Professional Documents
Culture Documents
Arnold Chalis Lab Act#6-A
Arnold Chalis Lab Act#6-A
Arnold Chalis Lab Act#6-A
Date:
ACTIVITY
Section: CCJE-BLOCK A # 6-A
Score
100
NETWORK AND SECURITY ATTACKS
B. OUTPUT
A. Marketing/Advertisement Schemes
1. Get-Rich-Quick Offers
The reason affiliate marketing gets such a bad rap is because of the proliferation of get-rich-quick offers
everywhere. They promise you will make thousands of dollars overnight, or that you can just work 2 hours a
day and have $5,000 in your bank account at the end of the week.
.
If anyone tries to sell you a "secret system that works," don't believe them. Legitimate affiliate marketing takes
a bit of time to learn and while you will make money from it, it doesn't happen overnight. You need a strategy
and you need to implement it well before you make any income.
Affiliate marketers make their money by promoting someone else's product or services. If a company is
promising you thousands of dollars in income, look closer. What is it that you're actually selling? If there is no
actual product or service, it's nothing more than a scam.
These affiliate marketing "opportunities" are designed like pyramid schemes where no one is actually making
any money. You make an investment to join the program and after that, money is just passed around from one
person to the next. These schemes are totally illegal! You will lose your investment, and you're not going to
make any affiliate income from it, either.
B. INVESTMENT SCAMS
Investment scams are often pulled off by a team of people who set up a makeshift office, called a “boiler room”.
To convince you their company is real, they might send you to the company’s website, which looks very
professional. They might also set up a toll-free number and a respectable address to make the company seem
legitimate.
C.CYBERSEX SCHEMES
D. CYBER TERRORISM
1. Phishing scams
Cyberstalkers will
go to great lengths
to try to monitor a
victims online
activity. This may
include infecting a
person's computer
with malware that is
able to log computer
activity.
Cyberstalkers are
also known to continually harass their potential victims. Cyberstalking cases should also be reported to
authorities, just like online harassment cases. Cyberstalkers may contact a victim's colleagues, friends and
other online contacts in an effort to slander them or extract personal information from them.