SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Running head: HOW TO AVOID INTERNET SCAMS AT THE
WORKPLACE 1
How to avoid internet scams at the workplace
Christophe Bassono
CIST3000: Advanced Composition IS&T
Amanda L. Gutierrez, M.S. & M.A.
UNO-Fall 2018
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
2
Online Fraud: How to Avoid Internet Scams in the Workplace
This section outlines how the researcher envisions presenting
the report. The outline
demonstrates the different sections in which the report will be
broken into and the
information that will be contained in each section
Introduction
Definition
Online fraud refers to deceitful schemes that are done using the
internet. Online fraud may
come in the form of financial theft, identity theft or a
combination of both.
History of Online Fraud
An influx of online fraud began to be experienced in the 1990s
with the increased technology
use and e-commerce. In the beginning, online fraud was done by
using the names of famous
celebrities of the time to commit internet crimes. Over time,
more technical and sophisticated
plans were developed such as creating card-generator
applications with real credit card
numbers, setting up dummy merchant websites and mass
identity theft. Today, despite
attempts by various governments to regulate and mitigate online
fraud, more sophisticated
online fraud schemes have been established ranging from credit
card fraud to phishing,
hacking, and identity theft (Saeger & Probert, 2015).
In the recent past, computer fraud has evolved through a series
of advancements outplaying
the traditional security defenses such as the two-factor
authentication, antivirus, and SSL
encryption in the process. Zeus and SpyEye are the most
common attack tools used by
hackers since they support the gathering of vast volumes of
extremely sensitive
authentication data. It has been established that no single
application is immune to attacks
and the malicious attackers are focusing more on online banking
accounts because they offer
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
3
most direct payoff. Online fraud is based on three core
technologies: the botnet controllers
capable of handling hundreds of thousands of bots, highly
effective data collection, and
sophisticated Trojans that are updateable.
Form grabbing for PCs running IE/Windows has been a
simplified approach for fraud. The
technique helps attackers to extract data within browsers. The
deployment of form grabbing
on compromised PCs allowed hackers to obtain numerous
numbers of online bank account
IDs and passwords. The password-based authentication was
termed no longer safe for online
banking prompting the introduction of two-factor authentication
(Mellinger, 2011).
Nevertheless, criminals still found the loophole that helps them
to challenge the security of
two-factor authentication through web injects. Malicious
attackers that promote online fraud
have created various techniques.
As a result, efforts to combat crimeware have been put into
place. Computer fraud
jeopardizes our security, privacy, and anonymity. There is the
need for cybercrime analysts to
find out the extent to which malware attacks and viruses have
affected our technologies to
ensure damage control (Mellinger, 2011). Moreover, they
should develop new approaches to
controlling the spreading of computer fraud in daily operations.
Besides, government
agencies need to increase their accountability by bankrolling an
anti-crimeware program and
detecting all forms of online fraud.
Numbers on Online Fraud
The numbers of online fraud have reached a record high as of
the year 2017. The top fraud of
2017 has been reported to online imposters with at least one in
every five people having been
duped by fraudsters. A whopping three hundred and twenty-
eight million has been lost
through this form of online fraud (Vaca, 2018). Identity theft
and credit card theft has also
been reported to be among the top forms of online fraud. Sixty-
three thousand people
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
4
reported tax fraud in 2017. In 2017, the total amount of money
lost to online fraudsters in the
United States was recorded as nine hundred million dollars, a
seven percent increase from the
amount lost in 2016. Cacciottolo and Rees (2017) report that in
the United Kingdom, over
three thousand eight hundred online dating fraud victims had
lost over thirty-nine million
dollars in 2016 to online fraudsters.
Recent studies have illustrated that cases of internet scam are
on the rise. These cases have
accounted to loss of more than $100 billion by companies and
individuals. Internet scammers
continue to develop diverse ways to blackmail or defraud
individuals without their
knowledge. Both professionals and non-professionals are
susceptible to online fraud and this
complicates the issue. According to the Scam Tracker by the
Better Bureau reports, computer
fraud has continued to escalate in the recent past with over
46,000 cases reported in 2007 in
the United States and more than 30,000 cases had been reported
by mid-August in 2018
(Wagner, 2018). The table below illustrates the growing cases
of internet fraud in the U.S.
(Wagner, 2018)
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
5
Types of Online Fraud and How They Occur
According to Rampton (2015), online payment fraud is
continuously growing. A significant
share of the fraudulent transactions emanates from mobile
commerce. E-commerce fraud also
referred to as purchase fraud happens when a fraudster
approaches an innocent party and
recommends a business transaction by application of fraudulent
means such as fake or stolen
credit card. In the process, the merchant is left unpaid during
the business transaction. Online
store owners are more exposed to online fraud. The continuing
advancement of technology
jeopardizes payment methods and the data processing systems in
most institutions. Often,
online fraud occurred when a credit card got lost or its
information was not stored securely,
but the card-not-present (CNP) frauds have continued to grow
recently.
Fraudulent orders have increased from 1.58% in 2017 to 1.8% in
2018 in terms of the
percentage of total revenue loss in online stores . The most
common types of e-commerce
fraud include friendly fraud and clean fraud.
The Friendly Fraud
The friendly fraud occurs when a client buys a product or pays
for some services with their
personal credit card, and issues a deliberate chargeback arguing
that the product or services
were never received or claims that they never made these
charges. Online business supports
friendly fraud as it allows customers to perform reverse
transactions (Bumbiere, 2018). In
most cases, chargebacks are allowed to safeguard clients from
online scams, but customers
have started taking advantage by using it in place of refunds.
The credit card companies
continue to suffer from the narrative that the customer is always
right as they place the
burden of proof on retailers during these dubious transactions.
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
6
Friendly Fraud can be prevented through various means. The
client must take responsibility
