Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime

2018 ◽  
pp. 627-648
Author(s):  
Anupama Mishra ◽  
Brij B. Gupta ◽  
Deepak Gupta
Author(s):  
Jason R. C. Nurse

Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online harassment (e.g., cyberbullying, trolling, revenge porn, hate crimes), identity-related crimes (e.g., identity theft, doxing), hacking (e.g., malware, cryptojacking, account hacking), and denial-of-service crimes. As a part of its contribution, the chapter introduces a summary taxonomy of cybercrimes against individuals and a case for why they will continue to occur if concerted interdisciplinary efforts are not pursued.


2021 ◽  
pp. 88-108
Author(s):  
Roderic Broadhurst

This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software and other contraband such as illicit drugs, stolen credit cards and personal identification, firearms, and criminal services. Different cybercrime types and methods are described, including the widespread use of ‘social engineering’ or deception in computer misuse and identity theft. The challenges facing law enforcement in the suppression of cybercrime and the important role of private and public partnerships, as well as cross-national cooperation in the suppression of cybercrime is illustrated.


Author(s):  
Ping Wang ◽  
Anteneh T. Girma

This article introduces and defines online phishing, which is an online crime of deceiving users into accessing fraudulent emails, web links, and websites to steal their sensitive private information. Online phishing is the top starting point for cyberattacks and the leading cause for identity theft that brings financial and other losses to individual and organizational victims. Phishing is primarily a social engineering attack that exploits human vulnerabilities due to lack of user awareness and protection. This article classifies phishing into two general groups based on the primary method and technique involved: social engineering and technical subterfuge. The article discusses how various specific types of phishing work and proposes a comprehensive set of solutions.


Author(s):  
M.A. Ahmad ◽  
◽  
D.D. Wisdom ◽  
S. Isaac

Cybercrimes in various forms are on the raise daily; these crimes pose a potential threat to our moral society as well as economy and nation building at large. They are namely: social engineering, malvertising, ransom ware, Spamming, Botnets, fake bank alert messages (SMS) /unsolicited SMS requesting you to provide bank details as Bank Verification Number (BVN), fraud, identity theft, piracy, pornography, hacking, fraudulent e-mail related SMS, forgery such as fake documents as Certificate etc. Thus, Cybercrime is gradually becoming a threat to our moral society at large. Hence, the increase number of cybercrime rate is an open field of ongoing research studies. Therefore, we have proposed a new approach that emphases on the prominent cybercrimes carried out around the world, and presents a precise study in Nigeria within some secondary school students. The study revealed a new approach to fighting Cybercrimes in order to combat cybercriminals. Keywords: Cybercrime, Botnets, Malvertising, Ransom ware, Pornography


Author(s):  
R. Dhanalakshmi ◽  
C. Prabhu ◽  
C. Chellapan

Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user’s personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing as legitimate ones which makes the users to trust and divulge into them by clicking the link provided in the E-Mail. To detect a Phishing website, human experts compare the claimed identity of a website with features in the website. For example, human experts often compare the domain name in the URL against the claimed identity. Most legitimate websites have domain names that match their identities, while Phishing websites usually have less relevance between their domain names and their claimed (fake) identities. In addition to blacklists, white lists, heuristics, and classifications used in the state-of-the-art systems, we propose to consider websites’ identity claims. To enable secure transactions ,Password hashing has been done with MD5 hashing algorithms that strengthens web password authentication. It is also shown that getting original password from hashed form is not an easy task due to addition of salt value. If the user is valid, get a session key via mobile, through which further access can be done


2018 ◽  
Vol 13 (6) ◽  
pp. 1 ◽  
Author(s):  
Jason E. Thomas

One of the most difficult challenges in information security today is phishing. Phishing is a difficult problem to address because there are many permutations, messages, and value propositions that can be sent to targets. Spear phishing is also associated with social engineering, which can be difficult for even trained or savvy employees to detect. This makes the user the critical point of entry for miscreants seeking to perpetrate cyber crimes such as identity theft and ransomware propagation, which cause billions of dollars in losses each year. Researchers are exploring many avenues to address this problem, including educating users and making them aware of the repercussions of becoming victims of phishing. The purpose of this study was to interview security professionals to gain better insight on preventing users and employees from succumbing to phishing attack. Seven subject-matter experts were interviewed, revealing nine themes describing traits that identify users as vulnerable to attack or strongly resistive to attack, as well as training suggestions to empower users to resist spear phishing attacks. Suggestions are made for practitioners in the field and future research.


Author(s):  
Nabie Y. Conteh ◽  
Quinnesha N. Staton

The purpose of this chapter is to explore and address the socio-economic impact of identity thefts and cybercrime in general. The chapter will further explain the various ways employed in their implementation. The chapter will also put forward ways to prevent the threats and vulnerabilities of the attacks. The study will also recommend solutions to stop and/or mitigate the consequences of cyber-thefts. The study will define social engineering as well as provide various social engineering tactic. The chapter will also discuss the reasons for the rise in cybercrime. Such reasons will include financial gain, revenge, as well as non-financial gains. Also cited are examples that demonstrate the capabilities of cybercriminal. The chapter will also provide justification for the reasons behind the cumbersome task and failure in instituting a lasting solution to the criminal activities. Finally, this chapter will close with a conclusion on the economic implications of social engineering on the general cyberwar on cybercrime at the national and global levels.


Phishing attack is used for identity theft with the help of social engineering and some sophisticated attacks. To attract the user by clicking a URL and is trapped to a phishing Web page. Security for user’s credentials is one of most important factor for organizations nowadays. It can be achieved through several ways like education and training. Through training and education the level of awareness will be increased also it helps to mitigate phishing. Approach with several steps is introduced in this paper, where a user must take a look or take these precautionary measures if the user is browsing any Web browser. We found it possible to detect Phishing Web pages without anti Phishing solutions. This approach contains several steps to examine whether the Web page is a real Web page or a fake Webpage. All these steps will check the phishing features exist in that Web page or not. For evaluation of our approach we analyzed the data set of Phish Tank, this data set is full of Phishing Web Pages. The purpose of evaluation is to check the features discussed in our approach to aware the user. From the following result it is resulted that the user can detect without using any Anti Phishing solution just by taking some steps to check the Web page for certain features.


2020 ◽  
Vol 8 (1) ◽  
pp. 56
Author(s):  
Naiya Patel

Information security in healthcare settings is overlooked even though it is the most vulnerable for social engineering attacks. The theft of hospital information data is critical to be monitored as they contain patients’ confidential health information. If leaked, the data can impact patients’ social as well as professional life. The hospital data system includes administrative data, as well as employees’ personal information hacked, which can cause identity theft. The current paper discusses types and sources of social engineering attacks in healthcare organizations. Social engineering attacks occur more frequently than other malware attacks, and hence it is crucial to understand what social engineering is and its vulnerabilities to understand the prevention measures. The paper describes types of threats, potential vulnerabilities, and possible solutions to prevent social engineering attacks in healthcare organizations. Keywords: social engineering, hospitals, healthcare organizations, information security.


2009 ◽  
Vol 43 (5) ◽  
pp. 4
Author(s):  
MARY ELLEN SCHNEIDER
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document