Manage and review of all the development projects of the core database engine development group. Provide support for finalizing the architecture of the projects. Provide technical support to director development. Design and Development of a General purpose Memory Card Reader. Design and Development of an Internet Billing Software. Design and Development of a Call Management System. Design and Development of Mobile Observer Units Automation System.

Letter of Recommendation

SUMMARY
#) Over 23 years of design and development experience.
#) Proven track record of many successfully developed and deployed products starting from scratch.
#) Frequent speaker in PostgreSQL international conferences.
#) Extensive experience in
* Product Design
* Development
* Deployment and
* Support.
#) Experience of development for PostgreSQL database server.
#) Experience of Database Replication Systems.
#) Experience of working with development teams spread across different countries.
#) Experience of distributed database development & distributed transaction processing.
#) Experience in developing applications using C,C++,Visual C++,C#,Objective-C & Java.
#) Experience in developing network management applications for networks containing PCs running Windows, Linux, MAC OS and SBCs running Embedded Linux.
#) Experience in database development using Access,SQL Server,PostgreSQL & Oracle.
#) Experience in firmware development for embedded systems based on different variants of 8051 and PIC micro-controllers.
#) Experience in device driver development for Windows 2000.
#) Experience of database, telecom and healthcare industry.
#) Experience of various accounting systems.
#) Computer Engineering background.

TECHNICAL INTERESTS
System Development, Algorithm Development, Data Science.

PROFESSIONAL EXPERIENCE
1. “Senior Software Architect” in EnterpriseDB from Jan 2011 till now.
Primary job responsibilities:
a) Supporting main architecture design decisions.
b) Implementation of different software modules.
c) Provide support to development team members.

Major Projects:
EDB Replicate
Replicate is a multi-master logical replication solution for PostgreSQL.
I was responsible for the following modules:
Propose the design and implement system for replicating logical replication slots across physical replicas.
Propose and do POCs for ways to reduce un-necessary network traffic to increase performance.
Propose ways to detect, log and handle UPDATE-UPDATE conflicts.

Migration Portal
Migration portal is a web based application to port an oracle database to EnterpriseDB Advanced Database Server (EDBAS).
I was responsible for the following activities:
Implement repair handlers using RegEx to transform Oracle SQL constructs to equivalent constructs in EDBAS on the fly.
2. “System Architect” in TeleSehat Private Limited from March 2009 to Jan 2011.

Primary job responsibilities:
Overall architecture design of the Tele-medicine product.
Provide support to the business development, HR and other activities.

Major Projects:
Dynamic Bandwidth Aggregation Router
DBAG router is provided more than one internet connections. Devices needing internet connect to the DBAG router. The DBAG router provides failover and load balancing.
I was responsible for the following activities:
Proposal Preparation and Submission for funding.
Feature comparison with existing solutions available.
POC for the main design of bandwidth aggregation router. The POC consisted of a RTP voice sender and a RTP voice receiver. Two different internet connections were provided to the aggregation router. Both failover and load balancing with 1:1 ratio were demonstrated to work successfully in the POC.
Project progress reporting to the funding agency.
Standards Compliant Semantic Electronic Medical Record and Device

Interoperability Framework
The aim of the project was to create HL-7 compliant medical record system.
My role in this project was to decode the byte stream sent by medical lab test machines on serial port or ethernet. I was then required to create simulators for the machines so that the rest of the system can be tested with different values of the medical test results. We were able to integrate different blood test machines, urine test machine, blood chemistry analyzers etc. I was also responsible for deploying the system in the field for evaluating the user experience.

TeleDiagnosis
TeleDiagnosis is Pakistan’s first purpose built product for Telemedicine. It covers all aspects of patient-doctor interaction. It is developed in C++ using DirectShow with SQL Server as backend database. It provides the following features:
One to one Video Conferencing with acoustic echo canceler, speex, & H.264 codecs. It supports multiple cameras with camera switching capability on the fly.
Digital on-line stethoscope with diaphragm at patient end and ear piece at doctor end.
Handwritten prescription providing ability to write prescriptions in Urdu or any other language.
Typed prescription with support for Urdu.
Support for live view of dermascope, ultrasound, ECG, irisscope, dental scope, otoscope, and many other diagnostic devices.
Browse through previous medical history of the patient that includes previous prescriptions, lab test reports, X-rays, etc.