by ensuring that the credit card distributor matches the business
name. Most often, the
chargeback fraud takes place when customers fail to identify the
name of the company on
their card statements. Customers are advised to use shipping
with tracking since it makes it
easier to provide evidence where the products were delivered.
Moreover, it is vital to ensure
there are clear reshipping, return, and refunds policies before
making any transactions.
The Clean Fraud
The clean fraud takes place when a stolen credit card is used to
make a purchase. It needs a
high skill and expertise to happen. The clean fraud is regarded
as the ultimate doppelganger
since it appears like a genuine transaction with good billing,
shipping, and IP addresses
together with complete and verified card data (Bumbiere, 2018).
The clean fraud entails four
steps. First, the criminals obtain the cardholder information
through data breaches and card
skimming. Second, during the purchase, the fraudsters utilize
the card’s information by
impersonating the cardholder making online purchases. Thirdly,
believing the transaction is
legitimate; the merchant accepts the sale and processes
payment. Lastly, the merchant is
pressurized for chargebacks and lost merchandise when the
fraud is found out.
For small retailers, avoiding clean fraud will require regular
software updates since it can
bypass the fraud detection tools easily. Smaller retailers are
advised to use the free trial plans
of the fraud detection software during holidays from companies
such as Kount, Signifyd, and
Sift Science. Huge retailers have the resources required to
purchase the fraud detection
software, and they need to buy them even though they are
extremely pricey. Retailers must be
keen during any transactions, and this can help to detect some
of the cases.
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
7
Online fraud occurs in various ways. Some of these include
online intellectual property theft,
identity theft, phishing, untrustworthy websites, credit card
fraud, and hacking.
Online Intellectual Property Theft
Any author or creator of information has intellectual property
rights to their material, which
prohibits other users from using or publishing the material
without the owner’s consent.
Today, online fraudsters use this material on their own sites
without the owner’s permission.
This is called online intellectual theft.
Identity Theft
This occurs when a fraudster steals another person’s personal
information such as names,
address, birth-date, and account details and uses the stolen
information to create an identity
under which they hide when committing fraud.
Phishing
Phishing occurs through emails or websites whereby fraudsters
attempt to get personal data
such as credit card details, passwords and account details. The
fraudsters then use this
information unlawfully by defrauding the unsuspecting users
(Cassim, 2014).
Credit Card Fraud
This fraud occurs once a person enters their credit card details
on deceitful websites.
Fraudsters then use this information to make unlawful purchases
without the owner’s
permission
Hacking
This entails gaining illegal entry into a computer system. This
enables the hacker to steal
money or carry out other unlawful dealings without exposing
their actual identity.
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
8
Prevention of Online Fraud
Monitor and be conscious
People should use different passwords for their accounts and
choose long strong passwords,
which may not be hacked easily. Secondly, even though there
may be many legitimate sellers
online, one should be keen on whom they give their
information. Before clicking on any
links, one should make the habit of running a full scan with
their antivirus software.
Computer Software
Organizations may install security systems, firewalls, and
encryption that protect their client's
data from hackers (Cross & Kelly, 2016). Individuals may also
install antivirus applications
and passwords on their phones and personal computers. This
reveals that every individual
should be concerned about the security of their private
information and everyone has a role to
play towards prevention of online fraud.
Keep Financial Data Separate
Businesses and corporations should develop a culture that will
create a dedicated workstation
to conduct all financial activities. It is important to use
different computers to conduct non-
banking business. Before switching off the computers used for
the financial services, users
are advised to back up all sensitive information and even erase
the hard drive prior to
recycling it.
Know who is asking
Financial institutions such as banks do not send sensitive emails
or messages asking for
personal information such as social security numbers. These
institutions disapprove any
attempts to verify account information using this approach.
People should understand the
safety associated with not sharing personal information such as
account numbers, social
security or tax ID numbers, passwords or log in information
through email or text. An
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
9
individual can only share his/her sensitive information to a bank
through the bank’s secure
online banking platform. Any email that asks for sensitive
information is illegitimate and
people should verify its authenticity before replying or sending
personal details.
Protect your computer
Cyber-attacks have been on the rise recently. Installing
antivirus software, therefore, is
important to any computer or network. Users should regularly
update their software to
safeguard their computers from computer viruses. Software such
as anti-spam software aids
in preventing spam and junk email from entering into the inbox
of emails and this protect
against phishing emails. Besides, every computer should be
installed with a firewall as it
avoids unauthorized persons, viruses, or malware, from access.
The anti-spyware software,
nonetheless, blocks the spyware installation on your computer
thus redirecting malicious
websites or pop-ups.
Keep your passwords secret
Computers users should avoid sharing their passwords.
Additionally, always leave any
documents with financial data in a secure place. Changing
passwords on a regular basis help
to improve the protection and it is necessary to combine
numbers, letters, and special
characters. Administrators should change password and the
default SSID of the wireless
network on a regular basis.
Conclusion
Evidently, online fraud poses a big threat to organizations as
well as individuals. The vice has
caused businesses and individuals millions of dollars each year.
With increased internet
usage, fraudsters continue to device newer and more
sophisticated ways of committing online
fraud. It is, therefore, important for every individual to be more
aware of the various forms in
which online fraud may occur. This way, they are in a better
position to save themselves from
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
10
being victims of online fraud. Apart from increased
consciousness while using the internet
and monitoring where their personal information goes, it is also
