Term paper writing help
Latin Language Paper Topics
Tuesday, August 25, 2020
Child Development Stages
Unit 201 Child and youngster advancement Outcome 3: Understand the expected impacts of changes on kids and youngsters 3. 1 Identify the changes experienced by most kids and youngsters 3. 3 Describe with models how advances may influence youngsters and youthful peopleââ¬â¢s conduct and improvement Under each heading, clarify how every viewpoint may affect on a childââ¬â¢s conduct and improvement, giving models. à ·Puberty: Growth sprays, early shorts, slowpokes, desire from delayed prodigies, individual scent, reluctant about body evolving. Guys, become taller and more grounded, body changes , personal stench may create and he may need to begin utilizing antiperspirant. They become irritable on occasion and guardians need to attempt to comprehend this to help there immature adapt to changes. The most significant factors in the youthfulness through pubescence is friends, family and school. Any unsettling influence in these 3 elements can be an overwhelming weight on this developing kid. This could prompt gloom, drugs, criminal acts and the sky is the limit from there. à ·Starting school-From pre â⬠school to essential (Reception class). Youngster could feel anxious and feeling shaky. May begin essential without any companions from pre-school. New faces, new fellowships. Figuring out how to dress themselves for P. E, more autonomy required. How may this influence the childââ¬â¢s conduct and advancement? Beginning school - ( cont from above) If youngster J gets lost in an outright flood, isn't offered consolation by his educator or by guardians, he will keep on getting a handle on left. He will at that point become pulled back and separate himself from everybody and everything. He will fall back in class and in light of the fact that he has disconnected himself from peers, he may begin to feel that he is all alone. He will at that point begin to appreciate his own conversation. He won't have any social abilities and won't move past this point. On the off chance that youngster J begins school and this sort of conduct is gotten early and he is offered consolation from his folks, educator and all that are a positive job in his life things could be totally different. The more positive the guardians are, the more the youngster will be. He will flourish in school and have the option to discuss well with the educator and companions. à ·Moving class or school â⬠Moving from gathering class to year one. Youngsters begin to follow the national educational program and are frequently shown all the more officially. It can impact a kid who is accustomed to learning through play, out of nowhere they need to work in a conventional manner for longer periods. Additional learning , less available time. Change of educator, showing associate ( have a flexibly instructor). Influences learning, confidence, not having any desire to go to class. Eg. ) We moved to England when my child was 4 years of age. On appearance he went to elementary school A, he did gathering class and year one at this school. When he got to year 2, I felt the instructor was extremely laid back and I was not content with her technique for educating. I at that point moved him out of school An in year 2 and moved him to class B. It was an alternate region. He needed to then start from the very beginning once more, new school, begin to make a totally different friend network. In school B this is the place the tormenting began. He kept it extremely tranquil and it was not till I was drawn nearer by one of the moms at the school, she educated me that my child was being harassed. I thought I was doing the best for my child by moving him into another school since all I needed was for him to flourish. Moving school was not a decent decision, rather than flourishing, he was miserable, it influenced his confidence and he got pulled back. I ought to have thought about my children joy. This is better Kamilla, you have utilized a genuine model. à ·Starting Secondary School â⬠There are contrasts in the educational program and the manner in which subjects are instructed. A few kids may find that there dear companions have moved into various schools, so they should grow new fellowships. Despite the fact that advances can be troublesome, proceeding onward can likewise be a positive and energizing experience eg) Biggest to littlest, schedules, numerous schools feed kinships, change of classes, change of subjects, begin to convey sacks, discovering there path around the school. Eg. ) The calm modest male/female understudy may fall into the grasp of the gathering of companions. To abstain from being harassed or to attempt to fit in with the ââ¬Å" In kidsâ⬠he/she will go to unimaginable lengths to abstain from being ridiculed. In certain schools there is commencement. A few kids lose their certainty directly toward the beginning of auxiliary school. . 2 Identify advances that lone a few youngsters and youngsters may encounter e. g mourning 3. 3 Describe with models how changes may influence kids and youthful peopleââ¬â¢s conduct and advancement Under each heading, clarify how every perspective may affect on a childââ¬â¢s conduct and improvement, giving mode ls. à ·Bereavement â⬠Following a passing of a parent or somebody near a kid can be horrendous. In the event that kid was living with one parent this may mean a change in carer and maybe a move into private or child care. Loss of parent is crushing . Watch out for change of conduct . Anguish experiences a few changes Eg) Anger, refusal, pulled back and crying constantly. It might influence memory, fixation and learning. This test goes on for a considerable length of time and can keep going for at least two years. It can influence kids in various manners. Eg. ) There are kids who keep on doing great in school following the demise of a friend or family member. These youngsters go unnoticed. They my utilization the assignments of school work or sports to shut out difficult emotions or considerations, or they may want to exceed expectations in light of an inclination that the parent is watching them and will need to show the perished parent the amount they care along these lines. This sort of reaction to misfortune can bring about pressure â⬠related medical issues later on throughout everyday life, just as possible physical and passionate challenges from uncertain sadness. Instructions to Help Maintain schedules in school Be practical about desires for scholarly accomplishment Allow make-up circumstances Remember that a few kids keep on having scholastic challenges as long as 2 years following a demise, and now and again past Make special cases for sports participationâ⬠¦ sports can help with the recuperating procedure Refer to the school advocate Communicate with the guardians Regard the youngster's have to lament Avoid advising the kid to ââ¬Å"Move onâ⬠or ââ¬Å"Get over itâ⬠. Make a sincerely protected study hall Learn about youngsters' misery Recognize that serious despondency can come at formative stages, years after a passing happens Be understanding Affirm the individual, paying little heed to scholastic execution à ·new infant â⬠The more established kids experience change, Younger kids frequently discover changes tin family life in view of the fresh introduction, especially hard to adapt to. Eg) My child was a lone youngster till he was 10years old. We generally did everything thing together, I over covered him and thusly he was not an autonomous kid. When his sister was conceived, he got develop over night and turned out to be progressively free. I feel this was a positive change in his life. His younger sibling admires him. Ponder a kid that learns about left, how may that influence their conduct and advancement The main kid may encounter a scope of feelings, from energy to envy or even disdain. More youthful little children can't verbalize their sentiments, and their practices may relapse after the new youngster is conceived. They may suck their thumb or drink a jug, overlook their ongoing potty preparing abilities and impart infant talk with an end goal to stand out enough to be noticed. More seasoned little children and children may communicate their sentiments by testing your understanding, acting up, pitching fits, or declining to eat. These issues are typically brief and a little planning can help and more seasoned kid acclimate to inviting another kin. à ·moving house â⬠A family may move house either into a more unfortunate condition where there might be high occurrences of wrongdoing or into a superior zone where they are progressively open spaces. A kid that moves into another territory will desert companions and more distant families. By what method will this influence their conduct and improvement another house, new condition, new region can influence a kid from numerous points of view. Another encompassing depending, can influence a kid by causing them to feel disrupted. New faces, new aromas, new rooms can slow down a youngster. The breakdown of associations with peers, stopping of gathering exercises, misery and stresses identified with another condition are conceivably mentally upsetting occasions for little youngsters. Visit introduction to these occasions can be unpleasant and confounding and may influence their psychosocial prosperity, along these lines expanding their goal toward taking their life on the off chance that they can't adapt. à ·parent separate and division â⬠Both recognizable schedules and ways of life will change. Kids will turn out to be progressively autonomous when there is just one parent. Once in a while they think it is there deficiency. A few youngsters become pulled back from everybody. A few kids rebel, school work may endure. Do you have any models Eg) Child Z was 13years old when his folks got isolated. His body was experiencing significant changes hormonally. When his folks isolated he turned into an alternate kid. He consequently turned into the man of the house. He defied his mom, had no regard, got back home when he satisfied, his school work endured. He disregarded everybody around and was effortlessly affected. He fell into difficulty with the law because of friend pressure. At the point when you put this sort of conduct, this kid was looking for consideration. His grandparents mediated, sat him down and had a coordinated with him. He educated them that he felt that his folks had separated as a result of him, he felt that he couldnââ¬â¢t uncovered to see his mum in tears constantly. He additionally referenced that there was no security in the house and it was very unsett
Saturday, August 22, 2020
Political science Essay
