Phishing threats and counter measures Case Study

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Phishing is a type of cyber crime that uses emails to obtain information such as username, passwords, credit card details and other vital information from an unsuspecting person. This crime is likely to affect online banking institutions such as the First Internet bank of Indiana as hackers try to lure customers into giving vital information which can be used to access to their accounts, transfer money or commit other heinous crimes such as identity theft.

Phishing threats

There are a number of threats that the first IB bank is exposed to. These threats are potentially dangerous as they result to huge financial loses for both the bank and the customers. In addition, the bank may lose its reputation, customer base and its overall profitability may be affected in the long run. These threats include;

Phishing

This is a fraudulent attempt to obtain customer’s personal information through emails. In this case, the attacker sends emails to the bank customers promoting them to change their account information such as the password and username. These emails contain a link which directs the customers to a fake website resembling the bank’s website.

When the unsuspecting customer enters his information, the perpetrators gain this information and use it to access their online bank accounts, transfer money, purchase items online or gain personal information. Through phishing, the bank and its customers may suffer huge financial loses.

Spear phishing

In this case, the phishing email are designed and directed to attack a given person. The emails are well crafted and contain the target institution jargons and acronyms so convince the victim to open the email and also click on the link. For example, the hacker may carefully design emails to lure the banks management team or a specific person into giving vital information which can result to drastic financial loses.

Identity theft

Identity theft is carried out in conjunction with phishing. In this crime, the hacker gains the victim personal information and uses it to run up charges on the accounts and then disappears. The main information targeted include social security number, drivers license, credit card, passwords, ATM numbers, birth date, telephone number, mortgage information among others.

Both the bank and its customers incur huge expenses especially in situations where the perpetrators gain the credit card details of individuals. Identity theft may result to huge debts for both the bank and its customers.

Methods of preventing phishing

There are several measures that the bank can take to prevent phishing. These are;

Educating web users

The bank can send emails at regular times to warn their users that they never ask for their customers account information. The customers can also be provided with this information as they open the bank’s website. This information should warn their customers that they will never be prompted to give their password to anyone including the bank employees.

Indentifying spam

The email companies can be prompted to improve their websites so that the email source can be identified. This makes it possible to indentify spams which are the major sources of phishing messages.

Contracting anti-phishing consultants

The bank can contract consultants dealing with anti-phishing work. These consultants monitor new websites so as to identify those that use the Bank’s name and logo. These websites are set up by hackers a few days before their email campaign. Once identified, the websites are closed down thus preventing phishing. Also, these hackers can be identified by watching offers of stolen cards as they are being exchanged from one phishing group to another.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, June 19). Phishing threats and counter measures. https://ivypanda.com/essays/phishing-threats-and-counter-measures/

Work Cited

"Phishing threats and counter measures." IvyPanda, 19 June 2018, ivypanda.com/essays/phishing-threats-and-counter-measures/.

References

IvyPanda. (2018) 'Phishing threats and counter measures'. 19 June.

References

IvyPanda. 2018. "Phishing threats and counter measures." June 19, 2018. https://ivypanda.com/essays/phishing-threats-and-counter-measures/.

1. IvyPanda. "Phishing threats and counter measures." June 19, 2018. https://ivypanda.com/essays/phishing-threats-and-counter-measures/.


Bibliography


IvyPanda. "Phishing threats and counter measures." June 19, 2018. https://ivypanda.com/essays/phishing-threats-and-counter-measures/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1