Dangerous Attachments Chapter 7

Great Essays
I read chapter 7: Phony Sites and Dangerous Attachments in The Art of Deception by Kevin D. Mitnick and William L. Simon. This chapter was about unsafe sites you may visit and unsafe attachments you may receive in an email. An attacker will do whatever is necessary to break into a network. Computer viruses can do a lot of damage to your computer. Many people have created a software to prevent a virus from harming computers.
Everyone gets emails from stores you have shopped at. Some of these emails have attachments you have to download to view. I only download items I get from people I know. For example, my brother plays hockey and the manager sends forms that need to be signed and returned, so I open them because I know it isn’t a scam. Also,
…show more content…
It may also do a task without you knowing about it. Malware probably looks innocent enough to you, but it is a very dangerous site by installing an authorized program. Malware may be a word document or a PowerPoint presentation. Malware may also be a version of the Trojan Horse, which may appear after a successful virus attack. Once this malware is installed on your computer, the attacker can see what you are doing. The attacker can see every key stroke that you make, which includes all of your passwords and credit card information. If you have a webcam they can see what you are doing in front of the camera, day or night, even if you think it is turned off. The attacker can also use your computer microphone to hear what you are saying. You should always install an anti-virus on your computer to help prevent an …show more content…
They have a right to be hesitant, because many people can steal your credit card information if the site uses today’s standard of 128-bit encryption. The encryption information can be unencrypted, but it will take a while to break it. Just about anyone who has the time, energy, patience, and resources could break one of the encrypted files. Many e-commerce companies file their customer financial information unencrypted in their databases. Many e-commerce companies use a software, but they don’t change the default system password. This means that the information is available to anyone who is on the internet and decides to try to connect to the server. Even people who don’t buy items online can get their credit card information stolen. It’s as simple as buying items around town. Credit card receipts can get stolen from anywhere which include, a restaurant, or the trash. A waiter or waitress can also jot down your name and card information to use later. Many credit card companies hold the card holder responsible for the first fifty dollars, if a credit card number happens to get

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Avoid accessing such mails because they contain unwanted program that can immediately sneak ‘Important Security Alert From Windows’ Pop-Ups into the computer when user click on the specified links. Apart from these, there are many other factors that act as a gateway for the entry of ‘Important Security Alert From Windows’ Pop-Ups. Some of the common points are listed below: Execute code attacks. Presence of Trojans or malware on the computer.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the article Identity theft it talks about how vital protecting clients information private is, but there is often breaches that cannot be prevented (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017). Identity Theft. CPA Journal, 87(1), 66-68.). The article also goes on to state that being prepared is the best cure for identity theft, even though it is now considered to be a fact of life there are many steps that can be taken along the road of recovery (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Information Management Introduction Over the year, I have completed 5 DT internal assessments. These included AS 1.41, AS 1.43, AS 1.45, AS 1.46, and AS 1.50. In completing these assessments, I have became more familiar with the applications that were used to complete these internal assessments, and has given me a better understanding for file structure. Assessments Completed AS 1.43 - First assignment: Website.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    People that buy products or services online need to feel that their financial and personal information they have given to businesses is secure. Legal consequences of data privacy breaches: A company that stores personal data on their computers systems have a legal obligation to keep that data secure. If personal data is stolen during a cyber-attack and the company can be show to have been negligent in terms of keeping the personal data secure. Then the company could face prosecution under the Data Protection Act and receive a large fine. Malware With these the attacker can use malware to gain or change data malware is software specifically designed to gain access or damage a computer without the user from knowing there are various types of malware such:…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Dixie: I think that using your credit cards online these days is wrong. I feel that I have to protect what I have and that putting my information out there that I would be harming myself. I do know that a lot of people do this but this is not for me.…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    History of ransom ware Ransomware virus are carried out by trojan program. According to …, a trojan is a type of malware that is often disguised as legitimate software. This malicious program allows cyber criminals to 1) Deleting data 2) Blocking data 3) Modifying data 4)…

    • 602 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Snap Map Analysis

    • 642 Words
    • 3 Pages

    Smartphones create a “snap map” using our phones and any pictures we post online. These pictures once online can be accessed by anyone with internet access and a device. NBC Action News did a story on how these “snap maps” work and how they can be easily accessed.…

    • 642 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Social Proof

    • 723 Words
    • 3 Pages

    People become repeat customers with those online businesses they've come to trust. Because the business has reliably fulfilled their orders in the past, it has earned the repeat customer's trust. However, earning trust requires the customer to have past experience with a business. How does the owner of an e-commerce site get the newcomer to take a chance and make a first purchase? It's all about appearances.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Encryption is a fundamental part of today’s technology. It allows for secure exchange of data between two or more parties. Every time you buy something online or log in to your Facebook account, encryption keeps your credit card details and password safe. It does this by scrambling the information before sending it. Using a special set of tools, your computer (or smartphone) mixes up your credit card number so that only…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Argumentative Essay: Information Privacy Against Government and Corporations We as citizens would think privacy is something we have, it’s also something we should cherish and value but because of technology including credit cards/debit cards, it’s hard to keep this condition without worldly interactions. Additionally, the government and various corporations also play a vital factor in this situation based on our private information. For instance, The Privacy Act of 1974 gives the government or federal law the right to obtain “ fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies. ”(Department of Justice).…

    • 837 Words
    • 4 Pages
    Improved Essays