Deception Technique Using Remote Access Application
DOI:
https://doi.org/10.33516/maj.v58i5.70-73pKeywords:
No KeywordsAbstract
Cyber frauds increased during the lockdown period. Remote Apps like Anydesk, TeamViewer are used by fraudsters for executing malicious activity and the victim never knows what has happened. This article brings about an awareness about various tactics used by fraudsters resorting to Remote app technique. Different real time fraud cases are explored to understand the Remote App attack methodology. Customer fraud awareness index is also analyzed to check their responses towards attack simulating techniques. The purpose of the study is to educate people about Remote Access app technique and the preventive measures to avoid financial loss.Downloads
Downloads
Published
How to Cite
Issue
Section
References
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. https://doi.org/10.1016/j.chb.2014.05.046
Awale, S. M., & Gupta, D. P. (2019). Awareness of Sim Swap Attack. International Journal of Trend in Scientific Research and Development, Volume-3(Issue-4), 995–997. https://doi.org/10.31142/ijtsrd23982
Buil-Gil, D., Miró-Llinares, F., Moneva, A., Kemp, S., & DÃaz- Castaño, N. (2021). Cybercrime and shifts in opportunities during COVID-19: a preliminary analysis in the UK. European Societies, 23(S1), S47–S59. https://doi.org/10.1080/14616696.2020.1804973
Bureau. (2021). Digital frauds rising since Covid outbreak: Report. Www.Financialexpress.Com. https://www.financialexpress.com/industry/technology/digitalfrauds-rising-since-covid-outbreakreport/ 2242733/
Conteh, D. N. Y., & Royer, M. D. (2016). The Rise in Cybercrime and the Dynamics of Exploiting the Human Vulnerability Factor. International Journal of Computer (IJC), 20(1), 1–12. http://ijcjournal.org/%0Ahttp://www.ijcjournal.org/index.php/ InternationalJournalOfComputer/article/view/518/374
Corradini, I. (2020). Redefining the Approach to Cybersecurity. Studies in Systems, Decision and Control, 284, 49–62. https://doi.org/10.1007/978-3-030-43999-6_3
DNSstuff. (2020). What Is Remote Access? Definition and Best Software List. Dnsstuff. Com. https://www.dnsstuff.com/what-is-remote-access-definition
Flores, W. R. (2016). Shaping Information Security Behaviors Related to Social Engineering Attacks. In PhD Thesis. https://www.diva-portal.org/smash/get/ diva2:925493/FULLTEXT02.pdf
Jansen, J., & Leukfeldt, R. (2015). How People Help Fraudsters Steal Their Money: An Analysis of 600 Online Banking Fraud Cases. Proceedings - 5th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, June 2016, 24–31. https://doi.org/10.1109/ STAST.2015.12
Kumar, A., Chaudhary, M., & Kumar, N. (2015). Social Engineering Threats and Awareness: A Survey. European Journal of Advances in Engineering and Technology, 2(11), 15–19. www.ejaet.com
Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports, 23(4). https://doi.org/10.1007/s11920-021-01228-w
Pwc. (2020). Impact of the COVID-19 outbreak on digital payments Foreword (Issue April). https://www.pwc.in/consulting/ financial-services/fintech/dp/ impact-of-the-covid-19-outbreakon-digital-payments.html
Rosencranc, L. (2020). Remote access. Techtarget.Com. https://searchsecurity.techtarget.com/definition/remote-access
Sinha, D. (2020). Digital Payments Fraud Concern Grows In India, Reveals Survey. India.Com. https:// www.india.com/business/digitalpayments- fraud-concern-grows-inindia- reveals-survey-4728657/
Venkatesha, S., Reddy, K. R., & Chandavarkar, B. R. (2021). Social Engineering Attacks During the COVID-19 Pandemic. SN Computer Science, 2(2), 1–9. https://doi.org/10.1007/s42979-020-00443-1