Political federalism is an idea of political way of thinking where by part bunches are bound with a focal overseeing head. Federalism is likewise frequently utilized in portraying an administration framework that has its power being isolated naturally between a focal authority of government and political units, for example, states and regions. Federalism is the framework that includes sharing of the ability to oversee among state and national governments, henceforth making what is normally known as Federation. The advocates of federalism are alluded to as federalists. Majority rules system is a type of government whereby the essential individual just as political rights are ensured by the constitution. In majority rules system, the constitution should ensure reasonable and free races just as autonomous law courts. Understand more: How does federalism guard against oppression paper For full majority rule government to be knowledgeable about any express some essential necessities, for example, assurance of fundamental human rights, partition o powers, the right to speak freely of discourse, conclusion, pres and broad communications strict freedom, and great administration must be satisfied. Federalism improves popular government and this can well be clarified by the open decision hypothesis. It has been obviously contended that people can partake more and in direct manner in the littler political units rather than a unitary government (Elazar 89). What's more, people who might be disappointed with states of a specific littler state as unit are allowed to move to another state. This has been accepted to advance opportunity of development just as opportunity of articulation among the residents. Advancement and consolation of such opportunity results to improvement of vote based system in a government framework. Also, federalism is accepted to restrain or rather keep discretionary activity from the whole state, essentially by applying the rule of fair treatment. It confines the force that can be practiced by the administration and improve access to the rights by the residents since it disheartens any governing body that desires to limit freedoms through in access to established force (Elazar 112). Once more, the legitimate procedure of dynamic of federalism confines the speed with which move can be made by the legislature. Through federalism the US congresspersons who at first use to be selected by the lawmakers of the state are currently casted a ballot in their seats by the famous vote of each single state. This has improved the popular government of the residents whereby they would now be able to take part in the free and reasonable appointment of their legislators. In the United States, federalism is the administration framework wherein power is partitioned between the legislature of such state and a focal government. The sabotaging of the federalism by the US constitutions is unmistakably communicates by the way that the US constitution is obviously communicated by the way that the US constitution doesn't characterize nor clarify the ideas of federalism in any of its segments (Elazar 54). This was neglected because of the way that the states were known to be previous substances. There is likewise thin understanding of certain pieces of the constitution, for example, in the business proviso, matchless quality statement, and the important condition. Because of this tight understanding, federalism is qualified for purview just in the constitution awards it. The US constitution likewise has the intensity of not designating to the government. The held forces are diverted to the individuals or rather the state. End. Federalism is a significant type of political way of thinking that is practiced in a few states on the planet. It has elevated popular government to an incredible expand particularly in the US where by the residents have had the option to take an interest in free and reasonable races just as getting a charge out of the opportunity of development and discourse inside the single states. The US constitution ought to in this way be checked on to guarantee that it doesn't support federalism. Reference. Elazar J. Investigating Federalism.University of Alabama Press
Friday, August 7, 2020
Is The Ladders Irresistible Or Irrational
Is The Ladders Irresistible Or Irrational Oooh, ah, la la la. Half-clothed men lying on an office floor in evocative poses. Fully clothed (in office casual) men crawling on top of each other. Women crawling (yes more crawling) or dancing on desks seductively, wind blowing through their hair. Overactive wind machines. These images, overlaid upon a sultry âOooh, ah, la la laâ musical score, comprise a January 2011 television commercial from The Ladders. It seems some effort was put into infusing this marketing piece with⦠ummm⦠political correctness? The video is replete with intimations of gay relationships, interracial relationships, and Asian and Black successful careerists. But whatâs politically correct about people seeking employment through sex appeal, regardless of how ridiculous it clearly is? I get it. Itâs a metaphor and itâs meant to be outrageous. Come to The Ladders and weâll create an âirresistibleâ image that will get you the job of your dreams. But why would anyone want to work with a company that resorts to wacky sexual innuendo to gain clients who are climbing the corporate ladder? I also get that social media has blurred the distinction between private and public lives, and that employers might be able to view a prospectâs ârelationship statusâ through a quick Facebook search. Maybe sex and job search are no longer so far removed from each other as I would like to think. Perhaps thatâs a question for The Ladders. I sent them a trackback so maybe theyll respond here. The small print in the video says âBe more attractive to $100K+ employers.â One thingâs for sure, the folks in this commercial could use a LOT of help. I suppose thatâs the point. Or perhaps this whole mockery is simply an attempt to create viral video. What do you think? Is The Ladders irresistible? Or just irrational? Would you be more or less likely to hire The Ladders after seeing this commercial? I would absolutely love to hear your opinions on this one! And if you want solid resume and cover letter help with just the right âpopâ and appeal, consider The Essay Expertâs Resume and Cover Letter packages.
Saturday, May 23, 2020
What is Marine Snow
Did you know that it can snow in the ocean? à The snow in the sea isnt the same as snow on land, but it does fall from above. à Particles in the Ocean Ocean snow is made up of particles in the ocean, which come from several sources: Like life on land, animals and plants in the ocean die, decay, eat each other, and produce wastes (yep, theres poop in the ocean). These processes produce particles.There are other particles in the ocean, includingà bacteria, detritus, soot, and minerals.The particles also include pieces of zooplankton,à such as jellyfish tentacles,à feeding structures (such as the mucus web cast by a sea butterfly or pteropod) and the gelatinous houses built by tunicates.à Formation of Marine Snow As these particles are produced, they sink from the ocean surface and middle of the water column to the ocean bottom in a shower of whitish particles called marine snow. Sticky Snowflakes Many of the particles, such as phytoplankton, mucus and particles like jellyfish tentacles are sticky. As the individual particles are produced and descend from the top or middle of the water column, they stick together and get bigger. They may also become homes for tiny microorganisms. As they descend, some marine snow particles get eaten and recycled all over again, while some descend all the way to the bottom and become part of the ooze on the ocean floor.à It may take weeks for some of these snowflakes to reach the ocean floor.à Marine snow is defined as particles greater than 0.5 mm in size. These particles got their name because as scientists descend through the water column in a submersible, it can look like they are moving through a snowstorm.à Why Is Marine Snow Important? When you break it down into its parts, which includes such things as pieces of dead bodies, plankton poop and mucus, marine snow sounds pretty gross. But it is an important food source for some marine life, especially those down at the ocean bottom in the deep sea who might not otherwise have access to nutrients higher in the water column. à Marine Snow and the Carbon Cycle Perhaps more importantly to us, marine snow is also a huge part of the carbon cycle. As phytoplankton do photosynthesis, they incorporate carbon into their bodies. They may also incorporate carbon into shells, or tests, made of calcium carbonate. à As phytoplankton die or get eaten, this carbon becomes part of the marine snow, either in the body parts of the plankton or in the fecal matter of animals that have ingested the phytoplankton. That marine snow settles to the ocean bottom, where the carbon dioxide is stored. à The oceans ability to store carbon in this way reduces carbon concentrations in Earths atmosphere and can reduce the threat of ocean acidification.
Tuesday, May 12, 2020
Online transaction - Free Essay Example
Sample details Pages: 31 Words: 9221 Downloads: 5 Date added: 2017/06/26 Category Statistics Essay Did you like this example? 1.0 Introduction Years ago, consumer need to step out from home for buying groceries, settle bills, making transactions and others daily activities. But in nowadays, consumer can simply sit in front of computer with the available of internet connection to complete all of those daily activities with the help of online transaction. Online transaction becomes more advance from days to days but also accompanied by the increasing of the prevalent and sophisticated of internet fraud. Phishing and pharming are the two most famous internet frauds. This report will discuss in detail about the two most famous internet frauds, Phishing and Pharming. The topic that will be discuss in this report included the history of phishing and pharming, methods of phishing and pharming attacks, impacts cause by phishing and pharming and solutions to phishing and pharming. Donââ¬â¢t waste time! Our writers will create an original "Online transaction" essay for you Create order For this report, the problem is being approached from practical standpoint via internet. The materials that obtained from the internet are the results of experiment and investigation by others. The purpose of this report is written for those users of online transaction which hope that this report will give a clear message for those users of online transaction like what actually phishing and pharming is, impacts that will cause by phishing and pharming and the solutions to phishing and pharming. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 1.1 History of Phishing and Pharming The term phishing was coined when the America Online (AOL) accounts being theft by attackers using email in year 1996. The term phishing was derived from the concept of fishing hook which the attackers use email to lure the users AOL password. The character f of fishing is then being replaced by ph to keeps it compatible with the computer hackers tradition. Phishing works by using social engineering to lure consumers to divulge their sensitive personal information at fraudulent websites or known as spoofed site, sending email, through instant messaging (IM), Peer to Peer (P2P) network, search engines and etc. Pharming was the evolution of phishing that also use to solicit consumers sensitive personal information by using technical subterfuge like sending email contained of viruses or trojan house that will install small application program at the targeted victims computer. The application program will redirect user to a fraudulent website when they visit an authentic official website. Beside of this, attacker will also use those well known traditional techniques like DNS cache poisoning, domain spoofing and other techniques to redirect users to the fraudulent website when user want to visit an authentic website. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.0 What is Phishing Attack Phishing is criminally and fraudulently lure of consumers in divulging their sensitive personal information such as credit card numbers, account username, password, PIN number, mothers maiden name and other personal information through social engineering like sending email contain of link, download and install keylogger in victims computer or create look-alike web interface and domain name that hard to be differentiate by the victims. 2.1 Techniques of Phishing Attack 2.1.1 Sending Email The most popular techniques that used for phishing attack is by sending the targeted victims an email that contained of hyperlink to fraudulent websites pretending the email are sent from the hijacked brand name of banks, e-retailers, credit card companies or others online merchants Attackers will always convince the recipient of the email to respond by including message that sounds plausible or problem that are serious to the recipient like there is a problem in your accounts information, please verify it. When the recipients click on the hyperlink included in the email, recipients will be redirect to the fraudulent website. The website will either contained of form or pop up screen that will ask user to insert their sensitive personal detail and submit it to the attacker. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.1.1.1 Figure 1:Example ofFake Email From eBay 1 Bustathief.com What is Phishing eBay Phishing Examples [Online] Available: https://www.bustathief.com/what-is-phishing-ebay-phishing-examples/ [Accessed: 31 October 2008] This email did look like the email that sends by eBay but it is actually an email that sent by attacker to the recipient. When the mouse pointed to the Respond Now Button, it will reveal the web address that will redirect recipient to. As we can see the link that being reveal is https://202.5.90.139/IT/.cgi-bin/ws/ISAPIdllUPdate/that is not a link to the authentic eBay website. When recipient get this type of email, they should go to their eBay account and check on the private message and see is this email sent by eBay. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.1.1.2Figure 2:Example ofFake Email From eBay 2 Bustathief.com What is Phishing eBay Phishing Examples [Online] Available: https://www.bustathief.com/what-is-phishing-ebay-phishing-examples/ [Accessed: 31 October 2008] The emails that send by attackers to recipient that shown is in image format which embedded into the email. No matter where did the recipient point at the image, the mouse cursor will change to a hand for the computer default setting. When recipient of this email click on the image that embedded into the email, they will then being redirect to the website that control by the attackers and the sensitive information of the recipient that being redirect to the fraudulent webpage might be stole. 2.1.1.3Figure 3: Example of Masked Link At the example shown, there is a masked web address which show a link to legitimate website but when mouse pointer point to the link, it will reveal the real link which will redirect user to. Those links is being present in a string of cryptic number which is not the companys web address. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.1.2 Keylogger Other then sending email to the targeted victims, attackers also uses instant messaging (IM), Peer to Peer network (P2P), exploited website or search engine to download and install keylogger at the users computer. Keylogger is a type of malware that use to track the users keystroke on a website to steal the sensitive information that key in by the user. 2.1.2.1Figure4: Example ofKeylogger Detected SecurityFocus Sachin Shetty Introduction to Spyware Keyloggers [Online] Available: https://www.microsoft.com/protect/yourself/phishing/identify.mspx [Accessed: 01 November 2008] There is a list of keylogger being detected by using the Microsoft AntiSpyware. The registry entries that made by keylogger might be in EXE or DLL format which as what shown in figure 4, the keylogger that detected is bpk.exe, bpkhk.dll, bpkr.exe, bpkun.exe, bpkvw.exe and i_bpk2003.exe. 2.1.3 Create Look Alike Web Interface Domain Name At the early year, the phishing of sensitive personal information was less sophisticated where the hyperlink contained in email is representing by IP address like 192.168.1.25, but not domain name like www.banking.com. The email that sent to the recipient at the early year of phishing normally has poorly written, bad grammar, spelling error and cheap scam. But in the later days, the attackers start using HTML to code the website with the stolen logo from the authentic website so that it look like the authentic website and make the user hard to differentiate between the authentic website and fraudulent website. Beside from this, some attackers also create a look-alike domain name that will confuse the user. For example, the character l ofwww.google.comis being replaced by the number 1 whichwww.goo1ge.comthat look similar towww.google.comwith just one character exchange. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.1.3.1Figure5: Example ofLook Alike Interface In figure 5, it is the phishing site uses authentic PayPal logo, font and color that used by the authentic website. The attackers try to convince users to believe this website is the authentic website by including title page which is Random Account Verification, tabs on top of the page, the log in link, the help link and especially the Secure Verification symbol with lock. But one of the things that can recognize this is a phishing site by having a look at the address of it which an IP address is being use. 2.1.3.2Chart1:New Phishing Sites by MonthJan 2007 to Jan 2008 Anti-Phishing Working Group Phishing Activity Trends (Report for the Month of January, 2008) (Anti-Phishing Working Group) [Online] Available https://www.antiphishing.org/reports/apwg_report_jan_2008.pdf [Accessed: 10 September 2008] There are 20,305 phishing websites being detected by APWG at January 2008 where there are about 5,023 cases decrease compares to December 2007. At the first quarter of year 2007, there are 64,555 new phishing sites while there are 124,790 new phishing sites reported in second quarter of year 2007, 60,235 new phishing site increased compare to first quarter of year 2007. In the third quarter of year 2007, there are 33,697 new phishing sites decreased compare to second quarter of year 2007 which the there are 91,093 new phishing sites. In the fourth quarter of year 2007, there are 83,224 new phishing sites which are 7,869 new phishing sites less then third quarter of year 2007. In the comparison between January year 2007 with January year 2008, there are 6,916 new phishing sites less. 2.1.3.3Chart2:Hijacked Brands by MonthJan 2007 to Jan 2008 Anti-Phishing Working Group Phishing Activity Trends (Report for the Month of January, 2008) (Anti-Phishing Working Group) [Online] Available: https://www.antiphishing.org/reports/apwg_report_jan_2008.pdf [Accessed: 10 September 2008] According to the research that carried out by APWG, there are actually drops in hijacking of brands in January 2008 compare to December 2007. The figures of hijacked brands drop to 131 at January 2008 compare to December 2007 which have 144 reported hijacked brands. From the chart, it shows that there are 436 total hijacked brands for the first quarter of year 2007. At the second quarter of year 2007, there are 469 hijacked brands which are 33 hijacked brands increase compare to first quarter of year 2007. In third quarter of year 2007, there are decreases of 122 hijacked brands compare to second quarter of year 2007 which there are 347 hijacked brands in third quarter of year 2007. At the fourth quarter of year 2007, there are 442 hijacked brands which are 95 hijacked brands more compare to third quarter of year 2007. In the comparison between January year 2007 and January year 2008, there are 4 hijacked brands less in January 2008. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.2 Categories of Phishing Attack Phishing is actually being divided into categories like deceptive phishing, malware based phishing, content injection phishing, man in the middle phishing and search engine phishing. 2.2.1Deceptive Phishing Deceptive Phishing:it is performs by sending the targeted victims an email that required the recipient to click on the hyperlink to respond to the action that specify in the email. 2.2.2Malware Based Phishing Malware Based Phishing:it is done by running malware like keylogger, session hijacker or web Trojan at the users computer. 2.2.3Content Injection Phishing Content Injection Phishing:for this type of phishing technique, malicious content are being insert into a legitimate site by exploiting the vulnerability of servers security or by SQL injection. 2.2.4Man In The Middle Phishing Man In The Middle Phishing:for the man in the middle phishing, the attackers need to get in between the sender and receiver to get all the information and select the information that are usable to them. 2.2.5Search Engine Phishing Search Engine Phishing:-in search engine phishing, attacker will need to set up a website that contain of fake product and getting the site index by the search engine. When a consumer responds to the product, attacker will receive the sensitive personal information. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.2.6Chart3:Statistic of Phishing FromJanuary 2007 to January 2008 Anti-Phishing Working Group Phishing Activity Trends (Report for the Month of January, 2008) (Anti-Phishing Working Group) [Online] Available: https://www.antiphishing.org/reports/apwg_report_jan_2008.pdf [Accessed: 10 September 2008] According to the research from Anti Phishing Working Group (APWG), there are 29,284 phishing cases happen in January 2008. The numbers of cases are increasing 3,601 report compare to the phishing report that had been reported in December 2007 which are 25,683 cases reported. At the first quarter of year 2007, there are 78,393 cases in phishing reports received while at the second quarter of year 2007, there are 75,959 cases in phishing reports received where 2,434 cases decrease compare to first quarter of year 2007. In the third quarter of year 2007, there are 88,055 cases in the phishing reports received which 12,096 cases increased compare to second quarter of year 2007. While there are 85,407 cases phishing reports received at fourth quarter of year 2007. There are 2,648 cases decreased compare to third quarter of year 2007. In the comparison between phishing reports received at January 2007 which are 29,930 cases received and 29,284 cases reported at January 2008, there are 646 cases decrease in phishing report received. 