•  
  •  
 

Keywords

Cyber Secruity, Credential stuffing, Phishing, Malware

Abstract

Every year, millions of people have their credentials stolen by cybercriminals. Criminals use simple techniques such as phishing to manipulate people into giving up their usernames and passwords. This can lead to major assets being compromised or stolen. Unfortunately, criminals know that many individuals reuse the same passwords or variations of the same password across many sites. Criminals use this information to test stolen passwords on other sites, which can be done on a massive scale. Such attacks can become life-threatening and destructive to many companies and individuals.

Share

COinS
 

Marriott Student Review is a student journal created and published as a project for the Writing for Business Communications course at Brigham Young University (BYU). The views expressed in Marriott Student Review are not necessarily endorsed by BYU or The Church of Jesus Christ of Latter-day Saints.

 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.