Capstone Project on "Techniques of Computer Forensics for Preventing Email Phishing"

Capstone Project 17 pages (4655 words) Sources: 10

[EXCERPT] . . . .

Computer Forensics for Preventing Email Phishing

It is no secret that white-collar crime has experienced rapid growth since the advent of the Internet. Reports state that white-collar crime costs average approximately twenty times more than the costs associated with street crime annually. Fraud is a "generic term" that "embraces all multifarious means which human ingenuity can devise, which are resorted to by one individual, to get an advantage over another by false representations." (Singleton, Singleton, and Bologna, 2006) This may include "surprise, trick, cunning and unfair ways by which another is cheated." (Singleton, Singleton, and Bologna, 2006)

Fraud according to the U.S. Supreme Court involves the following variables:

(1) That the individual has made a representation in regard to a material fact;

(2) That such representation is false;

(3) That such representation was not actually believed by the defendant on reasonable grounds, to be true;

(4) That it was made with intent that it should be acted on;

(5) That it was acted on by complainant to his damage; and (6) That in so acting on it the complainant was ignorant of its falsity and reasonably believed it to be true. (Singleton, Singleton, and Bologna, 2006)

Email phishing is one form of fraud as described just above. Email phishing involves the sending of emails that are misrepresentative in some way for the purpose of cheating the recipient of the email. Phishing emails have cost individuals and companies both in monetary terms and in terms of privacy violations and issues. The w
Continue scrolling to

download full paper
ork of Watson, Holz, and Mueller (2005) entitled "Know Your Enemy: Phishing" states that email phishing is

"…the practice of sending out fake emails, or spam, written to appear as if they have been sent by banks or other reputable organizations, with the intent of luring the recipient into revealing sensitive information such as usernames, passwords, account IDs, ATM PINs or credit card details. Typically, phishing attacks will direct the recipient to a web page designed to mimic a target organization's own visual identity and to harvest the user's personal information, often leaving the victim unaware of the attack.' (Watson, Holz, and Mueller, 2005)

Jakobsson and Soghoian (2009) write in the chapter entitled 'Social Engineering in Phishing' and report that social engineering is a term "used to describe psychological tricks aimed at making victims agree to things they would not have done normally. Phishing is the theft of user credentials, such as passwords, social security numbers, PINs and answers to security questions." (Jakobsson and Soghoian, 2009) Social engineering is stated to have "become prevalent around 2003, it is a crime that is on everybody's lips." (Jakobsson and Soghoian, 2009) in fact, many online crimes are reliant on inducing the victim to take action in some way through "convincing him to do so." (Jakobsson and Soghoian, 2009)

It is necessary to understand the risks faced by consumers to deception and for this needed is an approach that is proactive in nature "in which the expected vulnerabilities are minimized by the selection and deployment of appropriate e-mail and web templates and the use of appropriate e-mail and web templates, and the use of appropriate manners of interaction." (Jakobsson and Soghoian, 2009)

Those who are specifically knowledgeable in terms of technical and technological applications often fail to grasp the average consumer can be protected thorough the security measures they themselves use for protection. However, the average consumer is much more susceptible to social engineering type attacks. It is related that a study involving 2500 subjects and reported by Fogg et al. (2001, 2003) "investigated how different elements of web sites affect people's perception of web sites." (Jakobsson and Soghoian, 2009) Findings show that 23% of individuals in the study overlooked browser-based security clues such as the address bar, the status bar, and the SSL lock icon, and 40% of subjects made the wrong security decision." (Jakobsson and Soghoian, 2009)

II. Project scope proposal

The purpose of this study is to review and examine techniques of computer forensics for email phishing. Towards this end this work will review publicly available information such as is located online via the Internet including company reports, news reports, journal articles, and other such information. Included will be any information assurance risk analyses should consider legitimate, known threats, which pertain to the subject organization, based on the research information gathered, the presumed process strengths and vulnerabilities or any organizational computing and networking infrastructure will be identified in depth.

III. Forensic Methodology, Requirements, Issues and Trends

According to the Frost and Sullivan work entitled "Key Challenges in Fighting Phishing and Pharming" phishers in avoidance of anti-phishing text techniques of anti-phishing systems scans over websites, use several Flash-based websites methods hiding a multimedia object. (paraphrased) as well, for avoiding the anti-phishing filters current used, "phishers are using images instead of text to make it harder to detect text commonly used in phishing emails. A user facing a phishing site should be able to differentiate what text is and what an image is." (nd) Additionally reported is that "new and improved telecommunications infrastructure gives to phishers the ability to control and access in new ways with new techniques for cybercrime." (nd) Large Internet-based companies including those such as "AOL, MySpace, and Paypal, and retailers such as TJX Companies, have been victims and have had to spend large amounts of capital -- and jeopardized branding -- due to phishing attacks." (Frost and Sullivan, nd)

The specific incidents reported in the Frost and Sullivan report are those as follows:

1. Early phishing in AOL: Posing as an AOL staff member sending an instant message to a potential victim, phishers ask users to reveal passwords in order to "verify your account" or "confirm billing information. This way, hackers used phishing to obtain legitimate AOL accounts (1990).

2. PayPal: Users were redirecting to a fake site in an attempt to collect password details (2005).

3. MySpace: A computer worm altered links to redirect visitors to designed websites, stealing login details (2006).

4. Banamex: Despite all preventive phishing attacks through the use of OTP tokens (One-Time Passwords and keys for a single use), in 2006 phishers attacked the Banamex OTP token (named NetKey), using it as an excuse of the system itself, based on the token, to generate confusion among users and ask them to provide the passwords. This is not the first attack to this entity. (2006)

5. Banco Chile: A phishing email with the bank's logo: "During our regular maintenance and verification processes, we have detected an error in the information we have associated with your account." The mail content specifies some factors which could provoke the error and contains a phishing link at the bottom of the email. (2008)

6. Twitter: A phishing scam spreading quickly via direct message, "Hi, this you on here?," and providing a phishing link which can take your personal information and hijack accounts.(2009) (Frost and Sullivan, nd)

It is reported in a Symantec Blog article written by Antonio Forzieri (2008) that there are specific dilution strategies which are classified by the type of data provided to the phishing site:

(1) Random Data -- a large amount of random unformatted data is submitted. This strategy attempts to fill up the collection point, but has a drawback in that the fraudsters can easily identify fake data.

(2) Properly Formatted Data: a large amount of properly formatted data is submitted. This process avoids the drawback of the first dilution type, but still fills up the collection point.

(3) Tag Data: this time, the fake data submitted is indeed valid and accepted by the institution's website. The injection of this data allows financial institutions to more easily track criminals and gain additional forensic information. (Forzieri, 2008)

Frost and Sullivan report that there are several classifications of 'phishing' which include the following types of phishing:

1. Deceptive Phishing: It is the most common one. Consists of a deceptive email masquerading as a trusted company. The recipient clicks on the link contained in the message, unconsciously being readdressed to a fraudulent website.

2. Malware-Based Phishing: Refers to a variant of phishing attacks that involves the execution of malicious software on the user's computer. The user must perform some functions that allow the execution of the malware on the computer (open an attachment, visit a website and download a program, etc.).

3. Keyloggers / Screen loggers: Keyloggers are programs that record keystrokes when installed in the computer, with access to a registered website. Data are recorded by the program and sent to the phisher over Internet. Screen loggers have the same function, but capture screen images.

4. Session Hijacking: Describes the assault that occurs once the user has accessed any website registered by the software. These programs are often disguised as browser components.

5. Web Trojans: Program with pop-up screen appearance over legitimate web pages validations. The user might think he or she is entering details on a real website, while in reality it is being done in the malware.

6. System Reconfiguration Attacks:… READ MORE

Quoted Instructions for "Techniques of Computer Forensics for Preventing Email Phishing" Assignment:

CAPSTONE REPORT TOPIC: Techniques of Computer Forensics for Preventing Email Phishing

The Capstone Report should be a polished, high level undergraduate effort reflecting error free and carefully composed communications. . Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information AND ALL GRAPHICS MATERIALS USED, DOWNLOADED OR *****BORROWED***** in your report. ALL MATERIAL IN THIS REPORT MUST BE CITED PROPERLY.

The CAPSTONE Report Overview

This report will be conducted using only publicly available information (e.g., information obtainable on the Internet (using a browser), company reports, news reports, journal articles, etc.). Any information assurance risk an*****s should consider legitimate, known threats, which pertain to the subject organization, based on the research information gathered, the presumed process strengths and vulnerabilities or any organizational computing and networking infrastructure will be identified in depth.