2.2.7Chart 4:Attackers Targets Area Anti-Phishing Working Group Phishing Activity Trends (Report for the Month of January, 2008) (Anti-Phishing Working Group) [Online] Available: https://www.antiphishing.org/reports/apwg_report_jan_2008.pdf [Accessed: 10 September 2008] According to the chart that provided by APWG, financial services are the focus point of attackers which the phishing on financial services are the highest which are at rate of 92.4% compare to retail which is 1.5%, ISP that is 3.8% and government miscellaneous which are 2.3%. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 2.2.8Chart 5:Top 10 Phishing Sites Hosting Countries Anti-Phishing Working Group Phishing Activity Trends (Report for the Month of January, 2008) (Anti-Phishing Working Group) [Online] Available: https://www.antiphishing.org/reports/apwg_report_jan_2008.pdf [Accessed: 10 September 2008] According to the pie chart, we can see that, United States is the top of country in hosting phishing sites which are 37.25% from all of the hosting country. Follow by United State, Russia Federation is the second top of phishing site hosting country which is 11.66%, follow by china which is 10.3%, Germany which is 5.64%, Romania 5.09%, Republic of Korea 3.77%, France 3.28%, Canada 1.94%, United Kingdom 1.92% and at the last is Italy with 1.59% of phishing sites hosting country. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 3.0 What is Pharming Attack In the last topic was about the internet fraud called as phishing, the sending of bogus email with hyperlink that required user to respond to the action that specified in the message by clicking on the hyperlink. The hyperlink will redirect user to fraudulent website that look like the authentic website. Because of the raising of user awareness on phishing, pharming is being develop and use as one of the technique of internet frauds to solicit targeted victims sensitive information. Pharming uses technical subterfuge to solicit the targeted victims sensitive personal information and it is more sophisticated then phishing. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 3.1 Techniques of Pharming 3.1.1SendingEmail Pharming is carried out by attackers in several ways. The attacker will send email to the targeted victims that contained of viruses or Trojan horse that will download and run on the users computer. The recipient of the email can be duped by the attackers even they did not open or download the attachment in the email. The viruses or Trojan horse contained in the email will install small application in the recipients computer that will tries to redirect the recipient to the fraudulent website when the recipient try to visit an authentic website. Pharming can also be performed by not sending email. Pharming can also be carried out by perform using techniques like DNS cache poisoning, domain hijacking, DNS server hijacking and malconfiguration of setting or rewrite the firmware of router. 3.1.2 DNS Cache Poisoning DNS cache poisoning can be carry out by using malicious responses or taking of DNS software vulnerability to poison the cache that store queries made by user in certain amount of time in order to improve the speed of respond to user. After the cache being poison, when user make queries at the DNS, the user will be redirect to the fraudulent website. 3.1.3 Domain Hijacking While domain hijacking is perform by skipping the confirmation of the old domain registrar and the domain owner where the change of domain registrar can only be make with the confirmation from three parties, the domain owner, old registrar and new registrar. 3.1.4 DNS Server Hijacking Pharming also can be performing through DNS server hijacking. DNS server are responsible as the signposts of internet which it will change the domain name into the IP address. To hijack a DNS server, the attacker will first targeted the DNS server on the LAN or DNS server hosted by the ISP to change the IP address of an authentic websites domain name to the IP address of fraudulent website. When user tries to visit the authentic website, queries will be makes on the DNS server for the IP address of the domain name. Because of the IP address of the domain name had been changed, it will redirect user to the fraudulent website. When user being redirect to the fraudulent website, they will perform the activities that they wish to perform at the website because the address display in the address bar remain the same with the authentic websites address and they think that they are accessing the authentic website. Through the activities that perform by the user, attacker will be able to obta in the information that they wish to obtain. The website that always targeted by the attackers is normally those address that start with HTTP but not HTTPS because the website is without SSL protection. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 3.1.4.4Figure 4: HowDNS Server Hijacking Works Nilesh Chaudhari Pharming on The Net Palisade [Online] Available: https://palisade.plynt.com/issues/2006Mar/pharming/ [Accessed: 10 September 2008] Attacker targeted the DNS server on the LAN or DNS server hosted by the ISP to change the IP address of an authentic websites domain name to the IP address of fraudulent website User tries to visit the authentic website Queries will be makes on the DNS server for the IP address of the domain name The IP address gathered from the DNS server is the IP address of fraudulent website User is being redirected to the fraudulent website 3.2.5Malconfiguration of Setting or Rewrite Firmware of Router Pharming can also be done through malconfiguration of setting or rewrite the firmware of the router. Once the setting or firmware of the router being configure, the computers that connected to the router will automatically redirect to the DNS server that control by the attacker when they try to visit a website. This technique is being used for pharming because the change of setting or firmware of router is hard to detect and the malicious firmware will work as how the manufactures firmware works. In addition, the administration page and setting of the router will still remain the same. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 4.0 What Impacts Caused By Phishing and Pharming 4.0.1 Lost of Financial There are impacts that caused by rising of phishing and pharming. One of the impacts that caused by phishing and pharming is the lost of financial on both organizations and consumers. According to the InternetNews.com, there are about $1.2 Billion lost in financial of banks and credit card issuers at year 2003, while at year 2004, there is about 12 Million lost in financial reported by the Association of Payment Clearing Services in United Kingdom. Due to the credit card association policies, the online merchants that accepted and approved transactions made by using credit card numbers which solicit through internet fraud may need to liable for the full amount of those transactions. This may cause hard-hit to those small organizations. 4.0.2 Lost of Time and Wages The victims of phishing and pharming might need to spend time in clearing infect of phishing and pharming to them. But if the attacking on the victims was discover slower and then victims might need to take more time to resolve the problem. This might cause the victims in lost of time for their work and lost of wages. 4.0.3Undermining of Consumer Trust Another impact that caused by phishing and pharming is the undermining of the consumers trust in the secured internet transaction or communication. This situation occurred because the internet fraud like phishing and pharming made consumer feel uncertain about the integrity of the financial and commercial websites although the web address display in the address is correct. Undermining of consumer trust might also happen if the financial and commercial website lost the consumers data file or the sensitive information of consumer is being access by attackers. 4.0.4Law Investigation Become Harder Phishing and pharming also caused some impact on the Law investigation. It makes the law investigation become harder because the technique that used by attackers to perform phishing and pharming is more sophisticated. In nowadays, those attackers can perform all of the phishing and pharming attack at a location that provided with the internet connection. With the available of internet connection, they can make use of it to perform attacking activities. Those activities included the control of a computer located in one place to perform phishing and pharmings attack by using computer located at another place. The investigation become harder also because of the division of attacking tasks to several people located in different locations. 4.0.5Brand Reputation Damage Phishing attack will also cause damage in the brand reputation, which the peoples trust in the brand will reduce if they get the phishing email from the respective brand. In additional, brand reputation might also be damage if the respective brand lost their consumer data file or the sensitive information of their consumer is being theft. 4.0.6 Impacts on IT Resources and Administrator Phishing and pharming attack might also cause serious impact on both IT resources and administrator of the IT resources. The phishing email that send in large amount of quantity might take up the free space of email server and this might cause in reducing of the system performance of email server. Due to the attack of phishing attack, the administrator of IT resources might need to repair their system in order to clean the system from the infection. The IT administrator might need to perform some task like patch the system, shut down application and service, filer Transmission Control Protocol (TCP) ports and apply hotfixes. In order to reduce the chance of being attack by phishing and pharming in the future, IT administrator might also need to educate the end user in order to reduce the change of being attack. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 5.0 How to Prevent and Stop Phishing and Pharming Attacks The attack of phishing and pharming are on rising. Peoples are actually come out with numbers of ways in order to remediate or minimize the chance of being attack by phishing and pharming. 5.0.1 Secured Socket Layer Certificate First of all, at the side of website developer, SSL (secured sockets layer) certificate can be use in protecting the website by establish the identity of the website because SSL certificate cannot be duplicate easily and SSL certificate are also good in alerting user about the attack of phishing and pharming. The address of a website that protected by using SSL certificate will initial by using HTTPS but not HTTP. 5.0.2 Visual Cues Phishing and pharming can also being prevent by using visual cues at the authentic website so that user can differentiate between the authentic website with the fraudulent website. The visual cues can be as simple as a symbol in a colored box. The visual cues will remain the same when every time user log into the website. Identity Cues is one of the programs that can use to provide visual cues for a website. 5.0.3 Token Based Authentication At the side of being a web developer, technique like token based authentication can also be used to prevent from phishing and pharming because it provided layer of security. It is suitable to use as the technique in preventing phishing and pharming because the time based token is hard to duplicate by attackers. 