Internet Fraud Casebook NEW by Joseph T. Wells

internet fraud eBay auctions you should keep an eye on:

[wprebay kw=”internet+fraud” num=”0″ ebcat=”-1″]
[wprebay kw=”internet+fraud” num=”1″ ebcat=”-1″]
[wprebay kw=”internet+fraud” num=”2″ ebcat=”-1″]

Internet Fraud Has Risen 33%

Internet Fraud Has Risen 33%

nternet is an excellent invention by the modern science. It is not necessary to explain newly the contribution of Internet. But devil is always behind of all good thins. Internet is not free from that. So it is important to all Internet users that they should be alert against this fraud dealings in Internet.

Recently the IC3 has disclosed the record of 2008 about Internet Fraud. This rate is 33% higher than previous year. According their report Columbia is in top position about fraud dealings then Nevada and Washington.

FBI got different type of complaints. Non-delivery complaint 32.9%, auction fraud 25.5%, Credit card fraud 9%, Confidence fraud 6.2%, Nigerian lottery fraud 2.8%.

The total dollar loss from all 72,940 cases of fraud referred to federal, state and local law enforcement was 6.6 million, with a median dollar loss of 1 per complaint — up from 9.1 million in total reported losses in 2007.

Most of the fraud has occurred by email scam. The scammer send email to the client to send detail information including Full name, address, credit card number etc.

Nigerian lottery scam send that you have won a big amount of money from UK lottery. To get your money you they will ask you to send some processing fee to transfer your money to your account.

“Recipients are told that if they do not comply with the FBI’s request for information, they will be prosecuted or suffer some other financial penalty,” the IC3 report concludes. “In some cases, recipients are led to believe that they will become the subject of a terrorist investigation if they fail to cooperate.”

How to protect yourself from lottery or any other greedy offers? If any email comes about your lottery winning news simply avoid it and send a complain to IC3 office. Mark the email number as a spam message and filter it with auto deletion option.

Internet Fraud is a growing concern among the Internet users. The best way to protect it do not believe anything easily and do not be too greedy. Try to read IC3 report sometimes and latest news about Internet fraud.

How FBI can help? FBI should publish this kind of Internet fraud news to the daily newspaper, they can declare it through TV and Radio channel. They can request all countries Government to follow the same method to protect Internet fraud in their respective countries.

Search Engines like Google, Yahoo, MSN, AOL can also help the Internet users from Internet fraud. They can send email alert about Internet fraud to all of its free email clients and warn those private server owners where from these fraudulence message come.

Finally Internet users should make transaction only with trusted, big size and old online shop such as amazon, buy.com  etc. You can buy many products from those shop including computer, notebook, laptop, phone, mobile games etc. Another think you should remember that do not follow the cheap price only. Before purchasing you should check the company’s age, record, faithfulness etc. Read more

More News From Abdul Halim


Article from articlesbase.com

Find More Internet Fraud Articles

DIACAP Essentials + IA Control Validation Training (part 2): DIACAP/AFCAP Day1

DIACAP/AFCAP Day 1.
This is the second installment of the DIACAP Essentials journal.

In the first day of class we’ve taken a high level look at the big picture of the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP) and Air Force Certification & Accreditation Program (AFCAP). It is a very valuable tool for a beginner.

Since I’ve gone through the entire process (with a legacy system) more than once through all the growing pains of Air Force C&A from DITSCAP to DIACAP, I found that I knew about 90% of everything taught. I don’t mind having a refresher, though and quite frankly, I need the CPE’s for my CISSP :).

There were a couple of golden nuggets that I’ve been able to get out of some of the old timers. I learned some interesting things about how the Navy, Marines and Army do things.
Navy (as weird as their dumb ass rank system.. yep, I said it.. its dumb) have like three systems: DITPR-DON, DA-DUMB and some other BS, Marines have something called Exacta and the Army has APMS (Army Profile Management System). Also learned cool off topic stuff like history of eMass.