TeleSehat HMIS
TeleSehat HMIS is an advanced hospital management system developed in C# with SQL Server as backend database. It provides the following modules:
Ability to seamlessly integrate with any other HMIS based on any other database server providing full distributed transactions support.
Patient, doctor and other staff registration.
Appointments
Payments with shares and reports
Pathology lab with ability to add new lab tests and their reports at run time by end user.
Nursing Station with ability to scan previous medical records.
In-patient
Pharmacy with ability to alert for shelved medicines about to expire.
Stores & HR.
3. “Software Architect” in EnterpriseDB from March 2006 to March 2009.

Primary job responsibilities:
Management and review of all the development projects of the core database engine development group.
Provide support for finalizing the architecture of the projects.
Provide technical support to director development.

Major Projects:
Design and development of Oracle compatible packages for IBM DB2
(UTL_ENCODE, UTL_TCP, UTL_SMTP, UTL_MAIL).
Implementation of TDS protocol in PostgreSQL for SQL Server compatibility.

Primary job responsibilities:
Main Architecture Design of a Product.
Product Development.
Product Support.
Managing Teams of Developers.
Documentation

Major Projects:
Design & Development of a Network Management System for Payphones.
Design & Development of Voice Communication System (VCS)

Primary job responsibilities:
Product Design and Development.
Product Support.
Documentation of the Design and Development Processes as required by ISO 9000

Major Projects:
Design and Development of a General purpose Memory Card Reader.
Design and Development of an Internet Billing Software.
Design and Development of a Call Management System.
Design and Development of Mobile Observer Units Automation System.

Primary job responsibilities:
Firmware/Software/Hardware Implementation of products in C/C51.
Product Support

Major projects:
PC based In-circuit Emulator for 8051 micro controller in C.
Firmware development for a stand-alone Smart card based Payphone system based on 8051 micro controller in C/C51.
MFC Tutor in MS Visual C++.

ACADEMIC QUALIFICATIONS
2006 MSc (Masters of Engineering), Computer Engineering CASE, University of Engineering and Technology, Pakistan
http://www.case.edu.pk

Distinction:
Got Talented Student award for getting 8 A’s, 1 B+ and 1 B
Overall GPA 3.85

Semester Projects:
Implementation of a network sniffer using raw sockets in Linux
Implementation of a UART on XC3S200 Spartan III FPGA using Xilinx ISE
Implementation of a Keyboard Controller on XC3S200 Spartan III FPGA using Xilinx ISE
Implementation of a low complexity DTMF decoder in MATLAB
Implementation of different algorithms to detect and track a moving object in a movie in MATLAB 1997 Postgraduate Diploma of one year in Computer Hardware and Software Computer

Training Center, Islamabad, Pakistan 1996 BE (Bachelor of Engineering), Electrical Engineering University of Engineering and Technology, Taxila, Pakistan
http://www.uettaxila.edu.pk/

Project: Intelligent Data Switch: An 8088 based stand-alone system to switch data between 4 serial and 2 parallel ports.

Create a management plan containing eight to ten stages for proper design of such a system. Explain each stage of the management plan and justify your rationale. Estimate the length of time it will take to complete each stage of the management plan. Compare and contrast the self-check-in interface with the interface a receptionist would use.

Case Study – Design Process

You have recently started your own software design company. You discover that your local Department of Motor Vehicles (DMV) is looking to build a system that will allow receptionists to check in customers quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. Read the article, “Factors Affecting Development Process in Small Software Companies.”

Write a four- to five-page paper in which you:

Suggest the prototyping technique you would use for this system and support your rationale.
Create a management plan containing eight to ten stages for proper design of such a system.
Explain each stage of the management plan and justify your rationale.
Estimate the length of time it will take to complete each stage of the management plan.
Compare and contrast the self-check-in interface with the interface a receptionist would use.
Use Microsoft Visio or an open source alternative, Dia, to create a total of two graphical representations of your proposed interfaces, one for the self-check-in and one for the receptionist. Note: The graphically depicted solution is not included in the required page length.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources

Assess at least five best practices for developing a universally usable interface. Evaluate how Section 508 affects developing user interfaces and assess this compliancy standard’s impact on users. Give three examples of available tools for verifying that your interfaces meet universal design guidelines and the advantages and disadvantages of each.

