Professional Documents
Culture Documents
1.Explain in detail how criminals plan the attacks (in different phases
describing with a set of tools in each phase) with any two real time
examples.
1. Reconnaissance Phase:
2. Scanning Phase:
7. Exploitation Phase:
Goal: Exploit the information gathered during the attack for financial
gain or other malicious purposes.
Tools:
o Cryptocurrency wallets: Used to receive payments from
ransomware attacks or other extortion schemes.
o Money mule recruitment tools: Used to recruit individuals to
launder money or transfer funds on behalf of the attacker.
Each of these phases requires careful planning and execution on the part of the
attacker. By understanding these phases and the tools used, organizations can
better defend against cyber attacks by implementing appropriate security
measures and best practices.
Social engineering attacks can be very effective because they exploit human
psychology and emotions. It's important for individuals and organizations to be
aware of these tactics and to take steps to protect themselves, such as being
cautious of unsolicited requests for information and verifying the identity of the
person making the request.
● Create strong passwords. Make sure you have strong passwords for all
your online accounts as well as strong passwords for your devices. Then,
set a reminder on your phone to regularly change your passwords. Choose
passwords that would be difficult to guess but are easy for you to
remember.
● Be sure to log out every time. It may seem like a pain, but make sure
you log out of email, social media accounts, and other online accounts
after using them. This way, if someone were able to get into your device
they would not have easy access to your accounts.
● Keep track of your devices. Don't leave your phone sitting on your desk
at work or walk away from an open laptop. It only takes a minute or two
for someone to install a tracking device or hack your device. So, make
sure you keep these things in your possession or that you secure them in
some way.
● Use caution on public wifi. Recognize the fact that if you use public wifi
at hotels or at the local coffee shop, you are putting yourself at risk for
hacking. Try to refrain from using public wifi or invest in VPN.
● Practice online safety habits. In other words, make it a priority to only
accept friend requests from people you know and keep your posts private.
You also should consider having one email address that is specifically for
your online activity. Use this email when you do your online shopping or
join loyalty programs.
It's crucial to maintain appropriate digital hygiene if you want to shield yourself
against cyberstalking. This indicates that you are conscious of the digital traces
you leave behind when you use the internet and that you are taking precautions
to safeguard your identity and accounts. These are some things that you ought to
be performing frequently.
Place Barricades
Putting a stop to interactions with the individual cyberstalking you is the first
step towards resolving the cyberstalking you are experiencing. Even while they
could still find a method to get in touch with you, you can at least make it more
difficult for them to do so. Attempt to erect these barriers against online
harassment.
● Tell the person to stop. Respond only once to the person cyberstalking
you and tell them to stop contacting you. You don't need to say anything
specific or explain your answer, just ask them to never contact you again.
● Block the person. Make sure you block the person cyberstalking you
from all your accounts. You should block them on social media and on
your smartphone.
● Refuse to respond to any contact. If the person cyberstalking continues
to find ways to contact you, do not respond to anything they post or send
you.
● Change email address and screen names. Consider getting a new email
address and changing your online screen names to make it harder for the
person cyberstalking you to reach you.
You also should prepare yourself for the possibility that their online harassment
could escalate to in-person stalking. So, make sure you're also taking steps to
keep yourself safe at home, school, and work. It may even help to create
a safety plan. Here are some other things you can do:
● Change passwords. Even if your accounts have not been breeched you
should change all your passwords and continue to change them on a
regular basis.
● Consider suspending online accounts. If you are able, you should
consider suspending your social media accounts or at least taking a break
for them for a while. If you are not active online, it's harder for the person
cyberstalking you to reach you.
● Get your devices checked. Before you use your devices again you
should have them checked out by a professional to ensure the person
harassing you did not install tracking devices or hack your computer in
some way.
Act Now.It's critical to pursue legal action against the individual who is
cyberstalking you if you have requested that they cease, yet their actions persist.
This entails getting in touch with the proper authorities and gathering proof of
their deeds. It could be a good idea to have a conversation with an attorney.
These are the main issues that must be resolved before acting. If there is
anything else you can do to ensure your safety, your local law enforcement can
inform you.
● Save evidence of everything. Even though you may feel like destroying
everything, it's important to keep copies of everything the person
cyberstalking you has sent. Make a copy for yourself and a copy for law
enforcement.
● Notify your local police. It's important to notify the police and file an
official complaint if you're being cyberstalked. Even if they cannot do
anything right away, having an official complaint on file is important if
the behavior persists or escalates.
● Report them to the site or service they used. If the person cyberstalking
you harassed you through Facebook, Instagram, Twitter, Snapchat,
YouTube, Gmail, or some other method, let the appropriate authorities
know what you're experiencing. Many times, these organizations take
complaints of cyberstalking seriously and will address the matter.
Cyberstalking Laws
There are statutes that can be used to prosecute those who participate in
cyberstalking, even if there isn't a single federal law that forbids it.
Cyberstalking is a severe offense, and individuals who participate in it risk
facing harsh penalties.
For example, in these situations, the federal statute against stalking is frequently
invoked. According to this law, someone could be imprisoned for using
electronic communications technology in a way that "causes, attempts to cause,
or would be reasonably expected to cause substantial emotional distress to a
person" or that gives rise to a reasonable fear of death or serious bodily injury.
There are other federal statutes that may also be applicable in situations of
cyberstalking.If someone has been surreptitiously videotaped on their own
computer or if the criminal obtained erroneous access to the target's computer to
get explicit images or videos, they may be charged under the Computer Fraud
and Abuse Act.
Similarly, if someone publishes or threatens to publish another person's private
images or videos with the goal of pressuring them to do something against their
will, especially if the communication takes place over interstate commerce
channels like phones, computers, or the internet, that person may also be
charged with extortion.