I must admit I’m looking forward to day two.
pros of day 1: Good solid start on basics GREAT for beginners. SecureInfo gets mad props for have a great instructor John M.(don’t know if he wants his full name published.. but he’s highly, highly knowledgeable and very positive).

cons of day 1: Right off the bat I am noticing a huge hole in the training… a lack of in depth teaching of EITDR, which is how the Air Force implements, manages and maintains the entire DIACAP/AFCAP process. I don’t really see how you can teach one without the other these days. I guess contractually, SecureInfo can not touch it since some other company has the contract. But unfortunately, the folks that are new to this are going to suffer. Because if they goto this class without knowing the EITDR they will know why but now how, and if they go to the EITDR class without knowing the DIACAP they will know how but not Why.

Obama and McCain Differ on Net Neutrality – Internet Policy

If your an Internet geek like me, this issue will have a great influence on your vote.

“It wasn’t a contentious topic at last night’s presidential debate, but network neutrality is the hot-button issue on the mind of PM’s senior tech editor. He explores the candidates’ stands on the issue in a Geek the Vote edition of his biweekly trends column.” – digg via PopMech (link below)

Obama’s view on Net Neutrality:
Protect the Openness of the Internet: A key reason the Internet has been such a success is because it is the most open network in history. It needs to stay that way. Barack Obama strongly supports the principle of network neutrality to preserve the benefits of open competition on the Internet.

McCain’s view on Net Neutrality:
OOPS! – the link doesn’t work.
The page cannot be found
The page you are looking for might have been removed, had its name changed, or is temporarily unavailable.
——————————————————————————–

The irony is that Obama’s likely win is probably specifically because of the Internet. His teams organizational skills on the ‘Net have been unparalelled. The only other guy who came close to his fame on ‘Net is Ron Paul.

read more | digg story

Challenges of Internet Security

The primary challenges of Internet security have everything to do with balancing accessibility and functionality with the three pillars of information security: confidentiality, integrity and availability.

The Internet has become an in disposable tool for research, commerce, art, education and virtually every part of modern life. It was the inquisitive, intelligent, intuitive and creative nature of humanity that created the Internet and its those same qualities that put individual systems linked directly to the Internet in peril. The three pillars of information security are at stake for all systems with connectivity to the Internet. The challenge is in the implementation of the necessary security controls to achieve those three pillars.

Confidentiality:

Confidentiality pertains to protecting sensitive information. Sensitive information can be anything from private user information to classified defense data. Many organization live and die by the protection of proprietary information from competitors. During wartime, the armed services literally LIVE or DIE based on how well certain sensitive information is guarded. In the US Department of Defense is called Operational Security. Since the Internet is a critical part of the DoD (and defense organizations around the world) the confidentiality is a HUGE challenge for their Information systems exposed to the Internet. Some of the threats to there systems include: social engineering, leaks of information and accidental release of sensitive data. All of these threats can be enabled via the Internet.

Organizations must educate their user who have access to sensitive information. I’ve heard some security professionals say that educating users is bad.

But if your users have access to sensitive information (and need to have that access to do their jobs) it is imperative that they not only know WHAT is sensitive, but WHO it can be give to, WHEN it can be shared, HOW it can be share and WHY it can be shared.


Integrity:

Data integrity is very important to all systems passing data on the Internet. Integrity has to do with whether or not the message on the other end of your connection is the same one you actually sent. Whether its your passwords being passed to your bank or the DoD passing data over the Internet, the integrity of the data is imperative. Its often taken for granted until, we are sending an email and the receiver says they got the email but the message can’t be read. Sometimes if the messages integrity is garbled or malformed it simply won’t reach its destination. If the integrity of a message can not be protected in some way or verified and checked, it is possible for someone to intercept your message, alter it, and send it on its way. Integrity is especially critical in banking and financial transactions which is why encryption and authentication take on such an important role for sensitive transactions such as ATM withdrawals, and online banking.