Accessibility

Write a four- to five-page paper in which you:

Assess at least five best practices for developing a universally usable interface.
Evaluate how Section 508 affects developing user interfaces and assess this compliancy standard’s impact on users.
Give three examples of available tools for verifying that your interfaces meet universal design guidelines and the advantages and disadvantages of each.
Examine the practicality of building multiple interface options for diverse populations, rather than building one interface that meets the needs of the majority of end users.
Use at least three quality resources in this assignment.

Note: Wikipedia and similar websites do not qualify as quality resources

What is phishing? What are some real-world phishing examples? How do we tackle the issue of phishing? What is the prevalence of phishing? What are the impacts of phishing on American businesses? How do you deal with phishing?

THE PROBLEM OF PHISHING AND ITS IMPACT ON AMERICAN BUSINESSES

Subject: Report on the problem of phishing and its impact on American Businesses

Phishing problems and their impact on American Businesses within the United States are discussed herein. Phishing attacks continue to increase because of the increased use of technological innovations, both economically and technologically. Some of the considerable resources required for executing such attacks are easily accessible within the public and private sectors. Besides, it is essential to note that the internet’s uptake and use continue to increase each day significantly, making it easier for people to share their details online easily. Therefore, much personal information with their financial transactions is exposed to cybercriminals. Phishing attacks form part of the intricate web of cybercrime, enhancing criminal activities through deception and data stealing. Since the first incidence of phishing in the early 1990s, the crime has evolved into a sophisticated attack.

Today, phishing is considered the most common and vicious cybercrime. The subsequent effects of phishing include the severe loss of personal information and loss of data by companies and government institutions. This report seeks to identify the phishing problem and its impact on American businesses using primary and secondary sources.

This report was developed to discuss and analyze the phishing problem and its impact on American businesses. The results from the research undertaken herein assert that phishing continues to be a significant problem affecting individuals and organizations. The research findings are categorized into four categories:

  • Phishing definition and why it is a problem
  • Impacts on American businesses
  • Common characteristics associated with phishing
  • Tackling phishing.

 

Thank you for taking the time to read the report. In case of any questions, please feel free to contact me by phone at 920-850-5269 or by email at 300075790@fvtc.edu.

Sincerely,

Elijah

TABLE OF CONTENTS

EXECUTIVE SUMMARY.. 4

INTRODUCTION.. 6

BACKGROUND.. 7

DISCUSSION OF FINDINGS. 9

Phishing definition and why it is a problem.. 9

Why is it a problem?. 11

Phishing impacts on American businesses. 12

Financial loss. 12

Intellectual property loss. 13

Reputation damage. 13

Business disruptions. 14

Common characteristics associated with phishing. 14

Countermeasures for dealing with phishing attacks. 15

Human education. 15

Technical solutions. 16

CONCLUSIONS AND RECOMMENDATIONS. 16

WORKS CITED.. 18

LIST OF FIGURES. 19

EXECUTIVE SUMMARY

The digital environment continues to expand and evolve, and so do cybercriminals, who have harmed many individuals over the years via the illicit exploitation of various digital assets and variables. Identity theft is one of the most popular kinds of cybercrime among internet users; it involves impersonating others to obtain their personal information. Cybercriminals have advanced their modes of information-stealing by introducing social-engineering techniques. Phishing attacks are the most common form of social engineering and have become the biggest concern for most internet users because of their susceptibility to losing their sensitive personal information. In phishing, most executors of the attacks rely on various techniques to redirect their users to websites that can easily be manipulated using embedded links.

The data provided within this report were extracted from various peer-reviewed academic journals and articles. Most of the pieces of literature were retrieved from accredited websites. The statistical data presented herein were collected from recently published journal articles. The paper limited the research to articles and journals published from 2018 onwards.

The results from the research undertaken herein assert that phishing continues to be a significant problem affecting individuals and organizations. The research findings are categorized into four categories: (a) Phishing definition and why it is a problem, (b) impacts on American businesses, (c) common characteristics associated with phishing, and (d) tackling phishing.

