scholarly journals Phishing: A Serious Threat to Online Banking

2011 ◽  
pp. 23-26
Author(s):  
Subasish Mohanty ◽  
Biswajit Rout

Phishing is an attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and you should not use the same passwords anywhere on the internet.

2019 ◽  
Vol 11 (4) ◽  
pp. 89 ◽  
Author(s):  
Fatima Salahdine ◽  
Naima Kaabouch

The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.


Author(s):  
Isiaka Ajewale Alimi

The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.


Author(s):  
Sheila Menon FBSCH ◽  
Vidya Bhagat

The COVID-19 pandemic has had a significant impact on the psychosocial factors that effect people globally. Particularly affected are children, students and health workers and the common symptoms identified are stress, anxiety disorders, depression and post-traumatic stress disorder. In addition, the various security measures implemented to ensure public safety have adversely affected relationships between people. This study directs public awareness to the value of psychotherapeutic support. Tele-therapy can be offered easily to people both at home or in the workplace, providing both cost effective and time sensitive solutions during times of crisis. The current review article provides an overview of the importance of maintaining psychological well-being during a pandemic and the identifies the role that empathetic communication has on wellbeing. The literature review was completed using electronic databases such as PubMed, Medline, and Scopus databases using the keywords covid-19, affected groups, affected relationships, psychology and its technological interventions, negative effects of pandemic so on.


2015 ◽  
Vol 4 (1) ◽  
pp. 19
Author(s):  
Qi Feng

<p>In recent years in building construction site construction workers due to the complexity, the project construction period, the working environment is poor, the construction process hazard and more security-conscious workers partial bottom. When accidents occur, such as by falling, falling objects wounding, electric shock, earthmoving collapse, overturning and other machinery, causing casualties, to construction companies and property losses caused by the economy to varying degrees. Throughout its reasons, one is security responsibilities are not clear, safety supervision and management system is not perfect, the other is the weakening of the internal management of construction enterprises, especially flawed construction site management, lack of effective security measures, the responsibility is not implemented, management personnel and operations personnel have not performed the necessary education and training, lack of knowledge of security technologies, illegal command, illegal operation.</p>


10.28945/3557 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-016
Author(s):  
Grandon Gill ◽  
Joni Jones

Jeffrey Stiles pondered these seemingly straightforward questions. As IT Director of Jagged Peak, Inc., a developer of e-commerce solutions located in the Tampa Bay region of Florida, it would be his responsibility to oversee the implementation of security measures that went beyond the existing user name and password currently required for each user. Recent events suggested that a move towards increased security might be inevitable. In just the past year, highly publicized security failures at the U.S. Department of Defense, major healthcare providers and large companies, such as Sony and JP Morgan Chase, had made executives acutely aware of the adverse consequences of IT system vulnerabilities. In fact, a study of business risk managers conducted in 2014 found that 69% of all businesses had experienced some level of hacking in the previous year. The nature of Jagged Peak’s business made the security of its systems a particular concern. The company, which had grown rapidly over the years, reporting over $61 million in revenue in 2014, provided its customers with software that supported web-based ordering, fulfillment and logistics activities, built around a philosophy of “buy anywhere, fulfill anywhere, return anywhere”. To support these activities, the company’s Edge platform needed to handle a variety of payment types, including gift cards (a recent target of hackers), as well as sensitive personal identifying information (PII). Compounding the security challenge: each customer ran its own instance of the Edge platform, and managed its own users. When only a single customer was being considered, the addition of further layers of security to authenticate uses was an eminently solvable problem. A variety of alternative approaches existed, including the use of various biometrics, key fobs that provided codes the user could enter, personalized security questions, and many others. The problem was that where multiple customers were involved, it was much more difficult to form a consensus. One customer might object to biometrics because it users lacked the necessary hardware. Another might object to security keys as being too costly, easily stolen or lost. Personalized questions might be considered too failure-prone by some customers. Furthermore, it was not clear that adding additional layers of authentication would necessarily be the most cost-effective way to reduce vulnerability. Other approaches, such as user training might provide greater value. Even if Stiles decided to proceed with additional authentication, questions remained. Mandatory or a free/added-cost option? Developed in house or by a third party? Used for internal systems only, customer platforms only, or both? Implementation could not begin until these broad questions were answered.


