives for phishing attacks, ways to detect and prevent them; statistical analysis of data – to build a chronological sample of the world's largest cyber incidents and determine the economic losses suffered by educational institutions; graphical method – for visual presentation of results; abstraction and generalization – to make recommendations that would help reduce the number of cyber scams. Results. The article shows what role cyber security plays in counteracting phishing scams in the educational field. The motives for the implementation of phishing attacks, as well as methods for detecting and preventing them, have been identified and regulated. The following notions as "phishing", "submarine" and "whaling" are evaluated as the most dangerous types of fraud, targeting both small and large players in the information chain of any educational institution. An analytical review of the educational services market was conducted and a chronological sampling of the largest cyber incidents that occurred in the period 2010-2019 was made. The economic losses incurred by colleges, research institutions and leading universities in the world were described. It has been proven that the US and UK educational institutions have been the most attacked by attackers, somewhat inferior to Canada and countries in the Asia-Pacific region. It is found that education has become the top industry in terms of the number of Trojans detected on devices belonging to educational institutions and the second most listed among the most affected by the ransomware. A number of measures have been proposed to help reduce the number of cyber incidents. Discussion. The obtained results should be taken into account when formulating a strategy for the development of educational institutions, as well as raising the level of awareness of the representatives of the academic community in cybersecurity. Keywords: phishing, cyber security, cyber stalkers, insider threat, rootkit, backdoor.


Author(s):  
Barbara Sandfuchs

To fight the risks caused by excessive self-disclosure especially regarding sensitive data such as genetic ones, it might be desirable to prevent certain disclosures. When doing so, regulators traditionally compel protection, for example by prohibiting the collection and/or use of genetic data even if citizens would like to share these data. This chapter provides an introduction into an alternative approach which has recently received increased scholarly attention: privacy protection by the use of nudges. Such nudges may in the future provide an alternative to compelled protection of genetic data or complement the traditional approach. This chapter first describes behavioral psychology's findings that citizens sometimes act irrational. This statement is consequently explained with the insights that these irrationalities are often predictable. Thus, a solution might be to correct them by the use of nudges.


Author(s):  
S. Iqbal ◽  
Muzammil Hussain ◽  
Muhammad Umar Munir ◽  
Zunair Hussain ◽  
Sobia Mehrban ◽  
...  

This chapter sheds light on the future of crypto-currencies in the world as they have become a major part of trading and are now being adopted by leading investment firms as a new way of buying and selling. Despite the substantial security risk in crypto-currency trading, it has become the most traded commodity. Many new crypto-currencies are being introduced that attract investors. Banking institutions in USA and other leading countries have started to take part in investments in crypto-currency as it has revolutionized financial technology.


Author(s):  
Timothy Rouse ◽  
David N. Levine ◽  
Allison Itami ◽  
Benjamin Taylor

The U.S. has no comprehensive national law governing cybersecurity and no uniform framework for measuring the effectiveness of protections, though retirement plan record keepers maintain the personally identifiable information on millions of workers, collecting names, birth dates, social security numbers, and beneficiaries. Plan sponsors frequently engage consultants and attorneys to help them secure sensitive data, but more work is necessary to engage a larger discussion around this issue. The SPARK Institute has outlined a flexible approach for an independent third-party reporting of cyber security capabilities with several key control objectives.


Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


Sign in / Sign up

Export Citation Format

Share Document