Monday, December 30, 2019

The Issue And Action Of Drugs - 941 Words

War on drugs has been an issue in the United States for several years now. Being a college student at East Carolina University, I have met several people in the community and have witnessed a lot. As I continued to grow as an adult at East Carolina, I began to fully understand how serious of a problem drugs were. People see doing drugs as a way to fit in with others, using it for social purposes. After having friends go to the hospital or sadly, die from an overdose on drugs, I have decided to take action myself. It seems that the majority of the people today do not want to fully understand the consequences that come from drugs. Yes, they feel sympathy for those who have passed away from overdose or mixing drugs with other drugs but do not seem to change their ways any. We first as a community need to understand and accept the fact that drugs are a serious issue and action needs to take place. The solution to preventing people from getting their hands into addictive drugs and becoming addicted to them is for our community and law enforcement to collaborate and start a prevention agency. Firstly, it all starts with the children and I believe we should start trying to find a way to keep drugs away from them. We need them to understand at a young age that doing drugs is not something cool to do even though you may see it as a fun time like television shows and movies make it out to be. This is when parents and school systems should play a big role. They need to let kids knowShow MoreRelatedThe War On Drugs : A New Us National Security Doctrine1442 Words   |  6 Pagesconcept of security has meant that other issues, additional to ones outlined by the traditional definition, are included in it’s conceptualization. This means that the concept of security has grown to include environmental, economic, and social issues of security which have a big effect on how security i s understood in general. Within the domain of social issues, they can be further broken down to include things like the war on drugs, which as a social issue has had a unique effect on the securityRead MoreDrugs and Ethics Essay example1150 Words   |  5 Pagescompanies tend to use shortcuts that create ethical problems. Drug companies have spent millions/billions of dollars in research, and they obviously want to see favorable results during the testing stage so they know that they didnt spend all that money for nothing. The companies usually are the ones who influence what, when, how and who tests their drugs. This gives them an influential leg up on the negative outcomes. Sometimes, drug companies have even resorted to testing on individual withoutRead MoreDrugs and Alcohol1682 Words   |  7 PagesBackground 1 Objectives 2 Proposed Actions 2 Anticipated Outcomes 3 Key roles and responsibilities 3 Timelines and resources required 3 Key risks 3 Evaluation Method 3 References 4 Background Drugs and alcohol is a major social issue (J. David Hawkins, Richard F. Catalano, and Janet Y. Miller, 1992). It is not something that can be solved by the law (Lee P. Brown, 2008). Throughout history, many attempts have been made to try and legalize and control alcohol and drug addiction but has failedRead MoreFactors That Affect The Rate Of Drug Distribution704 Words   |  3 Pagesrate of drug distribution. Absorption The main factor which relates to absorption of drugs is the route of administration. Physiological considerations in absorption are blood flow, total surface area, time of arrival of the drug and time of drug at absorption site. Other considerations for absorption are solubility, chemical stability and how soluble the drug is in lipids. Distribution Drugs are distributed into major body fluids (e.g. plasma). Specific tissues may take up certain drugs (e.g. iodineRead MoreThe Disastrous Effects Of Parental Drug Addiction On Children1478 Words   |  6 PagesThe Disastrous Impact of Parental Drug Addiction on Children Drug addiction is a serious issue in not only America today, but globally. According to the National Institute on Drug Abuse, substance addiction is a â€Å"chronic, relapsing brain disease that is characterized by compulsive drug seeking and use, despite the harmful consequences† (â€Å"What is drug addiction?†). Drug abuse affects not only the user, but those around the user as well. The actions of a drug user place a significant amount of worryRead MoreModule 3 Questions Essay1299 Words   |  6 Pagesï » ¿ 1. Are drug companies that test experimental drugs in foreign countries acting ethically? Drug companies that test experimental drugs in foreign countries are not acting ethically. Testing of experimental drugs should be done in the country where the drugs are being manufactured. The major ethical dilemma is that the foreign countries that these clinical trials are not fully educated on the risks and understand what they are getting themselves into. In the article, many things stood out thatRead MoreEssay about Counter Narcotics634 Words   |  3 PagesUnited States has a very stern policy regarding the use, distribution, and trafficking of drugs. However, it is clear that the current U.S. policy is failing, and the supply of illegal drugs as well as the demand is increasing. The U.S. government has focused for years on dealing with the demand aspect of this issue. Through government programs directed towards education and national awareness of the harm that drugs cause, the government has been attempting to severely reduce the demand for narcoticsRead MoreThe Role Of Ethics And Differences For Nurses1613 Words   |  7 Pagespriority of physicians is