The analysis of information within the report on the problem of phishing and its impact on American businesses led to the following conclusions and recommendations:

  • Phishing attacks are the most common form of social engineering and have become the biggest concern for most internet users because of their susceptibility to losing their sensitive personal information. In phishing, most executors of the attacks rely on various techniques to redirect their users to websites that can easily be manipulated using embedded links. Also, attackers could use other mediums to undertake the attacks, such as the use of Voice over IPs, the use of short messages, and the use of instant notifications.
  • Phishing is considered a real-life problem because it affects individuals and organizations directly, making them more vulnerable, exposing their employees and attacking all their existing malware protection measures. Phishing bypasses all existing measures making it possible for cybercriminals to gain access to personal and confidential information globally.
  • When an organization experiences a phishing attack, monetary costs and loss are the first impacts and unfortunate effects. The direct monetary losses recorded because of phishing are proportionate to the attack’s impact on customers’ information.
  • Phishing attacks often result in intellectual property losses because of a successful phishing campaign. During a phishing attack, trade secrets, formulas and new developments are all compromised.

INTRODUCTION

Many people, organizations and consumers have embraced online commerce in recent years, making them susceptible to cyber-attacks such as phishing. Okpa et al.(462) note that phishing is stealing or taking people’s information to defraud them of their hard-earned money. Phishing has become a significant criminal act globally. Much progress has been made in recent years in identifying threats and enlightening organizations and consumers on existing countermeasures. However, there is an increase in phishing attacks, especially the mode of the attacks and the complexity of their activities. It is also imperative to note that phishing negatively affects businesses and the country’s economy because of significant financial losses experienced by various organizations and consumers. Furthermore, there is decreased confidence in the use of e-commerce platforms.

Phishing attacks continue to increase because of the increased use of technological innovations, both economically and technologically. Some of the considerable resources required for executing such attacks are easily accessible within the public and private sectors. Besides, it is essential to note that the internet’s uptake and use continue to increase each day significantly, making it easier for people to share their details online easily (Kolley,2). Therefore, much personal information with their financial transactions is exposed to cybercriminals. Phishing attacks form part of the intricate web of cybercrime, enhancing criminal activities through deception and data stealing. Since the first incidence of phishing in the early 1990s, the crime has evolved into a sophisticated attack.

Today, phishing is considered the most common and vicious cybercrime. The subsequent effects of phishing include the severe loss of personal information and loss of data by companies and government institutions. This report seeks to identify the phishing problem and its impact on American businesses using primary and secondary sources.

This report was developed to discuss and analyze the phishing problem and its impact on American businesses. The report seeks to focus on the following questions

  • What is phishing?
  • What are some real-world phishing examples?
  • How do we tackle the issue of phishing?
  • What is the prevalence of phishing?
  • What are the impacts of phishing on American businesses?
  • How do you deal with phishing?

BACKGROUND

The digital space continues to expand and evolve, and so are cybercriminals who, over the years, have relied on the illegal application of various digital assets and factors to cause harm to multiple people. According to Esmat et al.(791), one of the most prevalent forms of cybercrimes among internet users is identity theft, impersonating other people’s identities intending to steal their personal information. Kumar et al. (486) note that cybercriminals have advanced their modes of information-stealing by introducing social-engineering techniques. Phishing attacks are the most common form of social engineering and have become the biggest concern for most internet users because of their susceptibility to losing their sensitive personal information. In phishing, most executors of the attacks rely on various techniques to redirect their users to websites that can easily be manipulated using embedded links. Also, attackers could use other mediums to undertake the attacks, such as the use of Voice over IPs, the use of short messages, and the use of instant notifications.

Most victims of such social engineering techniques lack formal training or knowledge of internet use and are unaware of technical vulnerabilities. Moreover, Internet users’ susceptibility varies based on one’s attributes and phishing awareness levels. Therefore, it suffices to note that phishers exploit the human aspect of internet use to hack and obtain personal information using intricate technologies. Thus, even though most cases of phishing attacks are attributed to the human element of it, technology also plays a critical part in its prevalence (Kumar et al.,486). Besides, various characteristics and attributes of people make them susceptible to being lured. For example, greediness and the tendency for one to obey multiple rules make them easy to be victims of various phishing issues.