important that organizations
invest in a current security system which is able to protect their
information from hackers and
fraudsters.
Business corporations should implement measures to prevent
the online fraud cases because
of the damages and losses that they can cause. As illustrated,
company can adhere to various
approaches such as installing the anti-virus software, adware
software, and anti-spyware for
protection. Nevertheless, firewall installation allows necessary
connections and protects
computers from viruses, malware, and hackers. Regular updates
of software help in
maintenance and increase the security of servers and the
computer infrastructure at large.
Businesses continue to develop measures to safeguard
themselves from online fraud and this
includes creating awareness to their employees and preventing
them from downloading
freeware or shareware from unfamiliar sources (Goldsmith,
2007). Failure to safeguard the
computers from malicious attacks can jeopardize the personal
information of clients and
destroy the reputation of companies. Businesses should create a
trustworthy environment if
they want to succeed both in the short-term and long-term.
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
11
References
Cacciottolo, M. & Rees, N. (2017). Online dating fraud victim
numbers at record high.
Retrieved from https://www.bbc.com/news/uk-38678089
Cassim, F. (2014). Addressing the specter of phishing: are
adequate measures in place to
protect victims of phishing? The Comparative and International
Law Journal of
Southern Africa, 47(3), 401-428.
Cross, C., & Kelly, M. (2016). The problem of "white noise":
examining current prevention
approaches to online fraud. Journal of Financial Crime, 23(4),
806-818.
Goldsmith, J. (2007). Who controls the Internet? Illusions of a
borderless world. Strategic
Direction, 23(11).
Mellinger, P. (2011, November 7). Crime and malware: A short
history of computer fraud.
Retrieved from
https://www.computerworlduk.com/security/crime-and-
malware-a-
short-history-of-computer-fraud-3316463/
Saeger, D. A., & Probert, C. (2015). Ponzi scheme: Learn to
detect scams and take care of
your money.
Vaca, M. (2018). The top frauds of 2017. Retrieved from
https://www.consumer.ftc.gov/blog/2018/03/top-frauds-2017
Wagner, P. (2018, August 14). Infographic: Internet Scamming
is on The Rise. Retrieved
from https://www.statista.com/chart/15069/number-of-internet-
scams-in-the-us/
Bumbiere, E. (2018, October 23). The Basics of Ecommerce
Fraud - What It Is and How To
Manage It | Blog - Printful. Retrieved from
https://www.printful.com/blog/the-basics-
of-ecommerce-fraud-what-is-it-and-how-to-manage-it/
Rampton, J. (2015, April 14). How Online Fraud is a Growing
Trend. Retrieved from
https://www.forbes.com/sites/johnrampton/2015/04/14/how-
online-fraud-is-a-
growing-trend/#c596a495f7f7
https://www.consumer.ftc.gov/blog/2018/03/top-frauds-2017
https://www.statista.com/chart/15069/number-of-internet-
scams-in-the-us/
HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE
12
DESIGNING REPORT
1
Christophe Bassono
Omaha, NE 68182-0694
21st September 2018.
Amanda L. Gutierrez,
Omaha, NE 68182-0694.
Dear Ms. Amanda Gutierrez,
SUBJECT: DRAFT REPORT FOR ONLINE FRAUD PROJECT
Please find attached my draft report for a project titled " Online
Fraud: How to Avoid Internet
Scams in the Workplace." The draft report is intended to
demonstrate the viability of the
project breaking it into smaller tasks that will provide a detailed
analysis on key topics on
regarding online fraud.
The draft report will be broken into three major parts. The first
section explains the history of
online fraud including the changes that have occurred with the
advancement of technologies.
The second part talks about the statistics on online fraud and
backs the numbers with a graph.
The third part illustrates the types of online fraud and how they
occur. The two major types of
online fraud includes the friendly fraud and the clean fraud.
Besides, other types of online
fraud entails include online intellectual property theft, identity
theft, phishing, untrustworthy
websites, credit card fraud, and hacking. The fourth section
discusses the approaches used to
DESIGNING REPORT
2
prevent computer fraud by both individuals and corporations.
The last section includes
references that have been cited in the draft report. We will be
using a style sheet characterizing the
different part of the draft , Time New Roman and size 12 will
be applied for better reading.
As detailed in the draft report, I believe that it is possible to
pursue the project and complete
it by the end of the semester.
Sincerely,
Christophe Bassono
DESIGNING REPORT
3
Style Sheet
(1) Font(s) Times New Roman, Font sizes 12 for the text
including headings
(2) Heading styles: Heading are unbold
(3) Colors: Black
(4) Margins: 0.5 gutter
(5) Headers and/or footers: Designing Report
(6) Page numbering: Right intended
(7) Any visual guides for the reader: Not used
DESIGNING REPORT
4
How to avoid internet scams at the workplace
CIST3000: Advanced Composition IS&T
Amanda L. Gutierrez, M.S. & M.A.
UNO-Fall 2018
Christophe Bassono
DESIGNING REPORT
5
Title Page
How to avoid internet scams at the workplace
Christophe Bassono
CIST3000:
Advanced Composition IS&T
Amanda L. Gutierrez, M.S. & M.A
UNO-Fall 2018
DESIGNING REPORT
6
Table of Content
Contents
1.
Introduction............................................................................
............................................................. 7
2. Definition
...............................................................................................
............................................. 7
3.
Introduction............................................................................
............... Error! Bookmark not defined.
4. Definition
..............................................................................................
Error! Bookmark not defined.
5. Numbers on Online Fraud
..................................................................... Error! Bookmark
not defined.
6. Types of Online Fraud and How They Occur
....................................... Error! Bookmark not defined.
6.1. The Friendly Fraud
.................................................................... Error! Bookmark
not defined.
6.2. The Clean Fraud
........................................................................ Error!
Bookmark not defined.
6.3. Online Intellectual Property Theft
............................................. Error! Bookmark not defined.
6.4. Identity Theft
............................................................................ Error!
Bookmark not defined.
6.5. Phishing
.................................................................................... Error!
Bookmark not defined.
6.6. Credit Card Fraud
...................................................................... Error!
Bookmark not defined.
6.7. Hacking
..................................................................................... Error!
Bookmark not defined.
7. Prevention of Online Fraud
............................................................... Error! Bookmark not