different than the priority for nurses. Although they both want the best for their patients’ health, nurses are not met with the same high demands as doctors. The modern practice of medicine raises a plethora of complex issues, medical, ethical and legal and while the nurses is primarily focused on the patient, the doctor has much more to consider. Representatives from Industry: Insurance Companies Insurance companies are responsible for selling health care plans to peopleRead MoreHarmful Effects of Drugs on the Human Body1124 Words   |  5 Pagesto their bodies without any further thoughts of the impacts, for example like drugs use. From my own perspective, I believe that there must be a limitation on the use of strong drugs such as cocaine, heroin, and methamphetamine which have high tendency of addiction. Besides, these kinds of drugs will lead to a drastic changes not only mentally but also physically. Behaviors are one of the obvious changes on the drugs user which will led them to harm a person regardless who such as his or her familiesRead MoreThe Peoples Republic of Bangedesh is Combatting Drug Trafficking863 Words   |  4 PagesRepublic of Bangladesh adheres to the international effort in combating the illicit trade of drugs through multiple United Nations treaties such as the 1961 First Convention on Narcotic Drugs, the 1971 Convention on Psychotropic Substances, and the 1988 Convention against the Illicit Trade in Narcotics Drugs and Psychotropic Substances. Bangladesh stresses the need of addressing the illicit trade of drugs within the respective borders of Member States alongside an active participation of the international

Saturday, December 21, 2019

Challenges Faced By Starbucks Swot Analysis - 1547 Words

COURSE ID: NAME: SUBMITTED TO: SUBMITTED BY: DATE: TABLE OF CONTENTS Part 1.1 Introduction of the report Overview of the company Products adapting strategy Problems associated with clients Challenges faced by Starbucks Part 1.2 Situational analysis SWOT analysis PESTEL analysis Mc Kinsey 7s ASSESSMENT 5 PART 1.1: INTRODUCTION OF THE REPORT: In this section we have to discuss the company brief introduction such as how the company is facing client’s problems and how this company suggests solutions of the problems OVER VIEW OF THE COMPNAY: The STARBUCKS the well known brand of coffee who is selling high quality of roasted coffee beans the company is operating in more than 7300 coffee shops in USA and approximately 3000 in other 34 countries. Starbucks offers a great range of coffee beside this the company also feature Tazo teas; pastries and other food items; espresso machines, coffee brewers, and other coffee- and tea-related items; and music CDs. It is a public company having 115,000 employees. The company delivers its business by promoting and delivering its coffee to restaurants, hotels, educational institutions, health care centers and many airlines as well to enhance the sales growth of the business of the company In addition, Starbucks markets its coffee through grocery stores, food service customers, and licenses its brand for other food and beverage products. Starbucks having a variety of products and a wide range of productsShow MoreRelatedStarbucks Keeps It Brewing in Asia1676 Words   |  7 PagesAssignment #1: Starbucks Keeps It Brewing In Asia Sarah Bean Consumer Behavior MK510 Professor Kelly Bruning April 15, 2012 Abstract The following paper will discuss how Starbucks would utilize tea and instant coffee in marketing and conducting business in Asia. In this particular aspect I will discuss the culture, habits, and perceptions of tea on the Asian culture. Starbucks has the opportunity to capitalize on a top fixtureRead MoreSWOT Analysis of Starbucks1304 Words   |  5 Pagesï » ¿Starbucks SWOT Analysis Name Institutional Affiliation: Starbucks SWOT Analysis Introduction Starbucks Corporation is a world coffee company and a house chain with headquarters in Seattle, Washington. This company is the largest in the world with most of its activities dealing with coffee-products making. It has twenty thousand three hundred and sixty six stores in sixty-one countries. Most of the stores are in the United States of America. Starbucks Company trades cold drinks and hot drinksRead MoreThe Starbucks Corporations Marketing Strategy1293 Words   |  5 PagesStarbucks Marketing Strategy: The Starbuck Corporation is considered as the one of the leading firms across the globe in specialty coffee consumption. Since its inception and launch in a market in Seattle, Washington, the company has developed to extent with which it offers quality premium coffees with an excellent level of customer service and at reasonable prices worldwide. The growth and profitability of this company is attributed to its development and use of an effective marketing strategyRead MoreStarbucks The Largest Global Coffee Company Essay1963 Words   |  8 Pages2014). However, Starbucks the largest global coffee company has entered India to compete with Indian local coffee company especially Cafà © Coffee Day. Starbucks has brought its strong capital, the premium level of service and the high quality of coffee product and cooperated with the largest business conglomerate in India. The problem is how CCD could maintain its market leadership facing with the expansion of Starbucks. In this report t hat the main competitive advantages and challenges of CCD are explainedRead MoreChallenges in the External Environment of Starbucks3117 Words   |  13 PagesChoose an international business that interests you. Identify challenges in its business environment that are of current strategic importance. How, in your