Attackers use multiple channels to lure most of their victims into the scams, both directly and indirectly. Most of these channels make it easy for them to access various sensitive and personal information. Besides financial losses, phishing attacks could damage reputation and security compromises. Cybercrimes, including phishing attacks, cost up to $6 trillion in annual losses (Esmat et al.,792). Even though phishing attacks are common within organizations, they also affect individuals. They usually result in the loss of reputation, reduced productivity levels, and increased costs in recovering the lost information and reputation.

The data provided within this report were extracted from various peer-reviewed academic journals and articles. Most of the pieces of literature were retrieved from accredited websites. The statistical data presented herein were collected from recently published journal articles. The paper limited the research to articles and journals published from 2018 onwards.

DISCUSSION OF FINDINGS

The results from the research undertaken herein assert that phishing continues to be a significant problem affecting individuals and organizations. The research findings are categorized into four categories: (a) Phishing definition and why it is a problem, (b) impacts on American businesses, (c) common characteristics associated with phishing, and (d) tackling phishing.

Phishing definition and why it is a problem

There are various definitions of phishing; as such, the concept is unclear because it keeps evolving. Kumar et al. (486) defines phishing as the process of lying or tricking someone into undertaking a desired course of action, both in action and its use. Kolley (3) believes that phishing can only occur through a website. Okpa et al.(462) define phishing as an online form of theft that seeks to steal information using their passwords through social skills. On the other hand, Rendall (4540) defines phishing as a criminal act combining social and technical social engineering skills to commit an offense. The figure below depicts the actual process of phishing attacks.

Figure 1: The process of phishing.

As depicted in the figure above, phishing occurs in various stages, beginning with collecting data or information about the primary target in the provided case. After that, the phisher or attacker chooses a specific method that they want to use to initiate their attack. After collecting data, the second phase involves preparation to undertake the attack through exiting vulnerabilities that can trap the victim (Thomas,5).

Some notable phishing attacks include the following instance where an attacker intended to undertake an attack through their mailbox. In the screenshot illustrated below, the phisher used disguised messages of importance to trick the victim into divulging their secretive personal information. The email, in this case, had an embedded URL link that opened another website or link (Kolley,4).

Figure 2: A real-life example of phishing.

Why is it a problem?

Phishing is considered a real-life problem because it affects individuals and organizations directly, making them more vulnerable, exposing their employees and attacking all their existing malware protection measures. Phishing bypasses all existing measures making it possible for cybercriminals to gain access to personal and confidential information globally. According to Kumar et al. (486), phishing is one of the most common forms of cybercrime today, with its frequency increasing significantly from 114,702 reported cases in 2019 to 241,324 in 2020. According to Miranda (5), there are more phishing complaints today than in recent years.

Similarly, Esmat et al. (791) note that the frequency and number of phishing attacks continue to increase. For instance, in 2013, the RSA security organization reported that up to 450,000 phishing websites accounted for $5.9 billion in losses. Ever since then, the number of phishing attacks and cases has increased significantly to account for more financial losses within the business environment.

Phishing impacts on American businesses

Phishing attacks impact American businesses and organizations in various ways. The impacts on the organizations vary based on the size of the organization and the volume of information they have. Some notable impacts of phishing attacks include intellectual property loss, financial loss, reputation damage and business disruption.

Financial loss

When an organization experiences a phishing attack, monetary costs and loss are the first impacts and unfortunate effects. The direct monetary losses recorded because of phishing are proportionate to the attack’s impact on customers’ information. Thomas (9) notes that there is always a financial hemorrhage or loss from every phishing attack. First, there is the direct loss of money by customers that got duped by the attackers into sending money. Also, there are fines for organizations that do not comply with the regulatory bodies’ safeguarding of personal information (Al-Fayoumi et al.,488). The other factors that result in money loss are fines and costs involved in investigations to determine the breach within the organization and compensation of customers who were easily duped into losing their money. According to a Crimes Report, as of 2018, phishing attacks accounted for up to 1.2 billion-dollar losses (Miranda,4).

Intellectual property loss

Besides financial losses, phishing attacks often result in intellectual property losses because of a successful phishing campaign. During a phishing attack, trade secrets, formulas and new developments are all compromised (Miranda,5). Technological or research companies stand to lose their projects and drug patents through phishing attacks. That means the loss of millions of research money and expenditures. The loss of intellectual property rights is the most damaging of all the losses because while one can recover from a financial loss, losing billions in projects and research is hard to recover.

