Tuesday, May 5, 2020

Computer Fraud and Abuse Techniques-Free-Sample for Students

Question: Discuss about the Computer Fraud and Abuse Techniques. Answer: Northwest industries had suffered from the problem of computer fraud. The cyber crime is increasing year by year. The different computers are connected by way of internet as some of the computers are having information in regard to the secrets of trade and valuable assets related to information technology, hence they can suffer from computer attack by the foreign government or the anti-social elements. There are different kinds of techniques available in order to do computer attack. Hacking is the most commonly used technique under which an access which is unauthorized or modification is being done in regard to the part of the computer system or other electronic device. Hijacking is also being used as part of computer attack under which the person hijacking gains control of the computer system of other person and thus carries the illegal activities without the knowledge of the main user of the computer system. The network of hijacked computers is also formed which is known as botnet in order to attack different systems. The internet attacks that are launched by the hijacked computers which are t he part of the botnet network is termed as the zombie. The creation of the network is being done by the bot herder. The hijacked computers performing the botnet also lead to denial of service attack as the internet server is being over loaded with the fraud mails and requests being sent by the different attackers. Spamming is also commonly used as a part of computer attack in order to send same messages to a group of people at the same time. Spoofing is also commonly done as a part of the computer attack under which the communication sent electronically is being altered so that the recipients trust can be gathered. Spoofing is done in various forms such as the e-mail spoofing, caller ID spoofing, IP address spoofing, SMS spoofing, etc. Zero day attack is also done on the computer systems. Now a day, internet terrorism is also increasing and it is disrupting the business and communication done electronically. Thus there are various types of techniques which are increasing the compute r attack. Social engineering is also a form of computer fraud. Social engineering is a technique under which the person complies with the wishes of the penetrator so that they are able to get the logical and both physical access to the computer network and system. Hence it helps in gaining access to the confidential and private data. Social engineering is done in various ways such as the identity theft, pretexting, posing, phishing, carding, pharming, and typosquatting etc. The other form of computer fraud is malware. Malware is a type of software that is used to perform harm on the computer system. The software of malware had now a day extended to the mobile phones also. Malware comes as a result of the installation or process of injecting done by a attacker located at remote location. Malware affects the shared files, attachments on e-mail and other remote located vulnerabilities. Spyware is a type of software that provides the personal information about the users to other person without the permission of the user. The different types of spyware are adware, scareware, ransomware, etc. The various types of malware software are Keylogger, Trojan horse, time bombs, logic bombs, trap door, packet sniffers, rootkit and superzapping. The computer worm is also a form of computer fraud which copies itself as a program on the computer system automatically and is then transmitted to other computer systems connected by way of network. Thus different hackers had attacked the computer system of RPC. Packets sniffers and eavesdropping had been used as a technique for hacking. Hence a deep research was being carried on by Jason in regard to various types of computer frauds mentioned above. The hacking process in the company by the hackers had led to interception in regard to all the communications which are pending in regard to merger in both the companies. The hackers are now gaining more knowledge day by day and they are launching various new types of techniques under which they do not require pre design program in order to adversely affect the computer system of other person to or to gain information in regard to the confidential task of the company. They just decide their targets and work accordingly. The hackers are also using the search engines in order to find information in regard to their target computer systems. Hence adequate measures need to be taken in order to control the computer fraud.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.