Access Millions of academic & study documents

Phishing Attack

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/6

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Running Head: IMPACT OF SPYWARE ON A COMPUTER SYSTEM The Impact of Spyware on a Computer System Student’s Name Institutional Affiliation 1 IMPACT OF SPYWARE ON A COMPUTER SYSTEM Cybercriminals utilize various techniques to accomplish their objectives. Phishing attacks are among the commonly used techniques and which attempt to steal user data or compromise the integrity of computers (Alsharnouby, Alaca, & Chiasson, 2015). Phishing is a form of social engineering attack where a criminal masquerades as a trusted entity and dupes an entity into opening an infected email. The email installs a malware which is then used to download user data or freeze the system. Personally, I have received various phishing email messages but I have never opened any of them because I have some background understanding of how phishing works and how the hackers tricky the targeted user into opening the documents so that their computer systems maybe be vulnerable to attacks. However, I have witnessed many people and organizations become targets of phishing attacks and loss lots of resources and time correcting the flaws. This essay will analyze a phishing attack and its resulting effects. Part II This section analyzes a phishing attack that was sent to a female worker in the popular retail firm, Target Corporation. The name of the malware is known as spyware. The phishing email attempted to install spyware on the computer. The email sent to an acquaintance attempted to dupe her into updating he ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4