Arnold Chalis Lab Act#6-A

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Name: CHALIS JR. ARNOLD W.

Date:
ACTIVITY
Section: CCJE-BLOCK A # 6-A
Score

100
NETWORK AND SECURITY ATTACKS

A. OBJECTIVE: Identify some of the modus operandi by cyber offenders.

B. OUTPUT

A. Marketing/Advertisement Schemes

1. Get-Rich-Quick Offers
The reason affiliate marketing gets such a bad rap is because of the proliferation of get-rich-quick offers
everywhere. They promise you will make thousands of dollars overnight, or that you can just work 2 hours a
day and have $5,000 in your bank account at the end of the week. 

If anyone tries to sell you a "secret system that works," don't believe them. Legitimate affiliate marketing takes
a bit of time to learn and while you will make money from it, it doesn't happen overnight. You need a strategy
and you need to implement it well before you make any income.

2.  No Product/Service to Sell

Affiliate marketers make their money by promoting someone else's product or services. If a company is
promising you thousands of dollars in income, look closer. What is it that you're actually selling? If there is no
actual product or service, it's nothing more than a scam.

These affiliate marketing "opportunities" are designed like pyramid schemes where no one is actually making
any money. You make an investment to join the program and after that, money is just passed around from one
person to the next. These schemes are totally illegal! You will lose your investment, and you're not going to
make any affiliate income from it, either. 
B. INVESTMENT SCAMS

1.ADVANCE FEE SCHEME


In an advance fee scheme, the victim is persuaded to pay money up front to take advantage of an offer
promising significantly more in return. The catch is that the scammer takes the money and the victim never
hears from them again.

2. BOILER ROOM SCAM

Investment scams are often pulled off by a team of people who set up a makeshift office, called a “boiler room”.
To convince you their company is real, they might send you to the company’s website, which looks very
professional. They might also set up a toll-free number and a respectable address to make the company seem
legitimate.
C.CYBERSEX SCHEMES

1. Recreational Users — Appropriate


This group of cybersex users are able to occasionally explore sex on the internet without problems. They might
use cybersex to enhance their sexual experiences. They are able to enjoy intimate sexual relationships in the
real world and have a healthy attitude to wards sexuality.

2. Recreational Users — Inappropriate


Like appropriate recreational users, this group of cybersex users can also access internet sex without
compulsive use but may use this material inappropriately. This could include sexting or showing sexual images
to other people for amusement or shock value, causing unintentional embarrassment. Such users do not keep
their activities secret, and may otherwise have a healthy attitude towards sexuality and relationships.

D. CYBER TERRORISM

1. Phishing scams

Phishing is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information


from a computer user. This process is usually accomplished through phishing websites which are designed
to mimic a legitimate website in hopes that the unsuspecting computer user will enter several bits of
personal information such as their banking passwords, home address or even social security number. To
avoid phishing scams, we recommend using a phishing filter feature on your web browser so that it can
actively scan websites that you visit to check if they have been identified as a phishing website.
2.
Cyberstalking

Cyberstalkers will
go to great lengths
to try to monitor a
victims online
activity. This may
include infecting a
person's computer
with malware that is
able to log computer
activity.
Cyberstalkers are
also known to continually harass their potential victims. Cyberstalking cases should also be reported to
authorities, just like online harassment cases. Cyberstalkers may contact a victim's colleagues, friends and
other online contacts in an effort to slander them or extract personal information from them.

You might also like