Password Guidance
When setting a password, make sure to do the following (Marquette University, 2021):
When setting a password, make sure NOT to do the following:
Phishing Attacks
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords (KnowBe4, n.d.).
Types of Phishing Attacks
Phishing attacks include:
Vishing attacks rely on convincing victims that they are doing the right thing by responding to the caller. Often the caller will pretend to be calling from the government, tax department, police, or the victim’s bank.This is a social engineered fraud where a fraudster convinces the user to provide critical information over the phone.
A whaling attack is a method used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes.
Spear-phishing is a targeted attempt to steal sensitive information such as account credentials or financial information from a specific individual, organization or business often for malicious reasons.
How to prevent phishing attacks
Physical Security
Physical security is an integral part of cyber security because they prevent access to the storage room where firewalls and other machines are found. Without physical security, attackers can access data centers, sneak into restricted areas of building, and even have use terminals they have no business accessing (Diehl, 2020).
Some of the physical security breaches include tailgating and piggybacking. In tailgating, someone slips in unexpectedly after an authorized person has opened the door. Similarly, piggybacking occurs when an authorized individual opens and holds the door for someone who may or may not have the proper credentials (Diehl, 2020). When these actions happen, a secure access point loses its purpose and the building, occupants, and equipment are put at risk.
How to Prevent Tailgating and piggybacking
Cyber Crime Cases in the Banking Sector
With the advent of technologies, banking services have become more convenient. However, the downside of these technologies is that ATM frauds, Phishing, identity theft,
Struggling with online classes or exams? Get expert help to ace your coursework, assignments, and tests stress-free!