Aspect 2
5 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Cory Reger
Scoop.it!

Common Fraud Schemes

Common Fraud Schemes | Aspect 2 | Scoop.it
Cory Reger's insight:

aspect 3

more...
Cory Reger's comment, April 3, 2014 6:54 PM
A key way to avoid these schemes if to know who you are dealing with. Be sure to learn more about a company or person that you will be doing business with but do not know much about. If depositing a big amount of money it would be important to consult with your bank about the business to make sure they are not fake.
Cory Reger's comment, April 3, 2014 6:57 PM
International fraud artists have invented an investment scheme that offers extremely high yields in a relatively short period of time. They will claim to have access to "bank guarantees" that they can buy at a discount and sell at a premium price. By reselling the "bank guarantees", they claim to be able to produce exceptional returns on investment.
Cory Reger's comment, April 3, 2014 7:03 PM
Pyramid schemes use money collected from newer victims is paid to previous victims to provide a veneer legitimacy. The victims themselves are introduced to recruit further victims through the payment of the recruitment commissions. Franchise fraud and chain referral schemes are examples of pyramid shemes.
Scooped by Cory Reger
Scoop.it!

Computer Intrusions

Computer Intrusions | Aspect 2 | Scoop.it
more...
Cory Reger's comment, March 4, 2014 8:57 AM
Another huge problem with social networking sites is that 46% of 10 to 17 year olds have admitted to giving out information to someone they did not know. The chance of kids giving out information over the internet increases with age. A survey shows 56% of 16 to 17 year old are most likely to give out information.
Cory Reger's comment, March 5, 2014 8:33 AM
Usually social networking sites will want the user to provide their age, hobbies, gender, and interests when creating their account. People who want to victimize kids use social networking websites as a golden opportunity to find potential victims. Some kids will add people they do not know as a friend just so it looks like they have a lot of friends on the website.
Cory Reger's comment, March 5, 2014 8:38 AM
A problem that people do not understand is that once you post something on these websites, you can not "take back" the images/text that is posted. In addition, people may do not realize that individuals that have access to these posts can forward the postings to an unlimited amount of users. Posting information on social networking sites can also lead to consequences such as being suspended from school.
Scooped by Cory Reger
Scoop.it!

Peer-to-Peer Scams

Peer-to-Peer Scams | Aspect 2 | Scoop.it
Cory Reger's insight:

Aspect 3

more...
Cory Reger's comment, April 1, 2014 8:35 AM
Peer to Peer networks allow users that are connected with the internet to connect their computers with another a different computer around the world. Networks like this are established for the purpose of sharing files. Users of peer-to-peer networks install free software on their computers for two reasons. The first reason is to find and download files located on another peer's hardrive. The second reason is to share the files they have on their computer with other users. Systems like these can be used to illegal sharing!
Cory Reger's comment, April 1, 2014 8:40 AM
Distributing copyrighted music, movies, software, games, and other networks without authorization is a violation to federal law. Important national economic consequences are the result with such theft. Industry associations and companies are asked by the FBI to report theft. The theft reports will lead to possible criminal investigation and prosecution.
Cory Reger's comment, April 1, 2014 8:47 AM
Peer-to-Peer networks can be abused by hackers. These systems can expose your computer to viruses and worms. Some worms and viruses have been specifically written to spread by popular Peer-to-Peer networks. If your software is not properly configured, you unknowingly may be opening up the contents of your entire hard drive for someone else.
Scooped by Cory Reger
Scoop.it!

NSA/CSS Strategy - NSA/CSS

NSA/CSS Strategy - NSA/CSS | Aspect 2 | Scoop.it
National Security Agency Public Information
more...
Cory Reger's comment, March 3, 2014 8:59 AM
The NSA wants to provide solutions that compete with the current challenges and drive solutions from invention to take down cyber terrorists. In addition, the use of electronic signals and systems to enable a secure cyberspace is critical. The NSA provides safety for the American cyberspace.
Cory Reger's comment, March 4, 2014 7:57 AM
The NSA guides the U.S Government with critical thinking skills that enable SIGINT and IA to gain intelligence advantages over terrorist groups. Information Assurance attacks the difficult challenge of preventing attackers from obtaining critical data. The agency allows Network Warfare operations to take down cyber terrorists.
Cory Reger's comment, March 4, 2014 8:02 AM
Roles of the NSA include collecting and analyzing information signals. Also, they must come up with ways to support national missions. The NSA is one of the top security agencies in the country.