Reputation damage

Most organizations are usually reluctant to state that they have experienced a phishing attack because of the level of damage it has on their reputation. That is more common when it involves a malicious bug. Phishing attacks normally take time to deal with or rectify. Bugs force organizations to go offline or shut down to restore various systems, which could ultimately result in decreased productivity levels. Most organizations refrain from stating that they just had an attack because disclosing such information will cause harm to their brand image and damage customers’ trust in the organization (Thomas,10). Once customers lose confidence in the organization, it will not be easy for them to restore it and create value in the brand. It is also imperative to note that such attacks will push investors away, harming their reputations greatly. With both damages to the organization and the customers, phishing attacks could ultimately result in losing millions of dollars in capitalization.

Business disruptions

As mentioned earlier, phishing attacks of any kind cause business disruptions. It is not easy for an organization to keep running after they have experienced any form of a phishing attack. More so when it involves a malicious bug. The bug forces the organization to shut down and operate offline to eliminate the bug. The down shutting process reduces the employees’ productivity levels because they become idle while waiting for the organization to deal with the bug (Al-Fayoumi et al.,490). The business interruption affects logistics, transportation, and the organization’s critical infrastructures.

Common characteristics associated with phishing

There are common characteristics that are attacked by phishing attacks. These characteristics were mostly picked from repeated phishing attacks targeting American businesses. Some common characteristics of phishing include having a sense of urgency, requesting interaction away from the recipient’s mail, and their emails are often considered or classified as important (Miranda,6). Essentially, such emails are disguised as coming from important organizations. The emails often contain embedded links that request some form of payments or various transactions to obtain their bank information and details: the messages and phishing techniques always demand attention from the victims.

Some of the common supplanted techniques used in phishing attacks involve targets on asset inventories, changes to human health benefits, and security alerts on and off Twitter. Similarly, requests to update email addresses for subscriptions, confirmation of payments and security upgrades requests.

 

Figure 3. Common techniques used for phishing attacks.

Countermeasures for dealing with phishing attacks

A range of countermeasures can be used to overcome various problems and issues of phishing, but no single one is considered the sole solution to the problems. Some of the notable solutions include human education and the application of various technical solutions.

Human education

Human education plays a critical role in preventing future phishing attacks. Through education, humans are trained and enlightened on existing or emerging forms of phishing attacks within the business environment. Thomas (2) notes that end-user education is important in reducing susceptibility to phishing attacks. Complimenting human education and technical solutions applications help combat recurring attacks. Given that most phishing attacks are perpetuated because of human error, it is important to educate users about phishing. The proposed technical approach to educating the user is the intervention of human learning within a cybersecurity program to help introduce the user to various awareness programs.

Technical solutions

There are two classes of technical solutions: content-based approaches and non-content-based solutions. Both solutions offer suitable solutions to the issue of phishing attacks. Non-content-based approaches use blacklists and whitelists, whereas content-based solutions focus more on text, images, and java scripts. Other solutions within this category include using techniques to detect the attack, preventing them from reaching various users’ systems and adopting corrective techniques in dealing with the issue of compromised techniques.

CONCLUSIONS AND RECOMMENDATIONS

The analysis of information within the report on the problem of phishing and its impact on American businesses led to the following conclusions and recommendations:

  1. Phishing attacks are the most common form of social engineering and have become the biggest concern for most internet users because of their susceptibility to losing their sensitive personal information. In phishing, most executors of the attacks rely on various techniques to redirect their users to websites that can easily be manipulated using embedded links. Also, attackers could use other mediums to undertake the attacks, such as the use of Voice over IPs, the use of short messages, and the use of instant notifications.
  2. Phishing is considered a real-life problem because it affects individuals and organizations directly, making them more vulnerable, exposing their employees and attacking all their existing malware protection measures. Phishing bypasses all existing measures making it possible for cybercriminals to gain access to personal and confidential information globally.
  3. When an organization experiences a phishing attack, monetary costs and loss are the first impacts and unfortunate effects. The direct monetary losses recorded because of phishing are proportionate to the attack’s impact on customers’ information.
  4. Phishing attacks often result in intellectual property losses because of a successful phishing campaign. During a phishing attack, trade secrets, formulas and new developments are all compromised.
  5. Phishing attacks of any kind cause business disruptions. It is not easy for an organization to keep running after they have experienced any form of a phishing attack. More so when it involves a malicious bug.
  6. Phishing attacks result in reputation damage. Most organizations are usually reluctant to state that they have experienced a phishing attack because of the level of damage it has on their reputation.
  7. Some of the common characteristics of phishing include having a sense of urgency, requesting interaction away from the recipient’s mail, and their emails are often considered or classified as important.
  8. Human education plays a critical role in preventing future phishing attacks. Through education, humans are trained and enlightened on existing or emerging forms of phishing attacks within the business environment.

