Information Systems Security

Anonymous
timer Asked: Oct 20th, 2018
account_balance_wallet $5

Question Description

Your posting is a response to one classmate's post. Each answer/response should be supported with research. Responses to classmates should not be "I agree” or "I like the way you stated that.” These responses should again be insightful, offering an opinion or facts based on your research and experiences. The response to one classmate should be a minimum of 125 words. See APA criteria for citing resources. You must provide a minimum of a reference, in APA format, in your original response.


Below is my classmate post


Phishing

Phishing is a type of social engineering attack often used to steal user data, including the user login credentials,SSN,credit card numbers. It has been around for more than 20 years. Even though people regularly fall victim to it

In June 2013, security firm Kaspersky Lab estimated that around more than 37 m people had faced phishing attacks around the last one year which includes around 1 million victims in the UK.

Symantec, estimates says that phishing accounted for 392 emails in a single day for one

Phishing is mainly about convincing you to reveal the information that could help attackers steal your money,sensitive information or install malware on your computer system, And also hacking your credit cards / bank account passwords others.

It works by pretending communications from companies that you trust such as banks, online payment firms like PayPal, social networks, and other technology companies, as well as government offices (such as tax authorities). According to Symantec, 71% of phishing attacks in the year 2013 were related to financial companies(organizations)

A lot of phishing attacks are fended off without you ever seeing them, with the spam filters being used by the company organizations as well as by the email service providers. But for those attacks which make it through to your inbox, there are some tips to ensure you don't fall victim to such things.

No one wants to fall victim to a phishing scam, there are many successful enough for criminals to make massive profits. there are many ways to avoid becoming a victim from the attacks. Below are the 10 basic guidelines in keeping safe from the attacks:

1. Keep updated about phishing techniques.

2. Think before you click any links.

3. Install an anti-phishing toolbar

4. verify a site’s security

5. Check Your Online Accounts Regularly and change the passwords.

6. Keep Your Browser Up to Date

7. Use Firewalls.

8. Be Wary of Pop-Ups.

9. Never Give Out Personal Information anywhere.

10. Use Updated Antivirus Software

Every Organization should follow some various security measures in order to protect its sensitive data information for example

1. Company should train every individual employee while they join the company by providing some training guidelines to not disclose the company’s private information in case if there is any phishing attacks until the caller is identified. In the given situation is clear that the company organization is not expecting any phone calls from any of it’s computer vendor. So any person who is taking the call need to recheck about the caller and need to reach out his manager or supervisor before speaking any information related to the organization’s infrastructure.

2. Moreover, company needs to implement some access related limitations to all the employees and not every employee should be granted all the access to the company / organization’s information.

3. In order to avoid any security related threats such as calls and emails the company should have a strong firewall to filter suspicious emails from the attackers with unknown email id’s and divide them as spam emails and need to bring an awareness within the organization and employees on how to respond to these kinds of threats and the security team should monitor the companies email information’s regularly and address the issues whenever there is a need to be and protect the company from the phishing attack

4. Employees must delete any sensitive documents which may contain data information about any individuals or company before disposing them into recycle bin.

References

1. https://www.theguardian.com/technology/2014/jun/06/how-to-protect-yourself-from-phishing-attacks

2. http://www.phishing.org/10-ways-to-avoid-phishing-scams

Tutor Answer

IvyTommy
School: Duke University

Kindly have a look and let me know if it is okay

Running head: PHISHING RESPONSE

1

Phishing Response
Institutional Affiliation
Date

2

PHISHING RESPONSE

Phishing Response
I agree with what the post says about phishing. Phishing refers to a fraudulent act, whereby
emails are sent with false information purporting to be from a reputable organization with the aim
of stealing crucial info...

flag Report DMCA
Review

Anonymous
Good stuff. Would use again.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors