wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Breaches in Stock market trading

profile
31_Aaron Pandhare
Oct 20, 2021
0 Likes
0 Discussions
84 Reads

Stock market trading is where a share or a company’s equity represents ownership or stake for a small part in a company or corporation. Stock market apps and websites are quite secure, but you cannot tell when a security breach could happen. A Security breach is when a network, device or applications are accessed unlawfully. 

In a stock market website or application attack are focused in 2 ways, the first technique is Hack, Pump and Dump, in this attackers hack users accounts and buy lesser traded stocks and shares, resulting in a “pump” which makes these stock prices go up, then the attacker dumps or sells his/her own stock for high value. 

The second technique is Stock doxing where attackers use various methods to gain and leak crucial information on a user or an organization to destroy the reputation, this could result in the company’s value going down. It is found that companies with average share price of +2.6% suffered a loss resulting in -3.0% after the security breach was made know to the public. 

Attacks such as phishing, Man-in-the-middle, Ip tracing, DDoS, botnet, Key logging, packet sniffing, reverse mobile phone lookup, malware injection all these can be used to hack a users stock account or an organisation.

Therefore, to prevent such attacks using different preventive measures could be very important. Security measures such as Ring Fencing, Using VPN, Hiding domain registration, using strong passwords, using different email ID’s for different purposes, Multi-factor authentication, Encryption of sensitive information, Securing devices and networks could help prevent such attacks or attempts.

Therefore knowing your networks, security measures and having knowledge on how to prevent attacks could help in much enjoyable stock trading. 

   


Comments ()


Sign in

Read Next

Raid

Blog banner

Explain Kernel in OS

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

SPEM

Blog banner

1.1 basic elements

Blog banner

Old age lifestyle

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Deadlock

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Deadlock in operating system

Blog banner

Game Theory in Blockchain

Blog banner

Depression

Blog banner

Types of E-Commerce

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

Microsoft Word

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Sagar Parikrama

Blog banner

Apache Kafka

Blog banner

Kernel in Operating System

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Hypothesis Testing in Data Science

Blog banner

Honeypot in cyber security

Blog banner

CRISP-DM Methodology

Blog banner

The Memory Hierarchy

Blog banner

Memory management

Blog banner

CyberSecurity Color Wheel

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

DNS Cache

Blog banner

APACHE KAFKA

Blog banner

Cyber Forensic in the Banking sector

Blog banner

GIS Topography

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Types of Hackers

Blog banner

How to make Pancakes

Blog banner

Pandas Matrix Applications

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Security Issues and Countermeasures

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Linker

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Business-to-Business

Blog banner