Access over 20 million homework & study documents

Cybercrime Unit 4 Assignment 2 Scams and Fraud Lecture

Content type
User Generated
Subject
Cyber Security
Type
Other
Rating
Showing Page:
1/8
U
UNIT 4 ASSIGNMENT 2
Scams and Fraud
JANUARY 31, 2021
PURDUE GLOBAL UNIVERSITY
Jessica Lomelino

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8
APWG: Anti-Phishing Working Group
This website gives you so many different tools! It gives you websites and numbers to
preventative domains. It you the numbers and websites to the following:
Detect ana analyze attacks
Takedown
End User Awareness and Trainging
Fraud analysis
Forensic services Application gateways
Consumer toolbars
Email authentication
Email filtering
Web filtering
Hardware-based 2-factor authentication
Software-based Strong Authenication
Mutual authentication
Law enforcement enablement
The list above can be/or for law enforcement or consumers.
FTC: Federal Trade Commission

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
U UNIT 4 ASSIGNMENT 2 Scams and Fraud JANUARY 31, 2021 PURDUE GLOBAL UNIVERSITY Jessica Lomelino APWG: Anti-Phishing Working Group This website gives you so many different tools! It gives you websites and numbers to preventative domains. It you the numbers and websites to the following: Detect ana analyze attacks Takedown End User Awareness and Trainging Fraud analysis Forensic services Application gateways Consumer toolbars Email authentication Email filtering Web filtering Hardware-based 2-factor authentication Software-based Strong Authenication Mutual authentication Law enforcement enablement The list above can be/or for law enforcement or consumers. FTC: Federal Trade Commission The Federal Trade Commission has recommended four steps to protect yourself from phishing scams. One, is to protect your computer by using security software. This is making sure your computer is updated. Keeping up on updates helps ensure you can deal with any new security threats. Number two is doing the same thing but on your phone. A lot of times we check our emails or manage our bank accounts on our phones. Number three is using multi-factor authentication to protect your accounts. An example would be using a password and scanning your fingerprint or face to log into your accounts. This makes it harder for scammers to log in. Number four is backing up your data even on your phone. Make sure it is not connected to your home network. You can use an external hard drive or cloud storage. ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents