Malicious tries to steal personal information. The email

Malicious programs can be delivered physically to a system
through a link, gif, emails, USB drive or other means. Malware can often spread
via the internet through drive-by downloads, which automatically download
malicious programs to users’ systems without their approval or knowledge. These
programs perform functions such as stealing user’s credential or personal
information, altering sensitive data, hijacking core computing functions and
monitoring user’s web browsing keystrokes without permission. The malware will
then be capable of spying user’s habits, keystroke habits, hijacking browser to
web pages to phish for their personal information. Advanced malware is
used to commit financial fraud and extort money from computer users. 4

 

Spam

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Spam are unsolicited bulk email that are being sent out by cybercriminals.
Spam email message usually filled with bank emergency, commercial advertising, weight
loss product or security software content which people believes that it is an
issue that is needed to be solved, therefore users will click on the link or attachment.
Once the user opens the email, a malicious software will be downloaded without
the user knowing. Thus, spams will be stealing user’s personal information.
This threats usually affects individuals who are naive, which lead the user falling
into that trap. 2 5

 

Phishing

Phishing is a form of social engineering that tries to
steal personal information. The email will try to imitate organisation such as
banks as it is trustworthy and have login credentials. Therefore, people will
not hesitate to follow the instruction written in the email such as clicking
certain links that lead to an “official” website that is fake site operated by
attacker. Although many phishing emails are poorly forged and quite fake,
cybercriminal groups increasingly use the same techniques professional
marketers use to identify the most effective types of messages. Some phishing
scams use JavaScript to place a picture of a legitimate URL over a browser’s
address bar. The URL revealed by hovering over an embedded link can also be
changed. Phishing campaigns are often built around major events, holidays and
anniversaries, or take advantage of breaking news stories, both true and
fictitious. Email phishing threats affects individuals and a group of people
from a company such as the bosses, employees and the administrator who the
cybercriminals believe that personal confidential information can be gathered. 6

 

 

c. Mitigation of Threat:

 

Malware

Malware can be prevented and avoided by practicing safe
internet browsing. Users should be careful from accessing to suspicious
websites by ensuring that it is verified as safe and secure. Users should also read
emails with eagle’s eyes, scanning thru emails in the subjects and removing
those emails that don’t seem legit. These emails might contain attachments that
might lead to downloading of malware into your device without knowing. Hence, users
should download security scanning programs that helps user to auto run a scan
or a check of their browser and run regular anti-virus scans. 7

 

Spam

There are many spam emails that can be sent out or received
daily. So, the trick to not opening such emails is that to check the subject
line of the email. The subject line if it is some “too good to be true” title,
you can forget about opening it. Check the emails for some spelling or grammar mistakes,
because an authentic organization would have their editors run a
spell check or proofread their marketing newsletters before they send them out.
So always examine the message for any misspellings and poor grammar before
accepting it as valid. 8

 

Phishing

In order not to be a victim of phishing, user should not
access to bank websites that are directed from links through email. And for some
legitimate urgent cases from banks or workplace, to be safe, users can call up
to verify such personal information before keying in sensitive information. Do
not click on hyperlinks or links that are attached in the email, because it
might direct you to a malicious website. For a site to be ‘safe’, it must begin
with ‘https://’ and your browser should show an icon of a closed lock. 9