defined.
7.2. Keep Financial Data Separate
....................................................... Error! Bookmark not
defined.
7.3. Know who is asking
...................................................................... Error!
Bookmark not defined.
7.4. Protect your computer
................................................................... Error! Bookmark
not defined.
7.5. Keep your passwords secret
.......................................................... Error! Bookmark not
defined.
8. Conclusion
............................................................................................
Error! Bookmark not defined.
9.
References..............................................................................
............... Error! Bookmark not defined.
DESIGNING REPORT
7
First Page of the Report
1. Introduction
How to Avoid Internet Scams in the Workplace
Purpose
This section outlines how the researcher envisions presenting
the report. The
outline demonstrates the different sections in which the report
will be broken into and the
information that will be contained in each section.
2. Definition
Online fraud refers to deceitful schemes that are done using
the internet. Online fraud may
come in the form of financial theft, identity theft or a
combination of both.
History of Online Fraud
An influx of online fraud began to be experienced in the 1990s
with the increased technology use
and e-commerce. In the beginning, online fraud was done by
using the names of famous celebrities
of the time to commit internet crimes. Over time, more
technical and sophisticated plans were
developed such as creating card-generator applications with real
credit card numbers, setting up
dummy merchant websites and mass identity theft. Today,
despite attempts by various
governments to regulate and mitigate online fraud, more
sophisticated online fraud schemes have
been established ranging from credit card fraud to phishing,
hacking, and identity theft (Saeger &
Probert, 2015).
CIST 3000: Advanced Writing for IS&T
Specifications for Assignment 5: Design of Report
DUE DATE: Week 9/Monday, April 2nd
Cover Letter (15 Points), Style Sheet (20 Points), Sample Pages
(40)
75 Points TOTAL
OVERVIEW
In this fifth assignment, you will create a design for your
report. The lectures for Week 9 are critical to understanding
design elements and what is required for this deliverable. Please
review the lectures and read Chapters 12 and 13 before starting
on your design.
You will submit three documents: (1) a cover letter, (2) a style
sheet for the report format, and (3) sample pages that show
design elements for the report.
You may not use a Microsoft (or any other vendor) template for
your design. You must create your own design for this
assignment.
PART 1: COVER LETTER, STYLE SHEET, AND SAMPLE
PAGES
1.1 Write the cover letter
The cover letter should include the following:
(1) Introduction: Brief overview of design choices in general,
relating the choices to your target audience
(2) Body: Explanation of and reasons for specific design of the
cover and title page, font choices, colors, etc. and how it
connects to the content of the report
(3) Conclusion: Emphasize goal of design and expectations of
the recipient
Remember that a cover letter always needs an introduction, the
body of the content, and a conclusion. Leave the recipient with
a clear understanding of why you are presenting this
information and what you expect from the recipient.
Use the same format for the cover letter as you used for the
previous assignments. Incorporate all feedback you received on
prior cover letters.
1.2 Develop the style sheet
A style sheet is a type of specification for your report. It is a
listing of elements (not written in sentence form and not
requiring any discussion). The listing must identify each of the
following design elements. If you are not using one of the seven
design elements specified below, then list that element and say
why you will not be using it.
(1) Font(s) you will use, font sizes, and how each font will be
used (for example, whether for headings or captions)
(2) Heading styles (what they will look like and for which level
each will be used; show a minimum of three levels)
(3) Colors that you will use
(4) Margins
(5) Headers and/or footers
(6) Page numbering
(7) Any visual guides for the reader
A visual guide is a visual that you use to help orient the reader
in different parts of the report. One example of a visual guide is
the use of a specific graphic to visually identify a section. For
example, if you were discussing a telecommunications network
and you had a separate section for each component of the
network, you might have a single graphic that represented the
entire system and, for each section, you would highlight the
relevant component.
Visual guides may also be used to signal a definition. Visual
guides are especially useful in a presentation. Visual guides
may not be relevant for every report.
1.3 Develop the sample pages
The sample pages document should show a separate sample
design page for each one of the elements of the final report.
You do not need to provide any discussion of the sample pages.
Simply show each page. (The table of contents is likely to be
more than a single page.)
(1) Cover
(2) Title page
(3) Tentative table of contents for the report, showing actual
headings and sub-headings for the report in its most up-to-date
form
(4) Layout of the first page of a major section of the report (a
major section is the equivalent of a Roman numeral section or
the first page of what would be a chapter in a book)
(5) Layout of a typical text page (a page that is not the first
page of a section)
(6) Sample table on a typical text page
(7) Sample graph on a typical text page
For the sample table and graph, use data that is relevant to your
report subject and is likely to be included in your final report.
Cite the source for that data. You may not copy a finished table
or graph from another source; you must create your own.
For the table or graph, you may start with a template from your
word-processing software, but just changing a few things like a
line color or a word is not enough. Create your own design,
even if you use a default style as a starting point.
1.4 Submit written deliverables
Submit the cover letter and draft as a PDF file in the
Assignment 5 folder. Print TWO hard copies and bring to class
on the due date. Save the file as LastNameA5 prior to
submitting.
PART 2: PEER REVIEW
Review all cover letter and design postings and provide
comments on the quality and appeal of each design, using the
details from the grading rubric as your guide. Include any
questions, concerns, or suggestions you have about the design.
Usefulness of your comments and questions means more than
word count. Reviews and critiques should be constructive.
GRADING
The folder for Assignment 5 contains the grading rubric. The
dimensions are the same as previous rubrics, but the details in
the dimensions are different to reflect the different focus of this
assignment. Please review those details carefully so that you
have a good understanding of what it takes to succeed on this
assignment.

Contenu connexe

Similaire à Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET Journal
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx2021000444deepak
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 

Similaire à Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx (14)

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Research Article
Research ArticleResearch Article
Research Article
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Digital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic CrimeDigital ad fraud is a Major Economic Crime
Digital ad fraud is a Major Economic Crime
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 

Plus de wlynn1

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docxwlynn1
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxwlynn1
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxwlynn1
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxwlynn1
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docxwlynn1
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxwlynn1
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxwlynn1
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxwlynn1
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docxwlynn1
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docxwlynn1
 
Running head MALWARE .docx
Running head MALWARE                                             .docxRunning head MALWARE                                             .docx
Running head MALWARE .docxwlynn1
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docxwlynn1
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxwlynn1
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxwlynn1
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxwlynn1
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxwlynn1
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxwlynn1
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxwlynn1
 

Plus de wlynn1 (20)

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docx
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docx
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
 
Running head MALWARE .docx
Running head MALWARE                                             .docxRunning head MALWARE                                             .docx
Running head MALWARE .docx
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docx
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
 

Dernier

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 

Dernier (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 

Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx

  • 1. Running head: HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 How to avoid internet scams at the workplace Christophe Bassono CIST3000: Advanced Composition IS&T Amanda L. Gutierrez, M.S. & M.A. UNO-Fall 2018 HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 2 Online Fraud: How to Avoid Internet Scams in the Workplace This section outlines how the researcher envisions presenting
  • 2. the report. The outline demonstrates the different sections in which the report will be broken into and the information that will be contained in each section Introduction Definition Online fraud refers to deceitful schemes that are done using the internet. Online fraud may come in the form of financial theft, identity theft or a combination of both. History of Online Fraud An influx of online fraud began to be experienced in the 1990s with the increased technology use and e-commerce. In the beginning, online fraud was done by using the names of famous celebrities of the time to commit internet crimes. Over time, more technical and sophisticated plans were developed such as creating card-generator applications with real credit card numbers, setting up dummy merchant websites and mass identity theft. Today, despite attempts by various governments to regulate and mitigate online fraud, more sophisticated
  • 3. online fraud schemes have been established ranging from credit card fraud to phishing, hacking, and identity theft (Saeger & Probert, 2015). In the recent past, computer fraud has evolved through a series of advancements outplaying the traditional security defenses such as the two-factor authentication, antivirus, and SSL encryption in the process. Zeus and SpyEye are the most common attack tools used by hackers since they support the gathering of vast volumes of extremely sensitive authentication data. It has been established that no single application is immune to attacks and the malicious attackers are focusing more on online banking accounts because they offer HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 3 most direct payoff. Online fraud is based on three core technologies: the botnet controllers capable of handling hundreds of thousands of bots, highly effective data collection, and
  • 4. sophisticated Trojans that are updateable. Form grabbing for PCs running IE/Windows has been a simplified approach for fraud. The technique helps attackers to extract data within browsers. The deployment of form grabbing on compromised PCs allowed hackers to obtain numerous numbers of online bank account IDs and passwords. The password-based authentication was termed no longer safe for online banking prompting the introduction of two-factor authentication (Mellinger, 2011). Nevertheless, criminals still found the loophole that helps them to challenge the security of two-factor authentication through web injects. Malicious attackers that promote online fraud have created various techniques. As a result, efforts to combat crimeware have been put into place. Computer fraud jeopardizes our security, privacy, and anonymity. There is the need for cybercrime analysts to find out the extent to which malware attacks and viruses have affected our technologies to ensure damage control (Mellinger, 2011). Moreover, they should develop new approaches to
  • 5. controlling the spreading of computer fraud in daily operations. Besides, government agencies need to increase their accountability by bankrolling an anti-crimeware program and detecting all forms of online fraud. Numbers on Online Fraud The numbers of online fraud have reached a record high as of the year 2017. The top fraud of 2017 has been reported to online imposters with at least one in every five people having been duped by fraudsters. A whopping three hundred and twenty- eight million has been lost through this form of online fraud (Vaca, 2018). Identity theft and credit card theft has also been reported to be among the top forms of online fraud. Sixty- three thousand people HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 4 reported tax fraud in 2017. In 2017, the total amount of money lost to online fraudsters in the United States was recorded as nine hundred million dollars, a
  • 6. seven percent increase from the amount lost in 2016. Cacciottolo and Rees (2017) report that in the United Kingdom, over three thousand eight hundred online dating fraud victims had lost over thirty-nine million dollars in 2016 to online fraudsters. Recent studies have illustrated that cases of internet scam are on the rise. These cases have accounted to loss of more than $100 billion by companies and individuals. Internet scammers continue to develop diverse ways to blackmail or defraud individuals without their knowledge. Both professionals and non-professionals are susceptible to online fraud and this complicates the issue. According to the Scam Tracker by the Better Bureau reports, computer fraud has continued to escalate in the recent past with over 46,000 cases reported in 2007 in the United States and more than 30,000 cases had been reported by mid-August in 2018 (Wagner, 2018). The table below illustrates the growing cases of internet fraud in the U.S.
