Different Types of Electronic Fraud

1024 Words Feb 2nd, 2018 4 Pages
It is no longer sufficient to simply warn employees about clicking on suspect sites or to limit access to the company network. Hackers have become far more sophisticated in how they bypass industrial security and they are constantly altering their techniques to counter security and take advantage of new technology. The cyber terrorism that now exists is a threat not only to companies that harbor the data, but to every individual who may have their personal information saved by any company with whom they have dealt in the past. Serious steps must be taken to protect this information and, when necessary, punish those who may attempt to subvert the security currently in place.
Types of Fraud Most of the fraud occurring electronically involves malware related applications. Malware is any kind of malicious software that runs on a computer without the user's consent, usually in an attempt to either glean information from the user or to launch an attack against other computer users on a network. Many of this malware comes from organized crime rings that take control of computers for the purpose of stealing personal or confidential information for profit (Casey, Aquilina, & Malin, 2008, p.1). This malware can take the form of virus, Trojan horse virus files, or rootkit activity. Recently the FBI issued a warning about malicious actors…