opinion, should the international business you have chosen respond to those challenges? An international business, often referred to as an MNE (Multinational Enterprise) is one which has a wide-reaching approach and will operate in more than one country. Recognisable international businesses include the likes of McDonald’s, Apple and BP. AlthoughRead MoreStarbucks SWOT Analysis1001 Words   |  4 PagesStarbucks SWOT analysis allows the company to see their current position in the coffee industry. The company’s strengths are that it is a market leader In the coffee industry, it has 16,859 stores by the end of the year 2010 and continues to grow (Starbucks Corporation, 2010) a second strength is the expansion rate they have of opening stores internationally and domestically the only fault with the expansion is that they are opening stores that are right next to others and losing money in each storeRead MoreThe Brand Awareness Of Multinational Companies And Social Media Essay1741 Words   |  7 Pagesperception. To conclude, â€Å"there is a lack of marke ting infrastructure and skills amongst practioners in social media due to its fast growing nature.† (Trends Snapshot: Brands and niche social networks, 2013). Additionally, the language is one of the challenges faced by multinational companies, â€Å"Consumers using social media communicate in their own language, which means that a social media team must be able to understand the different languages of fits customers base, for a large multinational corporationRead MoreThe Coffee Market Of India Essay2021 Words   |  9 Pages would pose a major challenge on the performance and market share of CCD. In the given case analysis, we would analyse the most important competitive advantages and challenges of CCD when compared with StarBucks as well as how the Management of CCD should react to challenges posed by Star Bucks in India. Also we would discuss about a Corporate Social Responsibility(CSR) or a Corporate Shared Value(CSV) which CCD should introduce in its operations. For the purpose of analysis the tools which haveRead MoreEssay MKT 505 ASSIGNMENT 34730 Words   |  19 Pagesï » ¿ Entry Plan into International Market Starbucks Assignment 3 Frederick Thomas International Marketing Summer 2014 Instructor: Dr. Alexander Onukwugha Executive Summary: The following report consists of the entry mode chosen by STARBUCKS to enter the Indian Market of Coffee House. This Report will give you a better understanding about an organization’s require to expand globally. Globalization plays a very important role for any organization. It helps the companyRead MoreCase Study : Ccd Vs. Starbucks Essay2150 Words   |  9 Pages Individual Assignment Case Study: CCD vs Starbucks in India 1. Introduction to the Case Cafà © Coffee Day, the Indian locally brewed coffee chain, started their operation in the southern city of India, Bengaluru, in 1996. V.G. Siddhartha, owner and chairman, Amalgamated Coffee Bean Trading Company, initiated his career as a trader of coffee post the de-regularization of the coffee market in 1993. He then started India’s biggest retail coffee chain – Cafà © Coffee Day (CCD). Since its inception

Friday, December 13, 2019

Ap Psychology Fall Term Project Free Essays

AP Psychology Fall Term Project Introduction I am more interested in the abstract and philosophical aspects rather than the more concrete biological aspects of psychology. The topic that interested me the most so far this year and the topic that I continued to research was the topic of morality. I didn’t have a specific question I wanted to address but as I read some articles about people who were institutionalized for violently expressing psychopathic personality traits, I came across an article that asked a question of its own. We will write a custom essay sample on Ap Psychology Fall Term Project or any similar topic only for you Order Now The article brought up the idea that traits of psychopathy including ruthlessness, charm, mindfulness, focus, fearlessness, and action can be beneficial to the individual. From this idea, the question I sought to answer was â€Å"If we all take on typically immoral psychopathic tendencies, are they no longer immoral? † Summary The article I read came from Scientific American adapted from the non-fiction book The Wisdom of Psychopaths: What Saints, Spies, and Serial Killers Can Teach Us about Success by Kevin Dutton. The main question posed by Dutton is: Can the typical traits of a psychopath benefit people at certain points in their lives? The article is more of an interview with some patients at Broadmoor, â€Å"the best-known high-security psychiatric hospital in England† and an observation rather than a study with measurements and variables. However, applying knowledge of Kohlberg, Brofenbrenner, and Gillian’s theories make the article even more interesting. In the article, Dutton discusses the inmates’ solutions to problems similar to that of the Heinz dilemma, psychopathy and the brain, and a relation to psychopathic traits to religion and happiness. If what he discusses were put into terms of variables, the independent variable could be expression of psychopathic traits and the dependent variable could be anything the traits effect from happiness to inner or universal morality. Discussion In the article, the ideas of the psychopaths can be looked at and evaluated using both Kohlberg and Brofenbrenner’s theories on moral development. In the article Dutton asks one of the inmates a hypothetical question. An old woman moves out of her house to live with her daughter and son-in-law. The house is in an up and coming neighborhood and she can get a