Effect Of Phishing On Individuals

Read Complete Research Material



Effect of Phishing on Individuals

By

ACKNOWLEDGEMENT

I would like to take this chance for thanking my research facilitator, friends & family for support they provided & their belief in me as well as guidance they provided without which I would have never been able to do this research.

DECLARATION

I, (Your name), would like to declare that all contents included in this thesis/dissertation stand for my individual work without any aid, & this thesis/dissertation has not been submitted for any examination at academic as well as professional level previously. It is also representing my very own views & not essentially which are associated with university.

Signature:

Date:

ABSTRACT

In this study we try to explore the concept of “Phishing” in a holistic context. The main focus of the research is on “Identity Theft” and its relation with “Society”. The research also analyzes many aspects of “Identity Theft” and tries to gauge its effect on “Society”. Finally the research describes various factors which are responsible for “Identity Theft” and tries to describe the overall effect of “Identity Theft” on “Society”. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.” Like the example in the introduction, phishing is just one way of stealing a person's identity, but there are several other ways and it is not just limited to the Internet. Phishing works by getting someone to log in to a fraudulent web site to gain their information. The phishing e-mail looks exactly like it came from a legitimate business or government entity, instead it redirects to a site that will download a keystroke logger onto the computer while running in the background and then pick up personal information (Kahn 2003 235). It then sends it to most likely the highest bidder, quite possibly somewhere in Russia. Other electronic means of accessing electronic personal information is infecting computers with viruses to make them vulnerable to hacking.

Table of contents

ACKNOWLEDGEMENTii

DECLARATIONiii

ABSTRACTiv

CHAPTER 1: INTRODUCTION1

1.1Introduction to Cybercrime1

1.2Significance of the research2

1.3Aim and objective2

1.4Rationale3

CHAPTER 2: LITERATURE REVIEW4

2.1 What is Phishing?4

2.2 Effects on individuals lives6

2.3 Effects on work8

2.4 Phishing and other types of cyber crime9

CHAPTER 3: METHODOLOGY13

3.1 Research problem13

3.2 Research question13

3.2.1 Method to address14

3.3 Research strategies15

3.3.1 Problem encountered15

CHAPTER 4: DISCUSSION AND ANALYSIS16

CHAPTER 5: CONCLUSION34

REFERENCES40

CHAPTER 1: INTRODUCTION

Introduction to Cybercrime

The cyber crime involve criminal activity that initially when countries have tried to fit into typical figures traditional, such as burglary or theft, fraud, forgery, damage, fraud, sabotage, etc. However, it should be noted that the use of information technology has created new possibilities misuse of computers, which has led to the need to be regulated by law. At the international level there is no universal definition of self cyber crime, however there have been many efforts experts who have addressed the issue of which have made functional concepts in response to specific national realities

The web surfing involves an exchange of information, not just get our IP address, but also what ...