  • 7. (Wagner, 2018) HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 5 Types of Online Fraud and How They Occur According to Rampton (2015), online payment fraud is continuously growing. A significant share of the fraudulent transactions emanates from mobile commerce. E-commerce fraud also referred to as purchase fraud happens when a fraudster approaches an innocent party and recommends a business transaction by application of fraudulent means such as fake or stolen credit card. In the process, the merchant is left unpaid during the business transaction. Online store owners are more exposed to online fraud. The continuing advancement of technology jeopardizes payment methods and the data processing systems in most institutions. Often, online fraud occurred when a credit card got lost or its information was not stored securely,
  • 8. but the card-not-present (CNP) frauds have continued to grow recently. Fraudulent orders have increased from 1.58% in 2017 to 1.8% in 2018 in terms of the percentage of total revenue loss in online stores . The most common types of e-commerce fraud include friendly fraud and clean fraud. The Friendly Fraud The friendly fraud occurs when a client buys a product or pays for some services with their personal credit card, and issues a deliberate chargeback arguing that the product or services were never received or claims that they never made these charges. Online business supports friendly fraud as it allows customers to perform reverse transactions (Bumbiere, 2018). In most cases, chargebacks are allowed to safeguard clients from online scams, but customers have started taking advantage by using it in place of refunds. The credit card companies continue to suffer from the narrative that the customer is always right as they place the burden of proof on retailers during these dubious transactions.
  • 9. HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 6 Friendly Fraud can be prevented through various means. The client must take responsibility by ensuring that the credit card distributor matches the business name. Most often, the chargeback fraud takes place when customers fail to identify the name of the company on their card statements. Customers are advised to use shipping with tracking since it makes it easier to provide evidence where the products were delivered. Moreover, it is vital to ensure there are clear reshipping, return, and refunds policies before making any transactions. The Clean Fraud The clean fraud takes place when a stolen credit card is used to make a purchase. It needs a high skill and expertise to happen. The clean fraud is regarded as the ultimate doppelganger since it appears like a genuine transaction with good billing, shipping, and IP addresses together with complete and verified card data (Bumbiere, 2018).
  • 10. The clean fraud entails four steps. First, the criminals obtain the cardholder information through data breaches and card skimming. Second, during the purchase, the fraudsters utilize the card’s information by impersonating the cardholder making online purchases. Thirdly, believing the transaction is legitimate; the merchant accepts the sale and processes payment. Lastly, the merchant is pressurized for chargebacks and lost merchandise when the fraud is found out. For small retailers, avoiding clean fraud will require regular software updates since it can bypass the fraud detection tools easily. Smaller retailers are advised to use the free trial plans of the fraud detection software during holidays from companies such as Kount, Signifyd, and Sift Science. Huge retailers have the resources required to purchase the fraud detection software, and they need to buy them even though they are extremely pricey. Retailers must be keen during any transactions, and this can help to detect some of the cases.
  • 11. HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 7 Online fraud occurs in various ways. Some of these include online intellectual property theft, identity theft, phishing, untrustworthy websites, credit card fraud, and hacking. Online Intellectual Property Theft Any author or creator of information has intellectual property rights to their material, which prohibits other users from using or publishing the material without the owner’s consent. Today, online fraudsters use this material on their own sites without the owner’s permission. This is called online intellectual theft. Identity Theft This occurs when a fraudster steals another person’s personal information such as names, address, birth-date, and account details and uses the stolen information to create an identity under which they hide when committing fraud. Phishing
  • 12. Phishing occurs through emails or websites whereby fraudsters attempt to get personal data such as credit card details, passwords and account details. The fraudsters then use this information unlawfully by defrauding the unsuspecting users (Cassim, 2014). Credit Card Fraud This fraud occurs once a person enters their credit card details on deceitful websites. Fraudsters then use this information to make unlawful purchases without the owner’s permission Hacking This entails gaining illegal entry into a computer system. This enables the hacker to steal money or carry out other unlawful dealings without exposing their actual identity. HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 8 Prevention of Online Fraud Monitor and be conscious
  • 13. People should use different passwords for their accounts and choose long strong passwords, which may not be hacked easily. Secondly, even though there may be many legitimate sellers online, one should be keen on whom they give their information. Before clicking on any links, one should make the habit of running a full scan with their antivirus software. Computer Software Organizations may install security systems, firewalls, and encryption that protect their client's data from hackers (Cross & Kelly, 2016). Individuals may also install antivirus applications and passwords on their phones and personal computers. This reveals that every individual should be concerned about the security of their private information and everyone has a role to play towards prevention of online fraud. Keep Financial Data Separate Businesses and corporations should develop a culture that will create a dedicated workstation to conduct all financial activities. It is important to use different computers to conduct non-
  • 14. banking business. Before switching off the computers used for the financial services, users are advised to back up all sensitive information and even erase the hard drive prior to recycling it. Know who is asking Financial institutions such as banks do not send sensitive emails or messages asking for personal information such as social security numbers. These institutions disapprove any attempts to verify account information using this approach. People should understand the safety associated with not sharing personal information such as account numbers, social security or tax ID numbers, passwords or log in information through email or text. An HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 9 individual can only share his/her sensitive information to a bank through the bank’s secure online banking platform. Any email that asks for sensitive
  • 15. information is illegitimate and people should verify its authenticity before replying or sending personal details. Protect your computer Cyber-attacks have been on the rise recently. Installing antivirus software, therefore, is important to any computer or network. Users should regularly update their software to safeguard their computers from computer viruses. Software such as anti-spam software aids in preventing spam and junk email from entering into the inbox of emails and this protect against phishing emails. Besides, every computer should be installed with a firewall as it avoids unauthorized persons, viruses, or malware, from access. The anti-spyware software, nonetheless, blocks the spyware installation on your computer thus redirecting malicious websites or pop-ups. Keep your passwords secret Computers users should avoid sharing their passwords. Additionally, always leave any documents with financial data in a secure place. Changing