good price if she sold it. The only problem is the tenant who doesn’t want to move out. How do you get the tenant to leave? The first thing the psychopath said was â€Å"I’m presuming we’re not talking violence here† indicating that psychopaths do have a sense of the Level II conventional morality described by Kohlberg. The psychopath recognizes that violence is typically punished and looked down upon by law and society, putting the psychopath into at least Stage 4 of Kohlberg’s theory of moral development. Essentially the psychopath solves the problem by saying that someone should pretend to be someone from the health department and tell the tenant that the house is not safe to live in and he must leave as soon as he can. He doesn’t explain his reasoning but most psychopaths are concerned with one thing only: getting the job done. However, the article doesn’t go into why or how the psychopath determined this was the best way to remove the tenant. If the psychopath figured the action would lead to reward (getting the tenant out) and that is the only consequence, he would be in Stage 1 of Kohlberg’s theory and orientation 1of Bronfenbrenner’s theory. On the other end of the spectrum, if the psychopath figured that if the house got sold and the old woman and her daughter and son-in-law could live comfortably, that the expulsion of the tenant (whether he became homeless or even finds another place to stay) would be the greatest good for the greatest number, putting him in Stage 5 of Kohlberg’s theory. This would be orientation 4 of Bronfenbrenner’s theory called objectively oriented morality in which the standing goals of the group override that of the individual. As the conversation continues, the discussion turns to worrying about the future affecting actions in the present. The psychopaths discuss the idea that there’s no use in getting your mind wrapped in what might happen when everything in the present is perfectly fine and that you shouldn’t let your brain get ahead of you. Do in the moment what makes you happy. Dutton describes this as mindfulness. Dutton brings up the fact that embracing the present is something that psychopathy and schools of spiritual enlightenment have in common. When it comes to psychology, Dutton brings up a â€Å"mindfulness-based cognitive-behavior therapy program for sufferers of anxiety and depression. † Surely, mindfulness and living in the present has its benefits but ignoring the future can produce dangerous consequences as well. Since some stages of morality are based on self satisfaction, others the law and religion, and further the good of society, I have answered my question â€Å"If we all take on typically immoral psychopathic tendencies, are hey no longer immoral? † The answer I came up with is, â€Å"it depends. † The reason â€Å"it depends† is because, well, it does. Anyone can have psychopathic traits of mindfulness, ruthlessness, action, charming, and fearlessness; it’s just about how we use them. Sure, Dutton suggests these traits can lead to happines s and success, but in the right amount and for the right reasons. What we consider the â€Å"right reasons† and â€Å"right amount† is also based on our own levels of morality. If everyone was charming, fearless, ruthless, and mindful, we would all be doing what we could to get ahead and be happy. If doing what is necessary to be happy and get ahead became a universally moral idea, then sure, there wouldn’t be a problem with psychopaths, liars, and cheaters. But in the world in which we live, where we all have our own different ideas of good and bad with exceptions and loopholes included, under the â€Å"right† circumstances, these traits are acceptable and useful, but at the â€Å"wrong† times they can be damaging and violating. Should we all just become psychopaths? I guess it just depends. Citation Dutton, K. (2013, January). Wisdom from Psychopaths? [Electronic version]. Scientific American. How to cite Ap Psychology Fall Term Project, Essay examples

Thursday, December 5, 2019

Definition of Phishing Attack & Types

Question: Describe the phishing and its type and what isProtection of phishing Attacks? Answer: Introduction According to Agarwal et al. (2007) PHISHING is the process of criminal fraudulent that acquire sensitive information including details of credit or debit card, information of computer via web browser, user id, password, etc. The technology of PHISHING was built using the masquerading entity based on trustworthy in the electronic communication system. PHISHING is the term that available in computer security system. Huang et al. (2012) argued that in computer security system, PHISHING is the system of email fraudulent that divulge the users personal data for using the illegitimate purpose. The tools and techniques of PHISHING allows to hack the additional information such as user id and password of debit or credit card number, details of bank account with digital signature, security of numbers of social, etc. The technology of PHISHING creates high risks especially for the online business. Using PHISHING technology, attackers is able to steal credential information in an indirect way. 1. Types of PHISHING In these days of new innovative technology, PHISHING has spread in the overall email services such as SMS, social networking, sites, multiplayer game, instant messaging, VOIP, etc. There are several categories of PHISHING such as Spear PHISHING, Phone PHISHING, Clone PHISHING, etc. Figure 1: Types of PHISHING (Source: Jansson Von Solms, 2013, pp- 587 ) Spear PHISHING: This type of PHISHING technology targets the specific group such as bankers, big business man, dealers, raw