2020 ◽  
Vol 1 (2) ◽  
pp. 120-131
Author(s):  
Indra Budi Jaya

Islam as a religion wants its people to always maintain a balance between religiosity (al din) and worldly problems (al dunya). The relationship between the two describes something that is separate but inseparable (harmony). However, for modern society, this condition often creates contradictions, this condition was seen at the time of the Covid 19 pandemic. The implementation of Large-Scale Social Restrictions by the government in an effort to overcome the spread of the impact of Covid 19 to the community by limiting activities in mosques and allowing activities in the market to continue in fact responded by the community differently. The methodology used is qualitative by using social policy analysis. This paper tries to examine social policies towards the application of large-scale social restrictions on mosques and markets. In this paper, the sociology of law theory is used, namely Law is a social engineering tool which emphasizes that law becomes the commander who must bring change to society. The results obtained in the research are that the community responds to the large-scale social restriction policy differently, where the purpose of the policy is for the community to be expected to make changes by complying with the rules that have been set by the government, the conditions for rejection and various responses are caused by disharmony between implementation of policies with public awareness of the law.Keyword : Policy, large-Scale Restrictions and the sociology of law. AbstrakIslam sebagai agama mengkhendaki umatnya agar senantiasa menjaga keseimbangan antara religiusitas (al din) dan masalah keduniaan (al dunia). Hubungan keduanya menggambarkan sesuatu yang terpisah namun tidak bisa dipisahkan (harmoni). Namun bagi masyarakat modern kondisi tersebut seringkali justru menimbulkan pertentangan, kondisi tersebut nampak pada saat terjadinya pandemi Covid 19. Penerapan Pembatasan Sosial Berskala Besar oleh pemerintah dalam upaya penanggulangan penyebaran dampak Covid 19 kepada masyarakat dengan membatasi aktivitas di masjid dan membiarkan kegiatan di pasar tetap berjalan nyatanya direspon oleh masyarakat secara berbeda. Metodologi yang digunakan adalah kualitatif dengan menggunakan analisis kebijakan sosial, Tulisan ini mencoba menelaah kebijakan sosial terhadap penerapan pembatasan sosial berskala besar terhadap masjid dan pasar. Dalam penulisan ini dipergunakan teori sosiologi hukum yaitu Law is a tool social engineering yang menegaskan bahwa hukum menjadi panglima yang harus membawa perubahan terhadap masyarakat. Hasil yang diperoleh dalam penelitian adalah Masyarakat merespon kebijakan pembatasan sosial berskala besar tersebut secara berbeda, dimana tujuan kebijakan tersebut adalah untuk masyarakat diharapkan dapat melakukan perubahan dengan mematuhi aturan yang telah di tetapkan oleh pemerintah, kondisi penolakan dan respon beragam tersebut di sebabkan oleh ketidak harmonisannya antara penerapan kebijakan dengan kesadaran masyarakat terhadap hukum.Kata Kunci : Kebijakan,  Pembatasan Sosial Berskala Besar dan Sosiologi Hukum


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2012 ◽  
pp. 1141-1166
Author(s):  
Milan Petkovic ◽  
Luan Ibraimi

The introduction of e-Health and extramural applications in the personal healthcare domain has raised serious concerns about security and privacy of health data. Novel digital technologies require other security approaches in addition to the traditional “purely physical” approach. Furthermore, privacy is becoming an increasing concern in domains that deal with sensitive information such as healthcare, which cannot absorb the costs of security abuses in the system. Once sensitive information about an individual’s health is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. Therefore, in addition to legal means, it is very important to provide and enforce privacy and security in healthcare by technological means. In this chapter, the authors analyze privacy and security requirements in healthcare, explain their importance and review both classical and novel security technologies that could fulfill these requirements.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Author(s):  
Roel During ◽  
Marcel Pleijte ◽  
Rosalie I. van Dam ◽  
Irini E. Salverda

Open data and citizen-led initiatives can be both friends and foes. Where it is available and ‘open', official data not only encourages increased public participation but can also generate the production and scrutiny of new material, potentially of benefit to the original provider and others, official or otherwise. In this way, official open data can be seen to improve democracy or, more accurately, the so-called ‘participative democracy'. On the other hand, the public is not always eager to share their personal information in the most open ways. Private and sometimes sensitive information however is required to initiate projects of societal benefit in difficult times. Many citizens appear content to channel personal information exchange via social media instead of putting it on public web sites. The perceived benefits from sharing and complete openness do not outweigh any disadvantages or fear of regulation. This is caused by various sources of contingency, such as the different appeals on citizens, construed in discourses on the participation society and the representative democracy, calling for social openness in the first and privacy protection in the latter. Moreover, the discourse on open data is an economic argument fighting the rules of privacy instead of the promotion of open data as one of the prerequisites for social action. Civil servants acknowledge that access to open data via all sorts of apps could contribute to the mushrooming of public initiatives, but are reluctant to release person-related sensitive information. The authors will describe and discuss this dilemma in the context of some recent case studies from the Netherlands concerning governmental programmes on open data and citizens' initiatives, to highlight both the governance constraints and uncertainties as well as citizens' concerns on data access and data sharing. It will be shown that openness has a different meaning and understanding in the participation society and representative democracy: i.e. the tension surrounding the sharing of private social information versus transparency. Looking from both sides at openness reveals double contingency: understanding and intentions on this openness invokes mutual enforcing uncertainties. This double contingency hampers citizens' eagerness to participate. The paper will conclude with a practical recommendation for improving data governance.


Sign in / Sign up

Export Citation Format

Share Document