5.0.4Switch Off Recursion Queries Others from using SSL certificate or visual cues in protecting the website from being attack by phishing and pharming, the DNS server that being use should also being secure by switching off the recursion queries so that the DNS cache poisoning will not work effectively. 5.0.5Install DNS Security Extension To secure the DNS server, DNSSEC (DNS Security Extensions) should also be installed to secure DNS server from the attacking of phishing and pharming. 5.0.6 User Self Awareness Users are also playing important role in preventing of phishing and pharming attack. As a user, they should not trust or open any email that send by unknown sender or email that send by bank that required recipient to respond to it like verify your account. In addition, when user visit a website with SSL certificate protection and when there is a message displaying that your exchange with this site cannot be viewed or change by others. However, there is a problem with the sites security certificate, the users should confirm that did the website that they visit give this message in earlier or check on the web address at the address bar so that it is the same as the site they want to access. This message normally will be display when the servers SSL certificate is not match with the websites URL. User can also look for the lock or key icon at the bottom of the browser that lock the site they want to enter their sensitive personal information. 5.0.7 Install Security Suite In the users computer, security suite or firewall should also be installed to protect computer against phishing and pharming. Security suite that can use to prevent or detect the attack of phishing and pharming is like AdAware, Windows Defender, Spybot Search and Destroy. After installing those security suites in the computer, user need to make sure that the detection definition of the security suite is up to date so that it can provide the maximum protection for the computer. 5.0.8 Web Browser Phishing and Pharming Preventing Tools Some additional tools are also available for web browser in preventing phishing and pharming attack. Those additional tools are like Google Safe Browsing, Netcraft toolbar, Microsoft Phishing Filter for MSN toolbar, Cloudmark Anti_fraud toolbar and PhishingGuard. 5.0.9 ReportPhishing and Pharming Attack As a user, they are also responsible to report to the related company or agencies when they are being attacked by phishing and pharming. They should report about what is the character that acts by the attacker to lure user in providing their sensitive personal information or report it to law enforcement agencies through internet or telephone. Those actions will help to stop the attack of phishing and pharming. 5.0.10 Anti Phishing Act By Government The work of preventing phishing and pharming are not only the responsible of web developer and user, government also responsible to fight against phishing and pharming. At United State, an act called Anti Phishing Act of 2005 was introduced to fight against the phishing attack. This act was introduced by Sen Patrick Leahy at Senate of United State. It was introduced with the introducing of two new crimes into the United State code, the prohibit creation or procurement of a website or the prohibit creation or procurement of an email that pretending it is from a legitimate business and try to solicit targeted victims sensitive personal information. The phishers will be charge under these laws no matter they successful gather sensitive information through phishing attack or unsuccessful, they could be spending up to 5 years in prison or they may also have to pas $250,000 fine. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 6.0 Does The Laws Stop The Attacks 6.0.1 Case 1: Jailed for Identity Theft Twenty eight people in seven countries including in United State were arrested for trafficking stolen bank and credit card numbers and personal information over the internet. Those twenty eight people are the members of Shadowcrew.com. There operations of these members are in the sight of US Secret Service Agents after two years they had set up the identity theft ring. The operation of US Secret Service Agents was help by the former gang member turned informant in autumn of year 2004. The goal of this operation is to target the top tiered people that operate Shadowcrew.com. After year long of investigation, twenty eight people are arrested while some of them are still in trading when policed arrived. One of the people that arrested, Wellman, 35, from Liverpool was sentenced for six year due to the reason of his part in the conspiracy. Another three people which is Smith, 22 from Camberley, Surrey, Murphy, 24, from Northwich, Cheshire and Kotwal, 25 from Bolton have been jail for nine month. 6.0.2 Case 2: Jailed for Running Bogus MSN Billing Website Jayson Harris, 23 was sentenced for 21 months due to the reason of running a bogus MSN billing website between January 2003 and June 2004. A spam email is being sent to recipient to encourage recipient to visit the site with link included and telling the MSN customer that they would get 50% discount on the next months service by updating their account information and credit card number at the site. Harris is then being tracked by Microsoft and involve in the investigation of FBI into the fraud. 6.0.3Case 3: Jailed for Six Years forDefrauding Up to 1.6m Peter Francis Macrae, 23 from St Neots, Cambridgeshire was arrested after threatening Nominet UK which is the registry that controls the dot-uk domain. Because of Nominet warned businesses not to fall to the bogus invoice, Francis Macrae launched a botnet attack to the organizations system which consists of 200,000 zombie computers. He is being jailed for six years for defrauding up to 1.6m. He tricked thousands of business in registering a dot-eu domain name by sending fraudulent email to the companies. In the email said so, those company need to pay renewal fee to avoid from losing the existing domain name. 6.0.3Laws Did Stop The Attacks Studies the three cases did show that, the laws of Anti Phishing Act did successfully punish the attackers that perform phishing attack with jailed for at least nine (9) months and the most jailed six (6) years. None of them from the cases that being studies are punished by fine in cash. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 7.0 Conclusion Phishing is about the use of social engineering by performing online imitation of brands to send spoof email that contain of hyperlink to fraudulent website to solicit users sensitive personal information like credit card number, PIN, mothers maiden name and etc. Phishing can also be done through installing keylogger at users computer. Pharming use technical subterfuge like, DNS hijacking, DNS cache poisoning, domain hijacking, routers setting or firmware malconfiguration to redirect users to a fraudulent website. Pharming may also perform by sending the targeted victims an email that contained of viruses or Trojan horse that will install small application that will redirect user to fraudulent website. There are impacts that caused by both phishing and pharming. Those impacts included the lost of financial, lost of time and wadges, undermining of user confident in secured online transaction or communication, hard hit to small organizations and cause the law investigation harder. As a web developer, SSL certificate, switching off the recursion queries or DNS security extension should be apply because it can protect the DNS or website from phishing and pharming attack. Visual cues can also be use so that user can easily differentiate between authentic website and fraudulent website. Token based authentication also one of the technique that can be apply to protect the website or DNS server from phishing and pharming attack. Users are also responsible to protect their self from phishing and pharming attack by not opening email or download attachment from unknown sender or email that required user to respond by clicking on the hyperlink contained in the email. User should also double confirm the URL at the address bar when a warning message like SSL certificate do not match with the sites appear. User can also install security suite or firewall in the computer in order to protect them from phishing and pharming. User can also look for the lock or key icon at the bottom of the browser that lock the site they want to enter their sensitive personal information. As a user, they can also report the attack of phishing and pharming to the related agencies or company through internet or telephone to assist the work of minimize the attack. In addition, laws are also being introduced to against phisher and pharmer. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ 8.0 Reflection After having looked back on the report, I used to find out on what needed to do so that can improve on the report and how to make it better. After the research, much knowledge gained on Phishing and Pharming attacks like how the attack of phishing and pharming being done, the impacts that caused by phishing and pharming attack. Last but not least, knowledge in how to prevent from being attack by phishing and pharming attack is also gained. Truth to be told, the research is quite huge and detail. It takes a lot of time in this part. To do a complete research on phishing and pharming not saying that is impossible, but it will take time to do it. At this moment, the research is just to make sure that it is enough to complete the report. After finished the report and presentation, free time might spend to do more research on it. As what said just now, the knowledge that earn might be useful in future, because knowledge is power. As for the research that that had done, spent adequate amount of time had spent into it and adequate methods and approaches to get the information also being used. The methods and approach that used is through research from internet because it is free, up to date information and many available sources for the topic. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Appendix ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Phishing email example ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Below is a screen capture of an email I received that claimed to be from eBay. The link led to a replica of the eBay login page that was used to trick users into entering personal information. The page used the createPopup vulnerability to mask its identity so that the address appeared legitimate. