Friday, February 14, 2020

Online Auction Fraud Research Paper Example | Topics and Well Written Essays - 1250 words

Online Auction Fraud - Research Paper Example After the invention of the computer, various networks were made to ensure the computers were able to communicate with each other. As time progressed, developments were achieved in the application of the internet in business transactions but the systems in place were not in a capacity to handle all the needs. This provided loopholes for the commission of internet crimes by criminals, as they would hide the identity while undertaking their attacks thus leaving limited evidence of themselves. In mid-1990’s, the internet frauds had increased to alarming rates and researches on the causes of the rapid growth and how it could be curbed were conducted. During the period towards the end of the twentieth century, the â€Å"dot.com† era, which was manifested by increased use of internet by organizations and people, resulted in increase of internet fraud. Due to the continuous technological advancement, the internet frauds have been on the increase with the current number of fraud s being around three times those conducted in mid-1990. There are two types of internet fraud namely offline and online. In offline fraud, the criminal usually steal personal data mostly financial and use it to make transactions. In the online fraud, criminals pose as esteemed institution and thus receive personal data, which they illegally use to make transaction. Some of the commonly used internet fraud include international modem dialer, investment schemes, fake legal schemes, market manipulation; work at home schemes, pharming, phishing, auction, and online shopping. This paper seeks to give an in-depth analysis of auction internet fraud. Online Auction Fraud Due to the continuous technological development, the internet has provided a platform in which direct interaction of the buyer and the seller is not necessary for a transaction to be effectively completed. Criminal have used advantage of this where they misrepresent a product advertised for sale through the internet auction site, fail to deliver the item, or deliver an item but not as specified by the customer after receiving all the money as stipulated in their agreement with the customers. This is usually defined as online auction fraud. To avoid one being a victim of such activities, it is often advisable to undertake a business transaction with companies or individuals one is well conversant with, clearly understand the contract terms, read the privacy policy and use the most secure means of remitting personal information (Royal Canadian Mounted Police, 2006). Methods of victimization Since the internet auction process involves bidding by the interested parties, some people use this opportunity to victimize their target customers. Some of the most commonly used victimization methods include: Non-delivery- this usually occurs when one puts an item for bid whereas no such item exists. Therefore, despite the customer satisfying all the conditions set, he will never get the item (Anon, 2009.). During the transaction, the sellers get the financial details of the customer and thus may use them to exploit him/her further. Misrepresentation- this is mainly executed by altering the actual details of an item in order to win a customer. In most cases, the images are used since they can easily be manipulated. Triangulation- this is somehow technical and involves a person buying something from an online seller using stolen details.  

Saturday, February 1, 2020

Link Layer Protocol Services to the Network Layer Assignment

Link Layer Protocol Services to the Network Layer - Assignment Example (Keith 2008) The services offered by the link layer to the network layer are usually hidden from the network layer which only sees the services as a reliable communication channel which can send and receive data packets as frames. Framing, addressing, error detection, error correction, flow control, link management and acknowledgement of frames are some of the services provided by the link protocols. The link layer groups bits of the physical layer into frames enabling transmission of data in a form that can be understood by the network layer. Since various network stations have different speed of operation, the link layer protocol provides flow control service that ensures no station in the network is swamped with data from fast devices within the network. In addition the link layer provides a link management services through collision handling and avoidance. (Nancy 1988) One major services offered by the link layer protocol is error detection and correction. It has error check incl uded in the frame header which provides a more sophisticated error detection and correction since it can detect single bit and a wide range of common multiple -bit errors. Error detection in link layer uses checksum which is the same as those used in IP in the network layer as well as TCP in the transport layer. ... The frames are organized in seven fields: PREAMBLE which is 7 bits long used to warm the receiver that data is coming, SOF indicates that the next bit of data will be the destination address, DA the destination address which identifies the receiver of the data, SA identifies the source address, Length which indicate the length of the payload data, DATA contains the data transmitted its length varies with the size of data and FCS which is used for error checking. In 10BASE-T the PRE field is used for receiver synchronization while 100BASE-T does not require the PRE field for transmission since it has an electrical encoding that is different from 10BASE-T. The signal of 10BASE-T frame is zero when it is not transmitting while 100BASE-T transmits and idle signal between frames. Collision detection Figure 5.14 According to the figure node D detects collision first before the other node B detects since its transmission start time is greater than the transmission start time of node D. Node D detects the collision before node B since it started transmission later after D had already started. Furthermore node D has a shorter round trip time as compared to node B. Node A does not realize that detection has occurred between node B and D since it is not involved in transmission. Node A only waits for the signal from B in case of a collision since after the collision Node B will try to retransmit the signal after random times until it reaches its destination. Jamming signal is a signal sent by the data station, informing the other stations not to transmit. In this case the jamming signal is sent by node D since it is the node that detects a collision