  • 16. passwords on a regular basis help to improve the protection and it is necessary to combine numbers, letters, and special characters. Administrators should change password and the default SSID of the wireless network on a regular basis. Conclusion Evidently, online fraud poses a big threat to organizations as well as individuals. The vice has caused businesses and individuals millions of dollars each year. With increased internet usage, fraudsters continue to device newer and more sophisticated ways of committing online fraud. It is, therefore, important for every individual to be more aware of the various forms in which online fraud may occur. This way, they are in a better position to save themselves from HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 10 being victims of online fraud. Apart from increased consciousness while using the internet
  • 17. and monitoring where their personal information goes, it is also important that organizations invest in a current security system which is able to protect their information from hackers and fraudsters. Business corporations should implement measures to prevent the online fraud cases because of the damages and losses that they can cause. As illustrated, company can adhere to various approaches such as installing the anti-virus software, adware software, and anti-spyware for protection. Nevertheless, firewall installation allows necessary connections and protects computers from viruses, malware, and hackers. Regular updates of software help in maintenance and increase the security of servers and the computer infrastructure at large. Businesses continue to develop measures to safeguard themselves from online fraud and this includes creating awareness to their employees and preventing them from downloading freeware or shareware from unfamiliar sources (Goldsmith, 2007). Failure to safeguard the computers from malicious attacks can jeopardize the personal
  • 18. information of clients and destroy the reputation of companies. Businesses should create a trustworthy environment if they want to succeed both in the short-term and long-term. HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 11 References Cacciottolo, M. & Rees, N. (2017). Online dating fraud victim numbers at record high. Retrieved from https://www.bbc.com/news/uk-38678089 Cassim, F. (2014). Addressing the specter of phishing: are adequate measures in place to protect victims of phishing? The Comparative and International Law Journal of Southern Africa, 47(3), 401-428. Cross, C., & Kelly, M. (2016). The problem of "white noise": examining current prevention approaches to online fraud. Journal of Financial Crime, 23(4), 806-818.
  • 19. Goldsmith, J. (2007). Who controls the Internet? Illusions of a borderless world. Strategic Direction, 23(11). Mellinger, P. (2011, November 7). Crime and malware: A short history of computer fraud. Retrieved from https://www.computerworlduk.com/security/crime-and- malware-a- short-history-of-computer-fraud-3316463/ Saeger, D. A., & Probert, C. (2015). Ponzi scheme: Learn to detect scams and take care of your money. Vaca, M. (2018). The top frauds of 2017. Retrieved from https://www.consumer.ftc.gov/blog/2018/03/top-frauds-2017 Wagner, P. (2018, August 14). Infographic: Internet Scamming is on The Rise. Retrieved from https://www.statista.com/chart/15069/number-of-internet- scams-in-the-us/ Bumbiere, E. (2018, October 23). The Basics of Ecommerce Fraud - What It Is and How To Manage It | Blog - Printful. Retrieved from https://www.printful.com/blog/the-basics- of-ecommerce-fraud-what-is-it-and-how-to-manage-it/
  • 20. Rampton, J. (2015, April 14). How Online Fraud is a Growing Trend. Retrieved from https://www.forbes.com/sites/johnrampton/2015/04/14/how- online-fraud-is-a- growing-trend/#c596a495f7f7 https://www.consumer.ftc.gov/blog/2018/03/top-frauds-2017 https://www.statista.com/chart/15069/number-of-internet- scams-in-the-us/ HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 12 DESIGNING REPORT 1 Christophe Bassono Omaha, NE 68182-0694 21st September 2018. Amanda L. Gutierrez,
  • 21. Omaha, NE 68182-0694. Dear Ms. Amanda Gutierrez, SUBJECT: DRAFT REPORT FOR ONLINE FRAUD PROJECT Please find attached my draft report for a project titled " Online Fraud: How to Avoid Internet Scams in the Workplace." The draft report is intended to demonstrate the viability of the project breaking it into smaller tasks that will provide a detailed analysis on key topics on regarding online fraud. The draft report will be broken into three major parts. The first section explains the history of online fraud including the changes that have occurred with the advancement of technologies. The second part talks about the statistics on online fraud and backs the numbers with a graph. The third part illustrates the types of online fraud and how they occur. The two major types of online fraud includes the friendly fraud and the clean fraud. Besides, other types of online fraud entails include online intellectual property theft, identity theft, phishing, untrustworthy websites, credit card fraud, and hacking. The fourth section
  • 22. discusses the approaches used to DESIGNING REPORT 2 prevent computer fraud by both individuals and corporations. The last section includes references that have been cited in the draft report. We will be using a style sheet characterizing the different part of the draft , Time New Roman and size 12 will be applied for better reading. As detailed in the draft report, I believe that it is possible to pursue the project and complete it by the end of the semester. Sincerely, Christophe Bassono
  • 23. DESIGNING REPORT 3 Style Sheet (1) Font(s) Times New Roman, Font sizes 12 for the text including headings (2) Heading styles: Heading are unbold (3) Colors: Black (4) Margins: 0.5 gutter (5) Headers and/or footers: Designing Report (6) Page numbering: Right intended (7) Any visual guides for the reader: Not used
  • 24. DESIGNING REPORT 4 How to avoid internet scams at the workplace CIST3000: Advanced Composition IS&T Amanda L. Gutierrez, M.S. & M.A. UNO-Fall 2018 Christophe Bassono DESIGNING REPORT 5
  • 25. Title Page How to avoid internet scams at the workplace Christophe Bassono CIST3000: Advanced Composition IS&T Amanda L. Gutierrez, M.S. & M.A UNO-Fall 2018 DESIGNING REPORT 6 Table of Content
  • 26. Contents 1. Introduction............................................................................ ............................................................. 7 2. Definition ............................................................................................... ............................................. 7 3. Introduction............................................................................ ............... Error! Bookmark not defined. 4. Definition .............................................................................................. Error! Bookmark not defined. 5. Numbers on Online Fraud ..................................................................... Error! Bookmark not defined. 6. Types of Online Fraud and How They Occur ....................................... Error! Bookmark not defined. 6.1. The Friendly Fraud .................................................................... Error! Bookmark not defined. 6.2. The Clean Fraud ........................................................................ Error! Bookmark not defined. 6.3. Online Intellectual Property Theft ............................................. Error! Bookmark not defined.