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Sample Phishing Spam eBay ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ A particularly dangerous spam and commonly known asPhishingattempts to trick recipients into disclosing personal sensitive information, such as login names, passwords or credit card information. It works by requesting users to click on a link to login into their account to update certain information. Visitors are instead directed to counterfeit websites which are exact duplicates of the actual website. Any information entered into the counterfeit website is then captured and stolen for identity theft. Favorite targets are eBay, PayPal and other well known financial institutions In the interest of originality, the body of the message is left unaltered as much as possible. But for security reasons, and to protect the reputation of our own website from being seen as linking to bogus websites, the links in the spam message have been disabled. Placing your mouse over them will show the original url it intended to link to, but clicking on them will bring you to spamhaus.org, a non-profit organization for combating spam. From: [emailprotected]/* */ [emailprotected]/* */ To: [emailprotected]/* */ Date: Tue, 29 Aug 2006 10:56:20 -0700 Subject: [TKO] : your (eBay) account could be suspended The message above has been cropped as it wont fit into such a small space. To view the full message, please click here for the fulleBay Phishing Spam. A new window will open displaying the entire message in html format. Points to note :- Forged from email [emailprotected]/* */ The spam originated from New York, USA The counterfeit website it was pointing to is https://www.vbsf.dk/signin.ebay.com Notice the misleading url name. The website was formerly registered to a dutch, but it had expired and was snapped up by the spammer. By the time we investigated the website, it had already been shutdown, probably as a result of complaints from the public. This message made it past our Yahoo spam filter. It uses html email and pulls the images directly from eBays server. This could explain why it slipped past Yahoos filter. In the body of the message itself, none of the purported links to eBay works. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ VISA Notice from VISA ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Summary Email title: Update or verify your account informations Scam target: VISA credit card owners Email format: HTML email (code can be seenhere) Sender: Visa Service Department [emailprotected]/* */ Sender spoofed? Yes Phish punch line : To ensure your Visa cards security, it is important that you protect your Visa card online with a personal password. Please take a moment, and activate for Verified by Visa now Scam goal: Getting victims VISA credit card number, expiration date, verification number and PIN. Phish link method a Click here type link Visible link: Activate Now for Verified by Visa link in the bottom of the email Link masked? Yes Actual link to https://usa.visa.com/track/dyredir.jsp?rDirl=https://200.251.251.10/.verified/ Phish website IP: 200.251.251.10 E-mail This phish combines some very dangerous tricks, perfect execution and a flaw in VISAs legitimate site to create the most dangerous phish scam yet. The email message it is being spreaded with looks perfect: It is much more convincing that the usual phish stuff. The sender i spofed, and the link is masked. But even further if the link is examined, it turns out it leads to the following URL: https://usa.visa.com/track/dyredir.jsp?rDirl=https://200.251.251.10/.verified/. And this is a URL that is really on the visa.com page! It turns out that the phishers have used a redirect page on the visa.com site to redirect to the phish server. Web Site Visible link: Activate Now for Verified by Visa link in the bottom of the email Link masked? Yes Actual link to https://usa.visa.com/track/dyredir.jsp?rDirl=https://200.251.251.10/.verified/ Phish website IP: 200.251.251.10 The site itself uses a visually perfect address bar spoof, in addition to being very convincing design-wise. The real URL is visible in the properties page. The only other visible phishing clue is the missing padlock icon in the right part of the status bar, which is inconsistent with the https in the forged address bar: Notice the lack of a login screen, too. And to make the things even more convincing, the site checks the credit card number using a commonly available algorhytm. This does not require or reveal any information about the bank account behind the CC, but it would reject a random bogus number, which could make the potential victim trust the site. After the data is phished, the site will just redirect to the legitimate usa.visa.com, as if nothing has happened. WHOIS information (for IP 200.251.251.10): inetnum: 200.251.251.0/26 registrar: registo.br, Brazil aut-num: AS4230 abuse-c: GSE6 owner: Fundao LHermitage ownerid: 001.444.385/0001-49 responsible: Marcelo Machado Gomes address: Rua Doutor Camilo, 187, address: 30240-090 Belo Horizonte MG phone: (31) 32891888 [] owner-c: MMG27 tech-c: MMG27 created: 20020828 changed: 20020828 inetnum-up: 200.251/16 ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Phishing Web Site Methods ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ The fraudulent web site that supports the phishing email is designed to mirror the legitimate web site it is purporting to be. The fraudsters use multiple methods to do this, including using genuine looking images and text, disguising the URL in the address bar or removing the address bar altogether. The purpose of the web site is to trick consumers into thinking they are at the companys genuine web site, and giving their personal information to the trusted company they think they are dealing with. 1. Genuine Looking Content Phishing web sites utilize copied images, text and in some cases simply mirror the legitimate web site. This will contain the normal links on the web site such as contact us, privacy, products, services etc. The user recognizes the website content from the genuine site and are unaware they are not on the genuine web site. 2. Similar looking URL to Genuine URL Some phishing web sites have registered a domain name similar to that of the organization they are appearing to be from. For example, one phishing scam we received targeting Barclays Bank used the domain name https://www.barclayze.co.uk. Other examples include using a sub-domain such as https://www.barclays.validation.co.uk, where the actual domain is validation.co.uk which is not related to Barclays Bank. 3. Form Collection of Information The most common method used to collect information in phishing scams is by the use of forms on the fake web site. The form is normally displayed in the same format as that used on the genuine web site. This may be an Internet Banking log-in, or a more detailed form for verification of personal details, with many fields for personally sensitive information. 4. Incorrect URL, not disguised Some phishing scam web sites do not even attempt to deceive users with their URL, and hope that the user does not notice. Some simply use I.P Addresses displayed as numbers in the users address bar. 5. URL Spoofing of Address Bar (Fake) This form of URL spoofing involves the removal of the address bar combined with the use of scripts to build a fake address bar using images and text. The link in the phishing email opens a new browser window, which closes and re-opens without the address bar, and in some case the status bar. The new window uses HTML, HTA and JavaScript commands to construct a false address bar in place of the original. (See figure 1 below) As this method utilizes scripts, it is only possible to stop this form of deception by disabling active x and JavaScript in browser settings. As most web pages utilize these normal tools, this is impractical. 6. Hovering Text Box over Address Bar This form of URL spoofing involves the placement of a text object with a white background over the URL in the address bar. The text object contains the fake URL, which covers the genuine URL. As this method utilizes scripts, it is only possible to stop this form of deception by disabling Active X and JavaScript in browser settings. As most web pages utilize these normal tools, this is impractical. 7. Pop Up Windows This form of deception involves the use of script to open a genuine webpage in the background while a bare pop up window (without address bar, tool bars, status bar and scrollbars) is opened in the foreground to display the fake webpage, in an attempt to mislead the user to think it is directly associated to the genuine page. (See figure 6 below) As this method utilizes scripts, it is only possible to stop this form of deception by disabling Active X and JavaScript in browser settings. As most web pages utilize these normal tools, this is impractical. 8. Trojans / Spyware Trojan and worm viruses are sent to the user as an email attachment, purporting to be for some type of purpose, such as greetings, important files or other type of SPAM email. The attachment is a program that exploits vulnerabilities in Internet Browsing software to force a download from another computer on the Internet. This file downloads other files and codes, which eventually installs a fully functional Trojan virus. The Trojan is designed to harvest, or search for personal banking information and passwords, which many people keep on their computer. This information is then sent to a remote computer on the Internet. Other worms have been known to hijack the users HOST file, which causes an automatic redirection to a fake phishing web site when the user types in a specific URL (normally for a specific financial institution) into the address bar of their Internet browser. Spyware, such as keyboard loggers, capture information entered at legitimate web sites, such as Internet banking sites. This type of spyware can be planted on a users computer using a previous worm or Trojan infection. Any information the spyware captures is sent to a predetermined computer on the Internet. A recent phishing scam used the link in the email to direct the users browsers to a site to first download keyboard logging spyware before redirecting the user to the genuine Internet banking web site. This spyware captured the login information entered, and sent this information to the fraudsters via a remote computer on the Internet. ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ Bibliography Anonymizer.Inc What is Pharming? [Online] Available: https://www.anonymizer.com/consumer/threat_center/pharming.html [Accessed: 08 September 2008] Anti-Phishing Act of 2004 (Introduced in Senate) [Online] Available: https://mineco.fgov.be/internet_observatory/actualities/pdf/AntiPhishingAct2004.pdf [Accessed: 31 October 2008] Antiphishing.info Laws That Protect The Internet From Phishing, Congress and Phishing [Online] Available: https://www.anti-phishing.info/congress-and-phishing.htm [Accessed: 31 October 2008] Anti-Phishing Working Group VISA Notice from VISA [Online] Available: https://www.antiphishing.org/phishing_archive/12-14-04_VISA/12-14-04_VISA.html [Accessed: 08 September 2008] BBC News Bank Phishing Attacks On The Rise [Online] Available: https://news.bbc.co.uk/2/hi/business/7523253.stm [Accessed: 31 October 2008] BBC News Man Charged Over Africa eBay Scam [Online] Available: https://news.bbc.co.uk/2/hi/uk_news/wales/mid_/5389222.stm [Accessed: 31 October 2008] BBC News Phishing Attacks Soar In TheUk [Online] Available: https://news.bbc.co.uk/2/hi/technology/7348737.stm [Accessed: 31 October 2008] BBC News Which? Highlights Phishing Losses [Online] Available : https://news.bbc.co.uk/2/hi/business/6401079.stm. [Accessed : 31 October 2008] Carnegie Mellon University Anti-Phishing Phil [Online] Available: https://cups.cs.cmu.edu/antiphishing_phil/ [Accessed: 10 September 2008] Computerweekly.com Antony Savvas Online Fraudsters Get 10 Years [Online] Available: https://www.computerweekly.com/Articles/2005/06/28/210626/online-fraudsters-get-10-years.htm. [Accessed: 31 October 2008] Cybercrime The Law [Online] Available: https://library.thinkquest.org/04oct/00460/law.html#phishing [Accessed: 31 October 2008] Dawn Hicks Phishing and Pharming: Helping Consumer Avoid Internet Fraud. (Federal Reserve Bank of Boston) [Online] Available: https://www.bos.frb.org/commdev/cb/2005/fall/phishpharm.pdf [Accessed: 20 August 2008] Federal Trade Commission How Not to Get Hooked by a Phishing Scam [Online] Available: https://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm [Accessed: 10 September 2008] Computer Crime Research Center Plugging The Phishing Hole: Legislation Versus Technology [Online] Available: https://www.crime-research.org/analytics/phishing_duke/ [Accessed: 31 October 2008] Fernando De La Cuadra Pharming a new technique for internet fraud [Online] Available: https://www.crime-research.org/news/07.03.2005/1015/ [Accessed: 08 September 2008] FindLaw Anita Ramasastry The Anti-Phishing Act of 2004 : A Useful Tool Against Identity Theft [Online] Available: https://writ.news.findlaw.com/ramasastry/20040816.html [Accessed: 31 October 2008] FraudWatch International Phishing Web Site Methods [Online] Available: https://www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/ [Accessed: 01 November 2008] Grant Gross Anti-Phishing Act Pushes for 5 Years and $250,000 Fine [Online] Available: https://archive.thestandard.com/internetnews/002819.php [Accessed: 31 October 2008] Gunter Ollmann The Phishing Guide, Understand Preventing Phishing Attacks [Online] Available: https://www.ngssoftware.com/papers/NISR-WP-Phishing.pdf [Accessed: 10 September 2008] Gunter Ollmann The Pharming Guide, Understanding Preventing DNS-related Attacks by Phishers [Online] Available: https://www.nextgenss.com/papers/ThePharmingGuide.pdf [Accessed: 13 September 2008] Gregory M. Lamb. New Twist On Phishing Scam Pharming. [Online] Available: https://www.csmonitor.com/2005/0505/p13s01-stin.html [Accessed: 04 September 2008] Henri Sivonen Thoughts on Using SSL/TLS Certificates as the Solution to Phishing [Online] Available: https://hsivonen.iki.fi/phishing-certs/ [Accessed: 08 September 2008] Internetnews.com Chris Nerney Trolling For Anti-Phishing Laws [Online] Available: https://www.internetnews.com/commentary/article.php/3382421 [Accessed: 31 October 2008] John Leyden US andRomaniaDredge Up 38 Phishing Suspects [Online] Available: https://www.theregister.co.uk/2008/05/20/us_romania_nets_phishing_suspects/ [Accessed: 31 October 2008] Martin in Hacking, The Web Introduction to new phishing techniques [Online] Available: https://www.ghacks.net/2007/02/16/introduction-to-new-phishing-techniques/ [Accessed: 08 September 2008] McAfee Phishing and Pharming Understanding phishing and pharming [Online] Available: https://www.mcafee.com/us/local_content/white_papers/wp_phishing_pharming.pdf [Accessed: 08 September 2008] Michelle Delio Pharming Out-Scams Phishing [Online] Available: https://www.wired.com/techbiz/it/news/2005/03/66853 [Accessed: 10 September 2008] Microsoft Spear phishing : Highly targeted phishing scams [Online] Available: https://www.microsoft.com/protect/yourself/phishing/spear.mspx [Accessed: 10 September 2008] MoPo.Ca Web site scams Pharming Farming [Online] Available: https://www.mopo.ca/pharming-scam-hoax.html [Accessed: 08 September 2008] Mortgage Investments.com Phishing Sample Citibank [Online] Available: https://www.mortgage-investments.com/Credit_reports/phishingsample.htm [Accessed: 08 September 2008] Pay Pal Phishing Scam Website Example [Online] Available: https://www.justtext.com/credit-card-fraud/pay-pal-scam/fraud-scam-website/phishing-website.html [Accessed: 01 November 2008] Phishing Activity Trends Report for the Month of December, 2007 [Online] Available: https://www.antiphishing.org/reports/apwg_report_dec_2007.pdf [Accessed: 13 September 2008] Phishing Email Example [Online] Available: https://code.jenseng.com/createPopup/email.html [Accessed: 08 September 2008] Phishing (fraud.org) [Online] Available: https://www.fraud.org/tips/internet/phishing.htm [Accessed: 10 September 2008] Phishinginfor.org How Phishing Works [Online] Available: https://www.phishinginfo.org/how.html [Accessed: 08 September 2008] Privacy Rights ClearingHouse Alert : Watch out for Phishing Emails Attempting to Capture Your Personal Information [Online] Available: https://www.privacyrights.org/ar/phishing.htm [Accessed: 08 September 2008] Spam Blockers Sample Phishing Spam -eBay [Online] Available: https://www.spam-site.com/sample-ebay.shtml [Accessed: 08 September 2008] Symantec Corporation Online Fraud : Pharming [Online] Available: https://www.symantec.com/norton/cybercrime/pharming.jsp [Accessed: 10 September 2008] Symantec Corporation Phishing [Online] Available: https://www.symantec.com/norton/security_response/phishing.jsp [Accessed: 10 September 2008] Tom Young Computing New phishing technique discovered [Online] Available: https://www.computing.co.uk/computing/news/2174236/phishing-technique [Accessed: 08 September 2008] United States Computer Emergency Readiness Team Report Phishing [Online] Available: https://www.us-cert.gov/nav/report_phishing.html [Accessed: 10 September 2008] University of Maryland, Baltimore Country Sample Phishing E-mail Received by myUMBC Account Holders [Online] Available: https://spaces.umbc.edu/display/oit2/Sample+Phishing+E-mail+Received+by+myUMBC+Account+Holders [Accessed: 08 September 2008] U.S. Senator Patrick Leahy [Online] Available: https://leahy.senate.gov/press/200407/070904c.html [Accessed: 31 October 2008] Viruslist.com Nikolay Grebennikov [Online] Available: https://www.viruslist.com/en/analysis?pubid=204791931 [Accessed: 01 November 2008] ________________________________________________________________________ Teoh Khai Zihh Bolton ID: 0711161 Page 3 of 62 Phishing and Pharming: What is happening in this area, the impact of this and how can it be stopped? ____________________________________________________________________________________________________________ References Antiphishing.info Botnet Threats and Solutions : Phishing [Online] Available: https://www.antiphishing.org/sponsors_technical_papers/trendMicro_Phishing.pdf [Accessed: 01 November 2008] BBC News Lucy Rodgers Smashing The Criminals E-bazaar [Online] Available: https://news.bbc.co.uk/2/hi/uk_news/7084592.stm [Accessed: 31 October 2008] ComputerWeekly.Com Antony Savvas Phisher Jailed For 21 Months [Online] Available: https://www.computerweekly.com/Articles/2006/06/23/216614/phisher-jailed-for-21-months.htm [Accessed: 31 October 2008] ComputerWeekly.Com Antony Savvas UKSpammer Jailed For Six Years [Online] Available: https://www.computerweekly.com/Articles/2005/11/18/213022/uk-spammer-jailed-for-six-years.htm [Accessed: 31 October 2008] Bustathief.com What is Phishing eBay Phishing Examples [Online] Available: https://www.bustathief.com/what-is-phishing-ebay-phishing-examples/ [Accessed: 31 October 2008] Fraud Protection Center Phishing Site Example [Online] Available: https://fraudcenter.zks.freedom.net/html/phishing_site_example.html [Accessed: 01 November 2008] Help Net Security Impact of Phishing on The Reputation of Brands (26 November 2007) [Online] Available: https://www.net-security.org/secworld.php?id=5629 [Accessed: 01 November 2008] Nilesh Chaudhari. Pharming on the Net(March 2006). [Online] Available: https://palisade.plynt.com/issues/2006Mar/pharming/ [Accessed: 10 September 2008] Phishing Activity Trends Report for the Month of January, 2008 (Anti-Phishing Working Group) [Online] Available: https://www.antiphishing.org/reports/apwg_report_jan_2008.pdf [Accessed: 10 September 2008] Recognize phishing scams and fraudulent e-mail (Microsoft) [Online] Available: https://www.microsoft.com/protect/yourself/phishing/identify.mspx [Accessed: 10 September 2008] Ren Haahr Hemmingsen Project Proposal for CPSC 503 Project Department of Computer Science University of Calgary, Canada [Online] Available: https://homepages.ucalgary.ca/~rhhemmin/503/project_proposal.pdf [Accessed: 28 September 2008] SecurityFocus Sachin Shetty Introduction to Spyware Keyloggers [Online] Available: https://www.microsoft.com/protect/yourself/phishing/identify.mspx [Accessed: 01 November 2008] U.S Senator Patrick Leahy. New Leahy Bill Targets Internet Phishing and Pharming That Steal Billions of Dollars Annually From Consumers [Online] Available: https://leahy.senate.gov/press/200503/030105.html [Accessed: 12 September 2008] ________________________________________________________________________
Wednesday, May 6, 2020
Zara Marketing Plan Free Essays
New collection Launch | Marketing Plan 22. 10. 2009 1 SITUATION ANALYSIS Zara Brand Wheel Fashionable clothes Varied assortment Trendy colors Feminine cuts Fashionable product lines for moderate costs Customer-à ? centered business Runway trends adapted for the streets Brand Essence Fashion-à ? oriented woman Trendy in every situaFon Feeling good about looking good Fashion -à ? friendly Feminine Hot and trendy High-Street Fashion The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research 5 Keys of the Zara Business Model Store Teams Customer Logis4cs Design/ Produc4on The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research 5 Keys of the Zara Business Model Customer ââ¬Å"Main driving force behind the Zara brand. We will write a custom essay sample on Zara Marketing Plan or any similar topic only for you Order Now â⬠Star%ng point for all Zara ac%vi%es Customer Lead role in: â⬠¢? Store design â⬠¢? Produc%on â⬠¢? Logis%cs â⬠¢? Team The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research s The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research 5 Keys of the Zara Business Model Store Store ââ¬Å"Mee4ng oint between the customer and the Zara fashion o? er. â⬠1,520 stores collect informa%on regarding customer demands. New products introduced twice a week. Top loca%ons ââ¬â 17 visits / year / customer Me%culously designed shop windows Maximum aJen%on to interior exterior architechtual design Appropriate coordina%on of garments Excellent customer care The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research 5 Keys of the Zara Business Model Design ProducFon ââ¬Å"Inspira4on comes from the street, music, art â⬠¦ but above all, the store. â⬠Proximity of roduc%on facili%es Immediate reac%on to trends. Con%nuous work for all teams. Managers ââ¬â teams ââ¬â customer demand ââ¬â forms, designs, fabrics, compliments Design/ Produc4on 1,186 suppliers, 200 desginers The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research 5 Keys of the Zara Business Model LogisFcs ââ¬Å"Highly frequent and constant distribu4on permiKng the o? er to be constantly renewed. â⬠697 million garments distributed 5,000 employees at logis%cs centers Logis4cs Designed with maximum ?exibility. Customer oriented. 24h ââ¬â receiving order to store elivery (Europe) Designed to absorb growth for next years. 