Phishing

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 17 of 22 - About 218 Essays
  • Superior Essays

    The continuing technological revolution in communications and information exchange over the past years has led to a growth in a new form of crime, cybercrime. Hence, criminals across the globe have invented various ways to use computer technology for theft, fraud as well as harassment. According to Holder and Jaishankar (2011, cited in Tiganoaia, 2013), cybercrime is defined as “an offence that is committed against individuals or groups of individuals with a criminal motive to intentionally…

    • 1246 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Social Media Frauds

    • 1274 Words
    • 5 Pages

    online safety against hackers. This would improve the internet user’s experience by eliminating the cyber threat. But we are also able to take precautions and educate ourselves with the common hacker scams that target social media sites such as phishing scams where they try to get your login information by tricking you to log into their fake login screen caused by a link you may or may have not clicked. Always have a strong password because hackers use software to figure them out and never…

    • 1274 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Effects on Social Networking Sites Do you know the affects social media is having on you! The immediacy provided by social media is available to predators. According to Connell University’s Steven Strogatz social media sites can make it more difficult to for us to distinguish between the meaningful relationships we foster in the real world. I Believe that social network have a negative impact on society because of cyberbullying, a false sense of connection, and privacy. We all are aware…

    • 1262 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    their usual contexts, whether intentionally or not. There have been incidents regarding privacy intrusion on social networking sites, leading to cyberbullying, dismissals, or even worse, suicides. Also, third-party partners are also criticized for ‘phishing, and other malicious purposes’ beside data mining, according to Debatin et al. (2009, p. 86). Cybercrime nowadays are often committed through means of social media, such as hacking, scams and frauds. This fact calls for higher concern in data…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Background Information Crowdsourcing information security uses the reach of crowdsourcing to tackle problems involving information security and cyber security. To effectively crowdsource a task, especially in information security, three criteria must be met: • First, the crowdsourcing task must be solvable by a large group. • Second, the requester must have access to a large group of people that work either collaboratively or independently toward a solution. • Third, the requester needs to…

    • 1293 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    In 2014, the number of social media users exceeded two billion, and the number of Internet users surpassed three billion. Social networking accounts for 28 percent of the time spent online. In fact, 1.28 billion users collectively spend more than 39,757 years on Facebook in a single day (Sethi, 2015). According to eBizMBA Rank (http://www.ebizmba.com/articles/social-networking-websites), the number one networking site is Facebook. It is not surprising then, that nearly one-fourth of an…

    • 1343 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Facebook Analysis

    • 1367 Words
    • 5 Pages

    Social networking has been an inevitable part of daily routine in the recent days. Social networking sites and applications have significantly impacted people in many ways. Owing to the modern networks and devices, these social networks can be accessed almost constantly. Many argue that the social media has a negative effect on people’s psychology; others argue that these make people collaborate and network easily at the comfort of their homes. This essay analyses how social networking tools…

    • 1367 Words
    • 5 Pages
    Superior Essays
  • Brilliant Essays

    [DOCUMENT TITLE] [Document subtitle] Table of Content Abstract Information technology has taken a further step in the fundamental development in the banking system. Over the years there has been high increase in the use of internet and mobile banking. As a new way of performing banking transaction through a distribution channels. The development and increase in the information technology on the banking system has made operations and service for financial institution…

    • 3150 Words
    • 13 Pages
    Brilliant Essays
  • Great Essays

    FRAMEWORK FOR MOBILE APPLICATION INCIDENT RESPONSE P2273379A 1. INTRODUCTION Mobile technology has penetrated people’s daily lives. Mobile technology brings a lot of positive effects to human lives, ranging from education, research, entertainment, health sector, social media, shopping and banking. However, the development of mobile technology has also a negative effect. As an example, people can do mobile banking, checking balance, transferring money, purchasing online and the…

    • 1344 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Essay On Zero Day

    • 1430 Words
    • 6 Pages

    Many years ago, much of society may have envisioned a future with flying cars and robots that shared the Earth with humans. While this has yet to occur, technology is leaps and bounds beyond what it was imagined to be at this point. With technological advancement comes a necessity to secure it; and for some, exploit it. Zero day exploits employed for economic or military advantage; cyber crime, cyber terrorism and threats to SCADA systems; meta-data collected and used by the private sector and…

    • 1430 Words
    • 6 Pages
    Great Essays
  • Page 1 14 15 16 17 18 19 20 21 22