Must use these sources in addition to at least 5 new scholarly sources:

Gajek, S. & Sadeghi, A. (2008). *****A forensic framework for tracing phishers.***** In The future of identity in the information society. Boston: Springer.

Jakobsson, M. & Myers, S. (2007). Phishing and countermeasures. New York: Wiley.

Lininger, R. & Vine, R. (2005). Phishing: cutting the identity theft line. New York: Wiley.

Lynch, J. (2005). *****Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks.***** Berkley technology law journal 20(259).

McRae, C.; McGrew, R. & Vaughn, R. (2006). *****Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams.***** Journal of digital forensic practice 1(3), pp. 193-9.

The CAPSTONE Report shall be graded on a 100 point criterion using the following items:

A. Clear statement of a detailed, specific scope to be analyzed and the appropriate coverage of that scope: (15 points) (INTRODUCTION AND PURPOSE)

B. In-depth, detailed technical content (depth and accuracy of information and analysis): (45 points) (BODY)

C. Recommendations for information assurance issues, possible risk mitigation, operational, network or computer processing of information improvements or other conclusions supported by research and analysis: (15 points) (CONCLUSION)

D. Clarity, organization, grammar and spelling: (10 points) (FORMAL LITERARY ENGLISH LANGUAGE SKILLS)

E. Proper use of APA Style: (10 points) (DEMONSTRATION OF RESEARCH ATTRIBUTION SKILLS)

CAPSTONE REPORT MUST INCLUDE:

1.Project scope proposal

2.Forensic Methodology, Requirements, Issues and Trends acquired by research.

3 An in-depth Computer Forensic topic area developing clear communication of methods, processes and procedures.

4. Solid documentation of materials to support topic selection

5. Communicated content

*****

How to Reference "Techniques of Computer Forensics for Preventing Email Phishing" Capstone Project in a Bibliography

Techniques of Computer Forensics for Preventing Email Phishing.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053. Accessed 3 Jul 2024.

Techniques of Computer Forensics for Preventing Email Phishing (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053
A1-TermPaper.com. (2010). Techniques of Computer Forensics for Preventing Email Phishing. [online] Available at: https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053 [Accessed 3 Jul, 2024].
”Techniques of Computer Forensics for Preventing Email Phishing” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053.
”Techniques of Computer Forensics for Preventing Email Phishing” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053.
[1] ”Techniques of Computer Forensics for Preventing Email Phishing”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053. [Accessed: 3-Jul-2024].
1. Techniques of Computer Forensics for Preventing Email Phishing [Internet]. A1-TermPaper.com. 2010 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053
1. Techniques of Computer Forensics for Preventing Email Phishing. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-forensics-preventing-email/6224053. Published 2010. Accessed July 3, 2024.

Related Projects:

Malware Since the Earliest Days of Humankind Term Paper

Paper Icon

Malware

Since the earliest days of humankind, inventions from the wheel to nanotechnology have been used and abused for unethical or illegal purposes. Why would it be any different for… read more

Term Paper 6 pages (1957 words) Sources: 1+ Topic: Computers / IT / Internet


Information System on Ethical and Moral Issues Research Paper

Paper Icon

Information System on Ethical and Moral issues in an E-Society within the Banking Sector in South Africa

Phishing is the practice of obtaining someone else's personal information for the purpose… read more

Research Paper 15 pages (6479 words) Sources: 25 Topic: Economics / Finance / Banking


Information Technology (IT) Risk Management Cyber Crime Research Paper

Paper Icon

it Risk Management -- Cyber Crime

Over the last several years, the issue of cyber crime has been increasingly brought to the forefront. This is because it is seen as… read more

Research Paper 15 pages (4384 words) Sources: 1+ Topic: Crime / Police / Criminal Justice


Cyber Crimes in Today's World Term Paper

Paper Icon

Cybercrime

Cyber theft is a major criminal issue surrounding the use of the Internet. Cybertheft is not just identity theft; it entails so much more. The most obvious, and easiest,… read more

Term Paper 8 pages (2933 words) Sources: 5 Topic: Crime / Police / Criminal Justice


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!