The challenge to maintaining Internet integrity is to ensure that link is encrypted when necessary.


Availability:

If there is no availability there is no mission, no business, no functionality. One of the major challenges of Internet security has been Denial of Services attacks. A Denial of Service attack is when your system on the Internet (or within a network) is flooded with useless traffic such that no one else (not even you) can use it. With a misconfiguration, a denial of service can happen by accident. Its important to test the availability of an online system. Its also a good practice to see what kind of availability and access you are giving. After all, too much availability can compromise the security of your system.

Most challenges of Internet security can tie into one or more of the big three: confidentiality, confidentiality or availability. With those in mind most challenges can be overcome. But the double edged sword of security.. the very nature of it on the Internet is to constantly change and evolve with the Internet. The constant change of threats to those three aspects of security is perhaps the biggest over arching challenge.

Dangers on the Internet

Dangers on the Internet
This is a follow up to my post Why is Internet Safety Important

Dangers of the Internet are relative to the perspective of those accessing it. That is to say, on the Internet “dangers” are completely dependent on who is accessing what data from where and what their intentions are for accessing it. For example, researching a list of poisons could be a considered “dangers to the Internet” if a seriously disturbed person intends to kill his or her spouse. On the other hand, if a parent is just wondering what house hold products are poisonous with the intention of protecting her children, can that be considered a danger?

So protection from dangers on the Internet should be proactive and involve human judgment at some level. Policies must be written, planned and implemented in advanced or ad hoc to suit the environment and the users accessing the Internet. Children at a school with access from the classroom will more than likely be different from employees at a skating rink.

Even the items commonly considered dangers on the Internet relate directly to how much access individuals and organizations allow to and from the web. Common “dangers” may include (but should not be limited to) the following:

Accessibility to personal – applies to educating users on the dangers of putting personal information on the Internet and protecting organizational data bases

Sensitive data – For a school sensitive data is likely linked to the grades and personal information of staff and student, but for a business sensitive information could include proprietary information that would hurt the bottom line if it were leaked to competition.

Financial fraud & criminal hackers/scammers- This applies to educating users about criminal hacker techniques such as malware, social engineering, email and website phishing

The access of impressionable and/or psychologically disturbed individuals to potentially harmful and destructive information – This is rather subjective however it should be a concern to schools from elementary – colleges, rehabilitation facilities and mental institutions. There are ways to block certain obvious material with web-blocker type applications, but no one can stop them all. Monitoring is a must if this danger is to be handled seriously.

The risks and damage of these dangers are dependent on the environment & the users involved. It is up to the system owners to ensure that the policies are properly planned, implemented and maintained as exposure to any Internet danger can disrupt the safety, mission and/or values of an organization or individual.

Why is Internet Safety Important

Dangers on the Internet
The amazing freedom and availability of the Internet lends itself to a few major dangers: Pr0n, malware and how to perform illegal and/or dangerous activities.

Whether it is a curious person seeking these things out or the child accidentally clinking the wrong link and getting bombard with explicit pop-ups, the items lists can be harmful to an impressionable mind. Policies must be enforced.

There are a few groups that should have limited exposure to certain types of information on the Internet. Children, mentally handicapped or psychologically damaged people in settings such as schools, homes, rehabilitation or correctional facilities and group homes should be blocked, tracked and monitored while accessing the Internet. Certain information could destroy them if they don’t yet have the capacity to understand or put certain information in the proper context.


Protection from Pornography & Malware

In a professional setting there should be a written policy against accessing and/or downloading unacceptable material such as pornography. These items should be actively blocked whether in a working environment or at home among minors accessing the same system. Allowing impressionable or fragile minds unlimited access to certain graphic material is irresponsible. The law is also a good reason why Internet safety is important. If you are the owner or charged with immediate control of the system being used for illegal activity, you could be partially or wholly liable for the activity. An example is substitute teacher Julie Amero

On October 19, 2004, Julie Amero was substituting for a seventh-grade language class at Kelly Middle School in Norwich, Connecticut. The teacher’s computer was accessed by pupils while the regular teacher, Matthew Napp, was out of the room. When Julie took charge, the computer started showing pornographic images.

