Question

7–1. Types of Cyber Crimes. The following situations are similar, but each represents a variation of...

7–1. Types of Cyber Crimes. The following situations are similar, but each represents a variation of a particular crime. Identify the crime and point out the differences in the variations.

(a) Chen, posing fraudulently as Diamond Credit Card Co., sends an e-mail to Emily, stating that the company has observed suspicious activity in her account and has frozen the account. The e-mail asks her to reregister her credit-card number and password to reopen the account. Chen's action is cyber theft. In this situation, it would be phishing, which is a district form of identity theft. Chen is the perpetrator to find out about Emily’s financial data and passwords by posing as Diamond Credit Card Co. The suspicious activity in her account and the frozen of her account are part of the schemes for the perpetrator to seek information from Emily. He included this information to frighten Emily, so she will immediately respond with information and her account wouldn’t be frozen. When Chen has her information, he is going to act like her to drain her credit account.

(b) Claiming falsely to be Big BUy Retail Finance Co., Conner sends an email to Dino, asking him to confirm or update his personal security information to prevent his Big Buy account from being discontinued.

(C) Felicia posts her resume on GotWork.com, an online job-posting site, seeking a position in business and managerial finance and accounting. Flayden, who misrepresents himself as an employment officer with International Bank&Commerce Corp. sends her an e-mail asking for more personal information.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

​​​​​ ANSWER:  

A) This is phishing.

Phishing happens when an individual stances as an authentic business.

Through email or another kind of electronic correspondence, the transgressor demands private data like a charge card or government managed savings number and compromises the injured individual that on the off chance that they don't agree, their record or administration will be suspended.

Right now, acted like a representative of the unfortunate casualty's Mastercard organization, asserts her record is solidified, and requests her Visa number and secret phrase. These activities would comprise phishing.

B) This is likewise phishing.C sends an email to clueless D, teasing D into giving private security data by guaranteeing that if D neglects to do as such, his record will be suspended.

Under the prerequisites recorded under section An of this inquiry, this would establish phishing.

C) This is work extortion. Business extortion happens when an individual postures as an agent in a trustworthy organization and evokes private data by means of email from individuals looking for work. Here, H is acting like piece of a notable company and approached Felicia for data that is of increasingly close to home. His activities would establish business extortion.

Add a comment
Know the answer?
Add Answer to:
7–1. Types of Cyber Crimes. The following situations are similar, but each represents a variation of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT