Internet Security and Privacy ThreatsIntroductionIn this day and age technology plays a part in our everyday lives

Authors Avatar

Internet

Running Head: Internet Security and Privacy Threats

Internet Security and Privacy Threats

University of Phoenix

Tiffany York

E-Bus 400

Mark Merkow

06/15/2005

Internet Security and Privacy Threats

Introduction

In this day and age technology plays a part in our everyday lives. It’s a wonder how we functioned without the internet, or the debit card, or cell phones. These are everyday conviences that have truly helped to make our lives better. But with all of this “convience” there comes a price to pay. With us being so connected we also become more vulnerable. In this paper I will discusses some of the newest internet security concerns for both consumers and buinesses as well as discuss some privacy concerns as it pertains to online banking.

Phishing and Pharming

Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants.

Business analysts estimate that U.S. consumers lost US$2.4 billion from online fraud scams in 2003, with most fraud carried out by people obtaining access to account numbers and passwords. One major corporation reported receiving more than 1,400 phishing attacks in June 2004. Other surveys report that more than 57 million consumers think they received phishing e-mails last year.

Join now!

Phishing is a scam designed to get e-mail recipients to disclose sensitive personal information such as log-on details and account numbers. When users respond with the requested information, attackers can use it to gain access to the accounts.

Phishing is based on long-established forms of social engineering. Most phishing schemes use messages delivered in e-mail documents that look like they come from real companies or from valid electronic addresses. Some phishing attacks use malicious Web sites to solicit personal, often financial, information.

Pharming attacks trick users into being redirected to a look-alike Web site. Pharming is very much akin to ...

This is a preview of the whole essay