wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Breaches in Stock market trading

profile
31_Aaron Pandhare
Oct 20, 2021
0 Likes
0 Discussions
84 Reads

Stock market trading is where a share or a company’s equity represents ownership or stake for a small part in a company or corporation. Stock market apps and websites are quite secure, but you cannot tell when a security breach could happen. A Security breach is when a network, device or applications are accessed unlawfully. 

In a stock market website or application attack are focused in 2 ways, the first technique is Hack, Pump and Dump, in this attackers hack users accounts and buy lesser traded stocks and shares, resulting in a “pump” which makes these stock prices go up, then the attacker dumps or sells his/her own stock for high value. 

The second technique is Stock doxing where attackers use various methods to gain and leak crucial information on a user or an organization to destroy the reputation, this could result in the company’s value going down. It is found that companies with average share price of +2.6% suffered a loss resulting in -3.0% after the security breach was made know to the public. 

Attacks such as phishing, Man-in-the-middle, Ip tracing, DDoS, botnet, Key logging, packet sniffing, reverse mobile phone lookup, malware injection all these can be used to hack a users stock account or an organisation.

Therefore, to prevent such attacks using different preventive measures could be very important. Security measures such as Ring Fencing, Using VPN, Hiding domain registration, using strong passwords, using different email ID’s for different purposes, Multi-factor authentication, Encryption of sensitive information, Securing devices and networks could help prevent such attacks or attempts.

Therefore knowing your networks, security measures and having knowledge on how to prevent attacks could help in much enjoyable stock trading. 

   


Comments ()


Sign in

Read Next

PERSONALITY DEVELOPMENT

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

How to use GIT & GITHUB

Blog banner

Self managing devices

Blog banner

Types of Malware in Cyber Security

Blog banner

Multiprocessor and scheduling

Blog banner

Elements and Principles of Photography

Blog banner

VPN

Blog banner

INTERNET SECURITY

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Indian Culture and Tradition

Blog banner

Uniprocessor Scheduling

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

How to feel Happy everyday day

Blog banner

12 Principles of Animation

Blog banner

Memory management

Blog banner

ZOHO

Blog banner

Women empowerment

Blog banner

Memory Management

Blog banner

Memory Management

Blog banner

Deadlock

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Socket Programming in Java

Blog banner

Evolution of the Microprocesor

Blog banner

Question

Blog banner

Fitness

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Assignment-3

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Big Data Architecture

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Operating System Objectives and Functions

Blog banner

Service Transition Process in ITSM

Blog banner

RAID

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Gis in agriculture and farming

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner