ipl-logo

Anti-Phishing: A Case Study

1117 Words5 Pages

1)Phishing:
Phishing is type of method in which the attacker uses the method of sending an email to a user which lets the person to claim a falsely thing through an established and reputed company. Then this email will directly open an website where the user needs to fill up his personal information, bank cards details, passwords and other identifiable things. This website is however a bogus and will capture and steal all the information that the person enters on the page.
There can be an increased costs to the company in setting up all the anti-phishing software, setting up new computer programs and etc.
Thus, This can lead to a poor reputation of the company and nobody might again rely on this company due to this incident
2)Identity Theft:
Identity theft is when someone steals or robs a user's …show more content…

Thus, This can lead to a bad reputation of the company in the market.
7)Products at Risk:
Eg Software.
Products at risk means making copies of the software, application and games. Due to latest technology anybody can use to replicate all media formats on the computer. Software and games can be easily copied using CD/DVD replication.This sometimes also involves pirating software of the reputed company and selling them on the internet or to the black market for money.
There can be loss in business as the software will be already sold and nobody will purchase it again.
Thus, There can be a bad reputation of that company due to this issue.
8)Distribution Mechanisms:
Eg Peer to Peer Network.
Distribution Mechanisms in refer to Peer to Peer Network means that a network created when two or more PCs are connected through a same network host. This means that everyone connected to that server as the same capabilities as each and other.Peer to Peer Network is useful as the person can distribute the data or send the data to each and

Open Document