The findings help gain insight into phishing, how phishing attacks are initiated and how best to counter a phishing attack. Adopting countermeasures is critical in dealing with any existing or emerging phishing attack.

Works Cited

Al-Fayoumi, Mustafa, Jaber Alwidian, and Mohammad Abusaif. “Intelligent association classification technique for phishing website detection.” International Arab Journal of Information Technology 17.4 (2021): 488-496.

Esmat, Hanin Younis, Alaa Faisal Alharbi, and Abdelrahman Karrar. “The Impact of Phishing on the Business Sector in KSA: Analytical Study.” International Journal 10.2 (2021).

Kolley, Saikou. Phishing attacks: Detection and prevention. Diss. University of Bradford, 2021.

Kumar, Abhishek, Jyotir Moy Chatterjee, and Vicente García Díaz. “A novel hybrid approach of svm combined with nlp and probabilistic neural network for email phishing.” International Journal of Electrical and Computer Engineering 10.1 (2020): 486.

Miranda, Michael JA. “Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach.” International Management Review 14.2 (2018): 5-10.

Okpa, John Thompson, Benjamin Okorie Ajah, and Joseph Egidi Igbe. “Rising Trend of Phishing Attacks on Corporate organizations in Cross River State, Nigeria.” International Journal of Cyber Criminology 14.2 (2020): 460-478.

Rendall, Kieran, Antonia Nisioti, and Alexios Mylonas. “Towards a multi-layered phishing detection.” Sensors 20.16 (2020): 4540.

Thomas, Jason. “Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks.” Thomas, JE (2018). Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks. International Journal of Business Management 12.3 (2018): 1-23.

LIST OF FIGURES

Figure 1: The process of phishing.

Figure 2: A real-life example of phishing

Figure 3: Common techniques used for phishing attacks.

 

Researched on smart grid which includes renewaЫe power generation (solar and wind) and reliaЬility and flexiЬility in power transmission and distribution. Analyzed the scenario of transmission and distribution system in Bangladesh based on energy inflow/outflow, demand, voltage, current, power factor, meter tampering, and compared smart grid with the present power grid of Bangladesh

Education

Metropolitan University Sylhet, Bangladesh Bachelor of Science in Electronic and Electrical Engineering, Major in Power January 2011-August 2015

Undergrad Research: Smart Grid- Future Smart Power World and Perspective of Bangladesh. Relevant Coursework: Power System, Power Plant Engineering, RenewaЫe Energy.
Research Interest: Smart Grid, Power Electronics, Energy Storage, Power system planning and protection.

Relevant Experiences
Islami Bank Institute of Technology Sylhet, Bangladesh
Lecturer, Department of Electrical Engineering August 2017 – Present

  • Supervised а group of seven students to design and to engineer smart city project which controls home appliances from any distance using GSM technology
  • Mentored а team of four students to innovate а conveyor which transports heavy goods Ьу using power from solar system
  • Led а team of three students to develop а wireless power transmission system using electromagnetic fields and inductive coupling between coils
  • Attended Bangladesh Education Ministry’s program as а reviewer for government project- “STEP (Skills and Training Enhancement Project)” to review an e-book written on Switchgear and Protection
  • Designed curriculum for class lectures and coached 38 students;
  • Taught courses are: Circuit Analysis, Transmission and Distribution of Power, Generation of Electrical Power, RenewaЫe Energy, Switchgear and Protection

Metropolitan University Sylhet, Bangladesh

Student Researcher December 2014-July 2015
Researched on smart grid which includes renewaЫe power generation (solar and wind) and reliaЬility and flexiЬility in power transmission and distribution
Analyzed the scenario of transmission and distribution system in Bangladesh based on energy inflow/outflow, demand, voltage, current, power factor, meter tampering, and compared smart grid with the present power grid of Bangladesh

Based off of the facts we know, should the attack be considered a crime, espionage or act of war? What should the US response be? How can the US best defend itself from future attacks such as the one that just occurred? Should the United States assign US Cyber Command with the responsibility of protecting certain private companies and if so, what should the general standard be for determining what companies the government should be responsible for defending?