materials suppliers of MNC companies, etc. Spear phishers targets people based on sections or group of an organisation instead of targeting individual people. Whaling is the main type of attack of spear phishers. For instance, it has been identified that in 2008 several CEOs (Chief Executive Officers) in USA were targeted by the spear phishers (Roughan Chang, 2013). It affected in the system of CEOs during the view of the attachment. Apart from that, majority of big organisation such Prime Ministers Office of Australia, Government of Canada, Federal, National Laboratory of Oak Ridge, HBGray and much more were the victims of spear PHISHING in late 2010 to 2011. Figure 2: Examples of Spear PHISHING (Source: Wenyin et al. 2012, pp- 59) Clone PHISHING: Clone PHISHING is the most common attack techniques that used by the hackers. Phishers of clone PHISHING creates the technology of cloned email. Clone phishers send some malicious links through emails to the users and access information about the email users such as user id and password (Jingguo et al. 2012). Apart from that, clone phishers include spoofing technology that helps in showing the end user that emails comes from the original sender such as MNC companies, Big telecommunication organisations, Respectable person etc. In order to mitigate this problem, end user has it use updated trapping strategy or re-send the emails to original sender. Figure 3: Example of Clone PHISHING (Source: Jingguo et al. 2012, pp- 361) Phone PHISHING: Phone PHISHING is also an important technology from the view point of attack. This type of phishers send message to end users by describing to dial a phone number to know the bank account details. The equipment of traditional phone has dedicated the lines such as being busy to manipulate, voice over IP etc. Using this technology, phishers provides the voice over IP and prompts to put the bank account numbers along with pin to the end user. In order to avoid phone PHISHING, user has to use caller ID spoofing. Caller ID Spoofing helps in prohibiting the Voice over IP according to law suite of calling. Apart from that, Caller ID Spoofing allows only the trusted sources call into the mobile phone device of users. Figure 4: Phone PHISHING examples (Source: Yearwood et al. 2011, pp- 11) 2. Examples of PHISHING There are several examples of email PHISHING has been seen since last few years. Example 1: In 13th January, 2015, one email has been in the campus of Cornell University. The IT department of Cornell University was received one email which subject was IT Service Desk Support. In the body of this email it was identified that the sender was IT Service providers of Cornell University. Sender of this emails advices to the IT department for re-activated their email account. Apart from that, it was also seen that sender of this email suggested to upgrade the email account of IT department of Cornell University into Microsoft Outlook 2015. Moreover, in that email, sender was also mentioned that if the user ignore or do not complete the procedure then emails account of IT department of Cornell University inactivated. Following is the snapshot of incoming email for IT department of Cornell University - Figure 5: Example of Phishing (Source: Itservices.stanford.edu, 2015) Example 2: In 20th June, 2014, student of Stanford University of Computer Science department received mail that their cs-standford.edu email account had been affected by the virus system. Therefore, the mail delivery system does not work properly. Moreover, the sender of this mail suggested in updating the email account setting in order to protect email from virus. Following snapshot demonstrates the incoming mail details for Computer Science students of Stanford University Figure 6: Example of Phishing (Source: Utdallas.edu, 2015) Example 3: Phishers send one email as helpdesk service providers of The University of Texas at Dallas into the email of info@utdallas.edu. This mail was about to become webmaster to the students. Through the email, sender explained that students are able to create account from new computer of the University and for security maintenance of the account has to click a link. Sender attached one link and below described that if the user is able to get good security practice as well as upgrade their online account of University of Texas at Dallas by clicking on that link. Following figure demonstrates the exact details of email PHISHING at University of Texas at Dallas Figure 7: Example of Phishing (Source: Custom Web Development, 2015) 3. Techniques of PHISHING Figure 8: PHISHING Techniques (Source: Jingguo et al. 2012, pp- 349) Web Spoofing: Web spoofing is the greatest technology of accessing information of users. Phishers using the technology of web spoofing design a fake website that looks like original. Therefore, victims enter their information such as user id, password, and personal information into the layout page of fake website. Clone phishers designs these types of websites using the copy paste techniques of front code of a genuine websites. For example, clone phishers designed there site paypel.com from the genuine source of paypal.com. In order to design these types of websites, phishers used Fiddler2 or squid proxy software. This function allows in designing the all sign in methodology or service of the genuine sources to clone phishers. However, majority of modern web browser such as Safari, Google Chrome, Firefox, etc built on the basis of internal security in order to protect the users from phishing scams including the indicators of https (Hyper Text Transfer Protocol Layer Security). Https padlock provides the secure transformation methods via public key infrastructure (Maurer Huaymann, 2014). Therefore, in modern browser if the user visit website and that website does not authenticated or from genuine source it displays the un-trusted certificates. Email Spoofing: This technology used widely by the attackers in terms of knowing personal information of users. Attackers using the UNIX system claims a mail to user account that looks it comes from original sources whenever, it was generated from different sources. It is the most appropriate and common used technology by the phishers. Phishers are able to provide spoofed mails to the user account because core of Simple Mail Transfer Protocol does not make any authenticity. At the transport level, Simple Mail Transfer Protocol cannot authenticated and do not maintain the real mail security in the message body such as Multipurpose Internet Mail Extensions (MIME), Pretty Good Privacy (PGP), etc. Apart from that, SPF (Sender Policy Framework) in email service is open standard. Therefore, the technology of Sender Policy Framework is not able to protect forgery of sender address. In order to protect the email spoofing, user has to use Heuristics based detection methodology. This type of techniques allows users in identifying phishing emails into mailbox. Therefore, technology of heuristic is the observation and showing toolkit that demonstrates the high degree of similarity. Link Manipulation: Majority of phishers uses several types of technical deception in order to design a link in mail for organizing spoofed. Majority of phishers uses the sub domains system or misspelled URLs for phishing the information such as paypel.com instead of paypal.com. Apart from that, phishers uses also another trick named anchor text in order to make the appearance of created link like valid or original sources. However, this type of technology allows phishers in accessing users personal information via the generated fake link. In earlier, majority of phishers uses the symbol of @ for creating a link because it is the original intended way of accessing information such as username and password in a web link. This type of emails disable in the Internet Explorer where as Opera Mini web browser or Mozilla Firefox or Google Chrome opted a warning message about the wrong authentication and ask queries to users for further progress. Majority of users are not able to handle Internationalized Domain Name (IDN) in the web browser. IDN modification or appropriate setting in web browser protect the user from accessing unauthorized web address and lead the unauthenticated web browser in another way such as malicious. Setting of IDN in web browser provides advantage to protect attacks from phishers. PDF Documents Phishing: In the electronics text format, PDF (Portable Documents Format) is the trusted and most popular description format. Therefore, phishers tracks the PDF using portability and interoperability in different platforms. In order to view the documents, PDF was design with wide range of program with string execution feature. Therefore, attackers or phishers remove some features or misused the functionalism and take the advantage of extracting users information. In order to protect the phishing via PDF documents, user has to modify the AcroRd32.dll and RdLang.FRA files in PDF document files along with malware. 4. Damage Caused by Phishing According to Dodge Futcher (2013), phishing is the technology that damaged users email account, create substantial financial loss, unauthenticated report when access account that created by the user oneself. In these days of internet technology, phishing style is becoming the most popular identity. Majority of people is not understood the exact technical fault or fake website. Therefore, these type of people often divulge their personal information to phishers such as name, age, date of birth, credit or debit card number, maiden name, social security numbers, etc. Using this information, phishers access the public records and misused it such as pan card number, details of passport, etc. After accessing users personal details, phishers creates one fake account using the name of user and debit the whole amount from victims account. Roughan Chang (2013) argued that in USA more than $929 million in USA credit or debit the phishers during 2004 to 2005. Apart from that, in USA due to phishing business of the country faced total $2 billion on that year. On the other hand, Australia is best known for web banking fraud that mostly occurs from the viewpoint or using technology of phishing. Yearwoodet al. (2011) opined that in 2005, United Kingdom loses total 1.8 billion that caused by the phishing. 5. Anti PHISHING Phishing is a criminal activity that acquires sensitive information about the organization or any individual like the usernames, passwords and details of credit cards. In order to prevent the phishing activity, various techniques can be adopted. Various legislation and technology can be adopted to protect phishing activities. Figure 9: Anti Phishing (Source: Jakobsson Myers, 2007, pp- 65) 1. Social response The users have to be trained to deal with the various attempts of phishing. Spear phishing has been adopted as a new tactics which using phishing emails targeted at a specific company. The users are trained at various locations. They were also trained at West Point Military Academy. An experiment was performed using spear phishing in which the cadets of the academy were sent fake email. They revealed their personal information on receiving the email. Modification of the browsing habits can prevent the users from