18% annual discount rates. The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analys is Market Consumer Research 5 Keys of the Zara Business Model Teams ââ¬Å"Teams with vast sales knowledge geared to towards the customer. â⬠89,112 professionals Customer oriented. Make the stores a pleasant environment. Apply corporate, social environmental responsibility in day-à ? to-à ? day work. Teams The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Zaraââ¬â¢s Performance 159 store openings in 2008 Brand Value: $ 8,609 M 1,530 stores 4 new countries in 2008 Sales â⠬ 6,824 Million ZARA 73 countries The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research 14 The Industry High street fashion brand Industry trends Democra%za%on of luxury Inclusiveness Street trends Designer houses Key success factors Di? eren%a%on individualism New fashion consumer The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Customer Focused Product Development Saturated industry Need to increase brand value Responding to current industry trends Iden%fying the need for the product in the market A full-à ? shaped body is a beau4ful body The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Customer Focused Product Development Market entry barriers Design challenges Saturated industry Need to increase brand value Responding to current industry trends Iden%fying the need for the product in the market Exis%ng customer eac%ons ââ¬Å"Fat is not fashionableâ⬠Challenges Opportunies The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Consumer Analysis Todayââ¬â¢s fashion consumer: More choice, more educated, more savvy demanding ââ¬Å"New breed of shoppersâ⬠Loyalty, variety, freshness The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Fashion Consumer Behavior Analysis Interest Gives pleasure enjoyment Means of self-à ? expression Involvement Emo%ons Behavior The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Fashion Consumer Behavior Analysis Interest Hedonics Involvement Purchasing experience Fun, fantasy, social or emo%onal gra%? ca%on Emo%ons Behavior Impulse buying The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Fashion Consumer Behavior Analysis Interest Hedonics Involvement Importance: â⬠¢? Consumers aJach meaning to their clothes â⬠¢? Role of fashion in society Drivers: â⬠¢? Individual mo%ves â⬠¢? Projec%ng a desired self-à ? image Linked to personal values needs: â⬠¢? Express and communicate value â⬠¢? Values guide consumer behavior â⬠¢? Types of values: personal, economic, aesthe%c Emo%ons Behavior The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Fashion Consumer Behavior Analysis Interest Hedonics Involvement Posi%ve vs. nega%ve â⬠¢? Shorter decision %mes â⬠¢? More impulse buying â⬠¢? A feeling of being unconstrained â⬠¢? Desire to reward oneself How to generate posi%ve emo%ons? â⬠¢? Use the retail environment to posi%vely in? uence moods: â⬠¢? suitable layouts, â⬠¢? colors, â⬠¢? e? ec%ve sales personnel, â⬠¢? emo%onally pliking atmosphere Impulse buying Emo%ons Behavior The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Fashion Consumer Behavior Analysis Interest Hedonics Involvement Impulse buying â⬠¢? Fashion oriented: strongly oriented to fashion involvement: providing s ensory or experien%al cues of fashion products. â⬠¢? Created by the symbolic interac4ons of the product the consumer emo4onal experiences Emo%ons â⬠¢? Need to understand impulse buying behavior for fashion products from an experien4al perspec4ve = guidance in developing strategies Behavior The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Plus Size Consumer Analysis 1 in 3 women are unhappy with the way clothes ?t them 14 happy 12 8 16 10 18 6 22 20 24 unhappy The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Plus Size Consumer Behavior AJribute Plus size product Psychosocial consequence Feel more a acFve Func%onal consequence Cut ?[ng the body shape Values Self-à ? esteem Self esteem: important moFvaFon driver for consumpFon Consumers tend to assign their own eanings to clothes. Clothing: over consumer behavior The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Market Analysis 120 Market Share 15% PeFte 60% 25% Plus Size Normal 100 80 60 40 20 0 76 100 Size 2006 2012 Segment growth: 40% increase by 2014. Only 5% of retail space is dedicated to the +size products The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Types of CompeFtors 1 2 3 4 Dedicated Ranges Extension of Size Ranges Designer Bou%ques E-à ? commerce The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research New Line PosiFoning High Fashion Zara Torrid HM BouFques Low Price High Price MS Charming Shoppers 1 2 Dedicated Ranges Extension of Size Ranges Designer Bou%ques E-à ? commerce Market Consumer Research Junonia 3 4 Low Fashion The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Di? erenFaFon Brand awareness Brand loyalty New in this segments More experienced compe%tors Lack of e-à ? commerce Size growth High fashion for modest prices Strengths Weaknesses The Zara Brand Industry Analysis Product Development Consumer Analysis Market Analysis Market Consumer Research Zara vs. CompeFtors Zara 1,000 new styles / month 200 designers Higher cost of product development is more than adequately compensated by higher realized margins Strategy: reacFve, not predicFve CompeFtors 3-à ? 5 months: develop the ideas into physical samples Sales budgets stock plans developed one year ahead of the targeted styles Few weeks / months to procure fabrics, have them approved by the retailer ââ¬â produce a number of samples ââ¬â put samples in producFon The Zara Brand Product development Industry Analysis How to cite Zara Marketing Plan, Essay examples
Friday, May 1, 2020
Case Study on Tune Man free essay sample
Draw the bricks and mortar stage by which tradition CDC are credited, distributed, so in retail stores. How does each player in the value make money? Answer: Traditional Music Distribution Value Chain (Bricks Mortar) Content creation artists, prospered Production, publishers. Cording Manufacturers Sales, Marketing Publicity Distribution pack ship Customer End users Whole sale Retailers Retailers sales to customer The process beings with the talent pool which Includes artists, producers, composers, hostilities and among others, the artists are contacted to International record label to produce music recording such as Sony BMW, universal, Warner and Mel are example of large music companies that own smaller record labels. The rest of the record label industry is made up independent labels such as sub-pop, Epitaph and Muse music.Record labels add to the artistes product by augmenting it with marketing campaigns, promotions, concerts and most importantly access to barging power with dis tributors. We will write a custom essay sample on Case Study on Tune Man or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Artists often find it beneficially to leverage the resources of a cord label in order to reserve shelf-space among retailers; Best-Buy and Wall-Mart are two large brick and mortar versus digital music retails. The big four own their own distribution channels while smaller independent record labels rely on separate system of distribution.Finally, the music Is delivered to the end-user or the consumers through there are many separate steps In the value chain, many record labels and music groups, Including the Big Four participate In several of these stages. For instance, Sony BMW may enter into contract with an artist, than the publisher and manufacturer and distribute that artists work. (2) Draw the process stages for creating and downloading music today. How dose each player in this electronic/digital value chain make money.Answer: Digital (online) Distribution value chain online music store Rights clearance and royalties Production Sales ; Marketing publicity Digital Record and enc oding Device hand phone, pods, portable. De Delivery over network Hosting server proprietary and digitized format Billing/Fees Luke software, tunes, real player Artists Record Industry Digital content creation outwork devices Digital asset management. Digital Digital technologies in the music market will change in the underlying market structure and value.The adoption and diffusion of digital music, reduction in distance between artists and consumer wide distribution networks through the online channels cost of replication and production and copy right protection and piracy issues will affect the music market structure. For digital music, the creation and recording of music and signing and promotion of artists represent the gathering and organizing steps selection and synthesis occur hen the artists and or record labels produce digital recording. Distribution of information occurs over the internet when consumers purchase digital music from a distribution and download or stream content.Intermediaries are economic agents f acilities transactions between suppliers and buyers. They set market cleaning prices, make purchase and sales decision, and manage inventories, supply information and co-ordination transactions. Their role in the music market is changing as a result of digital music format. Physical retailers are being replaced by digital music retailer. Manufactures and distributors are becoming obsolete as record labels, producers and artists can go directly to digital music retailers without producing a physical product, reducing the distance between the music supplier and the consumer.The added value to the music product from manufacturing and distribution is and music piracy, they can now add value through marketing, promotions, copyright and licensing. There is also value added through enforcement of IP rights and piracy prevention. As a result, the channel power dynamics change plus there will be new Incentives as the role of the prayers in the value chain shift. The change value chain is likely to be affected by issues that relates to IP rights. Through digital music also has advantage over physical formats, the product is incomplete.Digital music does not include some of the important attributes of hysterical CD. These include artwork, lyrics, liner notes and content found in enhancing CDC, like video games, wallpapers but those can be made available in digital form for value chain distribution of digital music and the price digital music and the price digital music offer much cheaper compared to analogue music and easy excess to the consumers. Under the income derive from digital music per song download and subscription services; these also should include monthly subscription and pre-payment credit.There are many opportunities to explore consumers Unwillingness to pay in the context of illegal file sharing and piracy in the digital music alee chain. (3) Compare the role of operation in each of the value chain structures and approaches. Answer: There are two main value chains structures to the Brick ; Mortar alee chain Cus tomers Retailers Distributors Manufacturer Publishers Assets producers, com Erick Mortar value chain for Traditional music industry Brick Mortar value chain for Digital music industry. Artists/ Producers, composers, ghostwriters chain has been standardized with a final physical media as CDC, among other products. Unfortunately with the internet and digital technology the recording music industry has been of the best affected companies like JAZZ, Morpheme, and Neutral and the likes which are based in peer networks or Just selling music with taking care of cope rights when a person buys a CD, that person is acquiring a product that represents all contribution of a chain that are part of music industry.
Subscribe to:
Posts (Atom)