Cyber Attack Mem

Instructions
The exclusive use of required texts and readings, as well as resources provided, is mandatory. No outside sources are expected.

Complete the following:

A recent cyber attack occurred where a botnet type attack targeted a major US defense firm. No physical damage occurred to the firm’s network, but significant technological secrets about a new surveillance and targeting system from the firm, Defense Applications International (DAI), appear to have been compromised. Incidental, but nonetheless as a result of the attack, the virus also infected a software program that DAI was testing at electrical plant in Pennsylvania. The plant had to be shut down for 12 hours while repairs were made. The NSA believes it has credible evidence that the attack had a direct connection to the elite cyber unit Department 2112, of the country of Redistan, an adversary of the United States, although the attack itself appears to include private citizens of Redistan. The attack, however, was routed through several third countries including Bluelandia, an ally of the United States.

You are a new cyber desk officer working for the National Security Council. The Deputy National Security Advisor has asked you to write a memorandum addressing key issues of cyber policy. In the memorandum you have been asked to address the following issues:

1. Based off of the facts we know, should the attack be considered a crime, espionage or act of war? What should the US response be? How can the US best defend itself from future attacks such as the one that just occurred?

2. Should the United States assign US Cyber Command with the responsibility of protecting certain private companies and if so, what should the general standard be for determining what companies the government should be responsible for defending?

3. Should the United States lead the effort at an international cyber agreement? Why or why not? What challenges would the President face in trying to get an agreement? Are there any alternatives?

4. Are there any substantive changes that should be made to the current US cyber policy?

Note: In crafting your memorandum you may allocate the content according to the importance of the issue. For example, you can allocate several pages to one issue if you believe it deserves more attention than the others; however, ensure that each question specified by the Deputy National Security Advisor is addressed. If you have read and understood the course material this will be a challenging, yet straight forward assignment.

Why do you want to study the course? What have you done that makes you suitable for the course? What else have you done that makes you somebody who will contribute to the course and to the university?

UCAS Application

Why do you want to study the course?
What have you done that makes you suitable for the course?
What else have you done that makes you somebody who will contribute to the course and to the university?

Tell us about a time you faced a challenge or obstacle. What did you learn from it, and how did it contribute to your success

Lesson learn from challenge \obstacle

It is often said that the road to success is paved with setbacks. Tell us about a time you faced a challenge or obstacle. What did you learn from it, and how did it contribute to your success?

The computing field relies on communication and collaboration. Further we believe diverse collaborations create better solutions. How do you plan to work with a diverse group of students, and what diverse perspectives will you bring? If you have applied before, what has changed since your previous application? If you have repeated courses, or overcome significant obstacles, explain.

Applied Computing major

We want to learn more about you and your plans for the University of Washington Bothell education and beyond. Why are you interested in computer science, and specifically UW Bothell CSS Program?

If you are applying to the Applied Computing major, discuss what required minor, second major, or other customized area of study you plan to complete along with your degree.

Do you have any experience in software or hardware development outside of the classroom? If so, describe.

The computing field relies on communication and collaboration. Further we believe diverse collaborations create better solutions. How do you plan to work with a diverse group of students, and what diverse perspectives will you bring?

If you have applied before, what has changed since your previous application? If you have repeated courses, or overcome significant obstacles, explain.

You are going to research a case that was recently in the media where computer forensics could have been involved. Write a 2 paragraph summary of the pitfalls and Obstacles the examiner may have had on that rase.

Assignment: Current Computer Forensics Case

Overview and Guidelines
You are going to research a case that was recently in the media where computer forensics could have been involved. Write a 2 paragraph summary of the pitfalls and Obstacles the examiner may have had on that rase. Deliverable To receive full points, follow the rubric and submit your answers in a word do€ or pdf in the submissions arena by the due date. APA Formatting

Note: The paper should be written in APA 7 Writing Style. The information about APA style you ran find here. Submit your paper by clicking the Start Assignment button.