Question

Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...

Peer Reviewer:

  1. Describe the problem in your own words.
  2. What is the scope? What is the severity? Is the problem statement objective? Explain why or why not.
  3. Describe the problem statement quality and provide one suggestion for improvement.
  4. How was the problem measured?
  5. Explain the derivation of the metric and the baseline and the unit of the metric.
  6. Make a comment on the quality of the metric used, providing one alternative or additional metric for the problem.
  7. List the factors in the problem and comment on their relevance/valid.
  8. Provide one alternative or additional factor.
  9. Provide five statements/determinations/insights that the analysis offered.
  10. Provide a statement about the quality, readability, and usability of the document.
  11. What are the solution options?
  12. What is the solution you would pick?
  13. Have APA guidelines been followed?

Provide any additional comments you may have about the paper. This can include suggesting new topics that will enhance the content of the paper.

   I need help to peer reviewing the paper below:

Due to studies from several articles and a lot of complain from tremendous number of people about personal information leakage, phishing is considered as the most serious threat today. Therefore, phishing is used to steal personal information, online credentials and credit card details. As an evidence, number of victims of password and credentials in web are increasing every day. Also, the study from the article found out that all this personal information leakage attack is caused with both phishing by using the social engineering attack and malware-based attacks. And according to the Threats Report of the security company, MacAfee in the third quarter of 2012, the total number of the menacing URL in the world which divides the malicious code to the phishing sites was counted with 43,400,000 cases in the third quarter of 2012. Which means 20% increased preparation in the second quarter of 2012, and the domain name of the URL showed 23,700,000 cases, and it increased maximum 50% compared to the existing preparation. In addition, the article shows that the average number of monthly and newly discovered menancing URL was 2,700,000 cases. Also, according to security company, Kaspersky, Lab, the forged search and e-mail service, social network, financial institutions and online store were used for the Phishing often. And the number of the internet users who experienced the phishing attack increased by 87% from 1990,000 to 37,300,000 people in recently years. The Phishing attack through the spam e-mail as the existing phishing attack increase from 10.23 to 12.09 % in 2012, and the methods and range increased through the communication between computers such as Website or messaging system. Truly, many people think wrong that hackers only attack companies not individual. It is our responsibilities both general users and public institutions to become aware and getting ready for Phishing in daily lives. In order to against Phishing tricks, I agreed that individual users must be prepare for tricks which there should be public education about Phishing. Also, both academic and government organizations have a significant effort to deliver end user education to enable public understanding of the importance of cyber security. For instance, computer users with limited computer literacy or mediocre computer skills must be offered free lesson and advices about common cyber security breaches. Obviously, due to the researches, only little efforts are being made in order to prevent phishing to spread among many users. Consequently, with time phishing threat is increasing and become a common fraud to commit crime. In the final analysis, IT professional need to aim further research over anti-phishing education in order to save users from phishing attacks.

                                               

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Scope

As we know that most of our life depends on internet and almost all using internet as a communication agent in present days. So there is threat to our confidential data because we are storing our data on internet. So most of hackers try to misuse our credentials for wrong purpose. So students must know about these attacks and cyber security must be a academic subject.

Severity

For example in case of online banking transactions , through phshing attack user accounts.no and password is known by attacker then attacker may withdraw all your money.This makes a severe problem.

One of the suggestion from my side is to conduct awareness among people and also try to avoid spam mails (block them)

Don't click on malicious links.

Add a comment
Know the answer?
Add Answer to:
Peer Reviewer: Describe the problem in your own words. What is the scope? What is the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • By the end of this week, your Career Development Research paper rough draft is due.   To ensure you receive ample fee...

    By the end of this week, your Career Development Research paper rough draft is due.   To ensure you receive ample feedback on your draft as well as ideas to improve it, please post your draft to the discussion board this week. This will allow your classmates to offer ideas.   When you examine the drafts submitted by others, please comment on the following: 1) Is the thesis offered by the writer effective? Why/why not? 2) Do you notice any issues with...

  • Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions...

    Please use own words. Thank you. CASE QUESTIONS AND DISCUSSION > Analyze and discuss the questions listed below in specific detail. A minimum of 4 pages is required; ensure that you answer all questions completely Case Questions Who are the main players (name and position)? What business (es) and industry or industries is the company in? What are the issues and problems facing the company? (Sort them by importance and urgency.) What are the characteristics of the environment in which...

  • Item 6 In the case below, the original source material is given along with a sample...

    Item 6 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Precedent is also described as "the unique knowledge embedded in a known design" (Oxman, 1994, p. 146), meaning, in everyday terms, that the memory of having experienced an existing design is a memory that contains special forms of knowledge... At heart, the design case is...

  • What are your top 3 takaways from this article? It’s always tempting to see the present...

    What are your top 3 takaways from this article? It’s always tempting to see the present moment as the peak of chaos and disruption, whether we’re talking about politics or just how those teenagers behave today. The same is true in marketing, because in many ways that profession is always in a state of chaos and disruption. But I don’t think it’s hyperbole to apply “peak chaos and disruption” to social media marketing in the first quarter of 2018. Let’s...

  • 4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit go...

    4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit going forward? 5. Analyze the company’s financial performance. Do trends suggest that Fitbit’s strategy is working? 6.What recommendations would you make to Fitbit management to address the most important strategic issues facing the company? Fitbit, Inc., in 2017: Can Revive Its Strategy and It Reverse Mounting Losses? connect ROCHELLE R. BRUNSON Baylor University MARLENE M. REED Baylor University in the...

  • 1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public...

    1. In what ways was Microsoft’s behaviour (a) against the public interest; (b) in the public interest? 2. Being locked in to a product or technology is only a problem if such a product can be clearly shown to be inferior to an alternative. What difficulties might there be in establishing such a case? etwork effects Microsoft is a vertically integrated firm (see page 87), with a dominant position in the operating system market (i.e. Windows) and in certain application...

  • Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded...

    Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded by a computer? Well, you just might find that happening in your next course. In April 2013, EdX, a Harvard/MIT joint venture to develop massively open online courses (MOOCs), launched an essay-scoring program. Using arti ficial intelligence technology, essays and short answers are immediately scored and feedback tendered, allowing students to revise, resubmit, and improve their grade as many times as necessary. The non-profit...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT