Peer Reviewer:
Provide any additional comments you may have about the paper. This can include suggesting new topics that will enhance the content of the paper.
I need help to peer reviewing the paper below:
Due to studies from several articles and a lot of complain from tremendous number of people about personal information leakage, phishing is considered as the most serious threat today. Therefore, phishing is used to steal personal information, online credentials and credit card details. As an evidence, number of victims of password and credentials in web are increasing every day. Also, the study from the article found out that all this personal information leakage attack is caused with both phishing by using the social engineering attack and malware-based attacks. And according to the Threats Report of the security company, MacAfee in the third quarter of 2012, the total number of the menacing URL in the world which divides the malicious code to the phishing sites was counted with 43,400,000 cases in the third quarter of 2012. Which means 20% increased preparation in the second quarter of 2012, and the domain name of the URL showed 23,700,000 cases, and it increased maximum 50% compared to the existing preparation. In addition, the article shows that the average number of monthly and newly discovered menancing URL was 2,700,000 cases. Also, according to security company, Kaspersky, Lab, the forged search and e-mail service, social network, financial institutions and online store were used for the Phishing often. And the number of the internet users who experienced the phishing attack increased by 87% from 1990,000 to 37,300,000 people in recently years. The Phishing attack through the spam e-mail as the existing phishing attack increase from 10.23 to 12.09 % in 2012, and the methods and range increased through the communication between computers such as Website or messaging system. Truly, many people think wrong that hackers only attack companies not individual. It is our responsibilities both general users and public institutions to become aware and getting ready for Phishing in daily lives. In order to against Phishing tricks, I agreed that individual users must be prepare for tricks which there should be public education about Phishing. Also, both academic and government organizations have a significant effort to deliver end user education to enable public understanding of the importance of cyber security. For instance, computer users with limited computer literacy or mediocre computer skills must be offered free lesson and advices about common cyber security breaches. Obviously, due to the researches, only little efforts are being made in order to prevent phishing to spread among many users. Consequently, with time phishing threat is increasing and become a common fraud to commit crime. In the final analysis, IT professional need to aim further research over anti-phishing education in order to save users from phishing attacks.
Scope
As we know that most of our life depends on internet and almost all using internet as a communication agent in present days. So there is threat to our confidential data because we are storing our data on internet. So most of hackers try to misuse our credentials for wrong purpose. So students must know about these attacks and cyber security must be a academic subject.
Severity
For example in case of online banking transactions , through phshing attack user accounts.no and password is known by attacker then attacker may withdraw all your money.This makes a severe problem.
One of the suggestion from my side is to conduct awareness among people and also try to avoid spam mails (block them)
Don't click on malicious links.
Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
By the end of this week, your Career Development Research paper rough draft is due. To ensure you receive ample feedback on your draft as well as ideas to improve it, please post your draft to the discussion board this week. This will allow your classmates to offer ideas. When you examine the drafts submitted by others, please comment on the following: 1) Is the thesis offered by the writer effective? Why/why not? 2) Do you notice any issues with...
Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...
Item 6 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Precedent is also described as "the unique knowledge embedded in a known design" (Oxman, 1994, p. 146), meaning, in everyday terms, that the memory of having experienced an existing design is a memory that contains special forms of knowledge... At heart, the design case is...
What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...
4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit going forward? 5. Analyze the company’s financial performance. Do trends suggest that Fitbit’s strategy is working? 6.What recommendations would you make to Fitbit management to address the most important strategic issues facing the company? Fitbit, Inc., in 2017: Can Revive Its Strategy and It Reverse Mounting Losses? connect ROCHELLE R. BRUNSON Baylor University MARLENE M. REED Baylor University in the...
1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public interest? 2. Being locked in to a product or technology is only a problem if such a product can be clearly shown to be inferior to an alternative. What difficulties might there be in establishing such a case? etwork effects Microsoft is a vertically integrated firm (see page 87), with a dominant position in the operating system market (i.e. Windows) and in certain application...
Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded by a computer? Well, you just might find that happening in your next course. In April 2013, EdX, a Harvard/MIT joint venture to develop massively open online courses (MOOCs), launched an essay-scoring program. Using arti ficial intelligence technology, essays and short answers are immediately scored and feedback tendered, allowing students to revise, resubmit, and improve their grade as many times as necessary. The non-profit...
Please Use your keyboard (Don't use handwriting) *******Please re-write my answer I need new and unique answers, please. (Use your own words, don't copy and paste)***** Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded by a computer? Well, you just might find that happening in your next course. In April 2013, EdX, a Harvard/MIT joint venture to develop massively open online courses (MOOCs), launched an essay-scoring program. Using artificial intelligence technology, essays...