On January 5, 2007, Amero was convicted in Norwich Superior Court on four counts of risk of injury to a minor, or impairing the morals of a child. Her sentencing was delayed four times after her conviction, with both the prosecution and judge not satisfied that all aspects of the case had been assessed.[1] The felony charges for which she was originally convicted carry a maximum prison sentence of 40 years

– wikipedia

The Kelly Middle School systems were actually infected with malware that allowed the explicit pictures to pop up.

Access to Dangerous information

From the Columbine shooters to the Virginia Tech massacre, most of the killers had a recorded history of mental illness and/or psychologically instability. In many cases, they used public and/or home computers belonging to their parents to research bomb making or even purchase guns.

Controlling access is the best way to get on the Internet safely. Maintaining privacy of users is another important step in Internet safety, however that is a matter of educating users particularly if the frequent Social networks such as facebook or myspace. They need to be instructed about the dangers of stalkers, perverts and predators looking specifically for impressionable minds.

We are the keepers of these impressionable and fragile minds. That is the reason Internet safety is important and why we must be mindful of these subjects.

The ABCs of securing your wireless network

Introduction

Ars Technica’s original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and practical, because the number of devices with 802.11x support has greatly expanded since 2002. Wireless security is no longer the domain of geeks and system administrators, but is now an issue in the lives of everyday users, from the worker with a home office who wants to keep sensitive files secure to the homemaker who wants to avoid an RIAA lawsuit because the teen next door is a wireless-leeching P2P addict.

read more | digg story

Which Is Faster Wireless Router Or Wired Internet

Wireless Routers vs Wired Router
fig. 1, which is faster wireless router or wired internet

Overview: Routers, switches and hubs (1) (a.ka Internetworking devices) give you access to the Internet (2) via some sort of ISP device (broadband modem, DSL ect) (3). The speed onto the actual Internet depends on the service you have purchased with your local ISP (4). They are the gatekeepers (AT&T, Comcast, Verison, Local ISP ect). This usually creates a bit of a bottleneck because your local area network (LAN) is much faster than your connection to the actual Internet. You actual connection to the Internet is controlled by your ISP. Wired LANs will allow you to get from 100-1000Mb/second, Wireless will get from from 10-250Mb (depending on how far from the wireless router you are and what type you get).

ISPs allow you to go anywhere from 56Kbs – 12Mbs:

Dial-up: 56Kbs – (4 minutes to download 1.7MB file)

DSL: up to 6Mbs – (2 seconds to download 1.7MB file)

Cable: up to 12Mbs – (1 second to download 1.7MB file)

*the math: 1.7 Mega Bytes is 13,600,000 bits (per second) of data divided by n, where n is your speed (i.e. 56K = 56,000 bits per second)
**There is a technology called WiMax Worldwide Interoperability for Microwave Access (802.16e) coming out that will allow wireless to go directly in your home from the ISP at 70Mb/second and that will beat every currently on the market.

If you have a home LAN (more than one computer in your home linked together connected to the Internet), your network is passing data at about 100Mb/second – which is really fast for even really large files. But this is where the Wireless vs. Wired Internet comes in. Don’t confuse your internal network speed with your connection to the Internet (see overview).

Should you go with a wireless or a wired router?
Any wireless router you get will have both options available, so you are better off getting a wireless. The cost isn’t usually that different unless you want a high end wireless which will usually be between $20-$50 more.

Which Switch is Faster, wireless or wired?
It really depends on what kind you get. However, the fastest wired router will beat the pants off of the fastest wireless. Wired routers go up to 100-1000Mb. Of course, I high end wireless can have everything a high end router has (including those super 1000Mb speeds).

SUPER HIGH END HOME ROUTER