  • 27. 6.4. Identity Theft ............................................................................ Error! Bookmark not defined. 6.5. Phishing .................................................................................... Error! Bookmark not defined. 6.6. Credit Card Fraud ...................................................................... Error! Bookmark not defined. 6.7. Hacking ..................................................................................... Error! Bookmark not defined. 7. Prevention of Online Fraud ............................................................... Error! Bookmark not defined. 7.2. Keep Financial Data Separate ....................................................... Error! Bookmark not defined. 7.3. Know who is asking ...................................................................... Error! Bookmark not defined. 7.4. Protect your computer ................................................................... Error! Bookmark not defined. 7.5. Keep your passwords secret .......................................................... Error! Bookmark not defined.
  • 28. 8. Conclusion ............................................................................................ Error! Bookmark not defined. 9. References.............................................................................. ............... Error! Bookmark not defined. DESIGNING REPORT 7 First Page of the Report 1. Introduction How to Avoid Internet Scams in the Workplace Purpose This section outlines how the researcher envisions presenting the report. The outline demonstrates the different sections in which the report will be broken into and the
  • 29. information that will be contained in each section. 2. Definition Online fraud refers to deceitful schemes that are done using the internet. Online fraud may come in the form of financial theft, identity theft or a combination of both. History of Online Fraud An influx of online fraud began to be experienced in the 1990s with the increased technology use and e-commerce. In the beginning, online fraud was done by using the names of famous celebrities of the time to commit internet crimes. Over time, more technical and sophisticated plans were developed such as creating card-generator applications with real credit card numbers, setting up dummy merchant websites and mass identity theft. Today, despite attempts by various governments to regulate and mitigate online fraud, more sophisticated online fraud schemes have been established ranging from credit card fraud to phishing, hacking, and identity theft (Saeger & Probert, 2015).
  • 30. CIST 3000: Advanced Writing for IS&T Specifications for Assignment 5: Design of Report DUE DATE: Week 9/Monday, April 2nd Cover Letter (15 Points), Style Sheet (20 Points), Sample Pages (40) 75 Points TOTAL OVERVIEW In this fifth assignment, you will create a design for your report. The lectures for Week 9 are critical to understanding design elements and what is required for this deliverable. Please review the lectures and read Chapters 12 and 13 before starting on your design. You will submit three documents: (1) a cover letter, (2) a style sheet for the report format, and (3) sample pages that show design elements for the report. You may not use a Microsoft (or any other vendor) template for your design. You must create your own design for this assignment. PART 1: COVER LETTER, STYLE SHEET, AND SAMPLE PAGES 1.1 Write the cover letter The cover letter should include the following: (1) Introduction: Brief overview of design choices in general, relating the choices to your target audience (2) Body: Explanation of and reasons for specific design of the cover and title page, font choices, colors, etc. and how it connects to the content of the report (3) Conclusion: Emphasize goal of design and expectations of
  • 31. the recipient Remember that a cover letter always needs an introduction, the body of the content, and a conclusion. Leave the recipient with a clear understanding of why you are presenting this information and what you expect from the recipient. Use the same format for the cover letter as you used for the previous assignments. Incorporate all feedback you received on prior cover letters. 1.2 Develop the style sheet A style sheet is a type of specification for your report. It is a listing of elements (not written in sentence form and not requiring any discussion). The listing must identify each of the following design elements. If you are not using one of the seven design elements specified below, then list that element and say why you will not be using it. (1) Font(s) you will use, font sizes, and how each font will be used (for example, whether for headings or captions) (2) Heading styles (what they will look like and for which level each will be used; show a minimum of three levels) (3) Colors that you will use (4) Margins (5) Headers and/or footers (6) Page numbering (7) Any visual guides for the reader A visual guide is a visual that you use to help orient the reader in different parts of the report. One example of a visual guide is the use of a specific graphic to visually identify a section. For example, if you were discussing a telecommunications network and you had a separate section for each component of the network, you might have a single graphic that represented the
  • 32. entire system and, for each section, you would highlight the relevant component. Visual guides may also be used to signal a definition. Visual guides are especially useful in a presentation. Visual guides may not be relevant for every report. 1.3 Develop the sample pages The sample pages document should show a separate sample design page for each one of the elements of the final report. You do not need to provide any discussion of the sample pages. Simply show each page. (The table of contents is likely to be more than a single page.) (1) Cover (2) Title page (3) Tentative table of contents for the report, showing actual headings and sub-headings for the report in its most up-to-date form (4) Layout of the first page of a major section of the report (a major section is the equivalent of a Roman numeral section or the first page of what would be a chapter in a book) (5) Layout of a typical text page (a page that is not the first page of a section) (6) Sample table on a typical text page (7) Sample graph on a typical text page For the sample table and graph, use data that is relevant to your report subject and is likely to be included in your final report. Cite the source for that data. You may not copy a finished table or graph from another source; you must create your own. For the table or graph, you may start with a template from your word-processing software, but just changing a few things like a line color or a word is not enough. Create your own design, even if you use a default style as a starting point.
  • 33. 1.4 Submit written deliverables Submit the cover letter and draft as a PDF file in the Assignment 5 folder. Print TWO hard copies and bring to class on the due date. Save the file as LastNameA5 prior to submitting. PART 2: PEER REVIEW Review all cover letter and design postings and provide comments on the quality and appeal of each design, using the details from the grading rubric as your guide. Include any questions, concerns, or suggestions you have about the design. Usefulness of your comments and questions means more than word count. Reviews and critiques should be constructive. GRADING The folder for Assignment 5 contains the grading rubric. The dimensions are the same as previous rubrics, but the details in the dimensions are different to reflect the different focus of this assignment. Please review those details carefully so that you have a good understanding of what it takes to succeed on this assignment.