phishing attempts. The users receiving emails for verification of their accounts can contact the company sending the email directly before opting for the verification. The email messages from the companies that are legitimate to their customers will contain information that cannot be availed by the phishers. There are several companies, for e.g. Pay Pal which address their customers by the username in emails. Therefore, if the user receive an email in the generic fashion (Dear Pay Pal customer), it can be consider as an attempt of phishing. Personal information alone cannot be a sign of legitimacy. The success rate of the phishing attacks does not always depend on the information provided. With the development of technology, people are becoming aware of the various phishing techniques. Thus the conventional techniques of phishing will become obsolete in the near future as they are becoming aware of the social engineering techniques that are used by the phishers (Jakobsson Myers, 2007). 2. Technical response The measures of anti phishing have been implemented as features that have been embedded in browsers, as extension of the tool bars for the browsers and part of the login procedures of the websites. The various approaches to the problem are as follows Users has to identify the legitimate sites The act of phishing is based on impersonation. The prevention of phishing will depend on the users use of information in a reliable manner so that they are able to identify the websites that they are dealing with. The pet name extension for Firefox helps the users to provide own labels for the websites. This helps them to recognize whether they are back at the correct site. If the user suspects the site, then software will warn the user of some potential malware. Alerting users about the fraudulent websites Another way the user can fight against phishing is via maintaining a list of the various phishing sites and checks the websites against the list. Mozilla Firefox 2.0, Opera contain anti phishing measures. The anti phishing software used by Firefox 2 is that of Google. However in some cases the privacy of the user is under threat as the implementations send the URLs to the central service so that it is checked. Another method of Anti Phishing introduced in the year 2006 involves switching to using special DNS service. In this service, the known phishing domains are filtered out that can work with any browser. The principle is very similar to using host file to block the web averts. The problem of phishing can be mitigated by spoofing a victim site and embedding the images in the spoof site. In this way phishing activity can be detected. Augmenting login passwords In order to prevent phishing activity, Bank of America has asked the user to select a personal image and the user personal image is displayed along with the password. The users are asked to select the password when they see the selected image. If the image is not correct then the site cannot be considered to be legitimate. Elimination of the phishing mails Elimination of the phishing mails can be done by using spam filters. This will reduce the number of phishing emails that is received by the users (Anti-abuse.org, 2015). 3. Legal aspects There is not much legislation related to phishing. Lack of Government awareness can be a major reason behind such activity. The technical and educational solutions against phishing can be possible with support from the Government. The UK Fraud Act 2005 covers the fraud that occurs by false representation. However this does not specifically mention to phishing. The end user along with Government is unaware of the various phishing activities. In 2005, a bill named Anti Phishing Act was implemented. The bill criminalized the internet scams involving fraudulent activities obtaining the personal information which is known as phishing was presented to the senate of United States to combat activities of phishing. A five year prison sentence was announced for falsifying the websites of the corporate and emails. However the Anti phishing Act has not been implemented at the Federal level but there are few states like Arizona, California and New Mexico having strict laws of anti phishing (Shi Saleem, 2015). 6. Protection of PHISHING Attacks Detection of Phishing Attack: In order to protect phishing attack, user has to be wary about the asking of confidential information in emails. User of email has to be much careful during they provide their financial information in reply of an email. People have to be aware about their legitimating information because authenticated organisations never ask or request for sensitive information through email. Wenyin et al. (2012) argued that bank of industry never ask the users for account details or related sensitive information such as maiden name, nominee name of bank account or IFSC code without aware people manually or contacting with them. Prevent the delivery of Phishing message: User has to use secure tactics during information providing or updating the emails account. User has to use the following methods for preventing the delivery of phishing message such as Filtering User has to use the proof point MLX filters for structural tests as well as the detection of malicious. Apart from that, user has to examine the context and content of emails using URL detection technology. Moreover, user required to set or target the rules in term of phishing attacks via accurate filtering. Authentication Majority of phishers attacks or target those account that domain are not protected. In order to prevent spam message or protect phishing, user has to set up their email account according to the providing guideline oh help pages such as DMRAC, SPF, DKIM, etc. Maintain Security: Before replying the message that comes in email box, user has to check the validation of email ID using the methodology of go direct. In each website there was a privacy policy that appears at the bottom of the page. User has to check the privacy policy and identify whether it is or not in mailing lists. Apart from that, user of email account has to use antivirus software such as Norton Security, Kaspersky Internet Security, Quick Heal Total Security, McAfee, etc in their devices. These anti-viruses will allow user in preventing malware that comes in devices via emails. Never respond for the emails related to personal financial information: Bank or other authenticated e-commerce companies design their email and personalize their emails several times, but phishers are not. Majority of phishers uses false but sensational message such as urgent, update required. Apart from that, reputed companies like Bank never ask for username and password until the user gives a phone call or inform before sending mail to user. Sender Policy Framework (SPF) has to use in the setting of emails by the users. This technology is the most valuable or appropriate forgery solution of phishing attack. SPF involves with the publication of links that list details about the incoming server. Checking of Security of Website: In order to submit the bank details, user need to check websites security. Following steps has to use for protecting personal data in order to protect phishing Type the incoming web address in address bar of web browser. Check that websites browse through secure server and it start with https:// instead of https://. (https is stand for hyper text transfer protocol layer secure). Need to check the lock icons in web address bar of browsers status bar. Apart from that need to check for the encryption and the expressed in bits without moving cursor. Understand that website necessarily used encryption method in terms of sending data. 7. Solution of Cross Site Scripting Problems In order protect the cross site scripting problems; user has to implement PHP anitXSS in their web browser. The programming language of PHP library will allow user in adding extra secure layer of protection. Jansson Von Solms (2013) depicted that it automatically detect methods of encoding that filtered. Xss_clean.php. filter will be the technology of strong filtering. It cleans wide range of URL encoding and nested exploits. Moreover, user has to set the flag for cookies HttpOnly in the scripting language. It helps user in accessing only trusted web site instead of fake websites. Conclusion This study deals in describing the overview of PHISHING. Use of internet is increased day to day; therefore chance of attack or hack is also increased. In this report, it has been seen that there were three types of PHISHING including Spear, Clone and Phone. Spear phishers sent fake subpoena with the attachment file where included smaller malware services. Through the cloned email, they can generate information about the hosting computers. However, here analyst explains the four different techniques of PHISHING such as web spoofing, email spoofing, link manipulations and PDF Document Phishing. Describe the anti phishing technology such as social response, technical response and legal response. Moreover, provides mentioned the process of protecting PHISHING to users. Reference List Books Dodge, R., Futcher, L. (2013). Information assurance and security education and training. Berlin: Springer. Jakobsson, M., Myers, S. (2007). Phishing and countermeasures. Hoboken, N.J.: Wiley-Interscience. Maurer, M., Huaymann, H. (2014). Counteracting phishing through HCI. Munchen: Universitatsbibliothek der Ludwig-Maximilians-Universitat. Roughan, M., Chang, R. (2013). Passive and active measurement. Berlin: Springer. Journals Agarwal, N., Renfro, S., Bejar, A. (2007). Phishing forbidden. Queue, 5(5), 28. Huang, H., Qian, L., Wang, Y. (2012). A SVM-based Technique to Detect Phishing URLs. Information Technology J., 11(7), 921-925. Jansson, K., von Solms, R. (2013). Phishing for phishing awareness. Behaviour Information Technology, 32(6), 584-593. Jingguo W., Herath, T., Rui Chen, Vishwanath, A., Rao, H. (2012). Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email. IEEE Trans. Profess. Commun., 55(4), 345-362. Wenyin, L., Liu, G., Qiu, B., Quan, X. (2012). Antiphishing through Phishing Target Discovery. IEEE Internet Comput., 16(2), 52-61. Yearwood, J., Mammadov, M., Webb, D. (2011). Profiling phishing activity based on hyperlinks extracted from phishing emails. Soc. Netw. Anal. Min., 2(1), 5-16 Websites Anti-abuse.org,. (2015). Phishing: General Information | The Anti-Abuse Project. Retrieved 20 January 2015, from https://www.anti-abuse.org/phishing-general-information/ Utdallas.edu, (2015). Information Security - The University of Texas at Dallas. Retrieved 20 January 2015, from https://www.utdallas.edu/infosecurity/Phishing.html Cs.arizona.edu, (2015). Retrieved 20 January 2015, from https://www.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic5-final/report.pdf Custom Web Development, C. (2015). IT: Example of "Phishing" Email. It.cornell.edu. Retrieved 20 January 2015, from https://www.it.cornell.edu/security/phish.cfm?doc=573 Itservices.stanford.edu, (2015). Recent examples of phishing | IT Services. Retrieved 20 January 2015, from https://itservices.stanford.edu/phishing Shi, J., Saleem, S. (2015). Phishing (1st ed., pp. 2-11). Retrieved from https://www.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic5-final/report.pdf