Clickjacking is a hacking strategy that involves cybercriminals tricking users and targets
into clicking a link, which routs the user into the hacker’s destination most often for cruel and
mischievous cybercrimes. Clickjacking fools the users into giving the hacker’s access to their
personal information and data that can be used to commit a cybercrime (Huang et al., 2012). For
instance, the users volunteer their information to the attackers unknowingly. Also, the attackers
can trick the users into downloading and installing malware, which can be very harmful to
computers and other devices.
Before the attackers complete their crimes, numerous strategies can be effectively utilized
to prevent Clickjacking. For a starter, the use of verified and certified antivirus software is one
effective method of preventing Clickjacking. The antivirus can detect a harmful webpage and
links with malware (Huang et al., 2012). If the antivirus is strong enough, it can also fight and
curb the infected files and terminate the pages with malware detected. Also, adding a frame killer
as well as avoiding framing from other domains can help prevent Clickjacking.
Response to Alexa Rosa
Hello Rosa, you presented your argument adequately in the discussion, where you present
the roles and importance of radio frequency identification (RFID). In your post, you have
discussed the issues of security within an organization is portrayed in the cybercrimes and data
privacy in much contemporary organization. I strongly agree with your claim that one of the
most crucial tools for improving security, privacy, as well as the performance is the use of RFID.
You mention that the functions of RFID are managing and detecting employees, vehicles, and
tags with no interaction between the subjects. Since RFID can monitor the functions of an
organization, I strongly believe that you should mention that RFID is among the most effective
DISCUSSION AND RESPONSES 3
tools for handling the ATM frauds. I think your discussion post has addressed the issue and
focused on the prevention methods. However, I also believe that you should include how RFID
helps to curb the security issues within an organization, such as the ATM fraud.
Response to Chance Vick
Hello Vick, your topic choice is interesting since it focuses on networking protocol.
Address Resolution Protocol (ARP) like you mention is a network protocol that is not only a
low-level protocol but also a medium for a translation of network into link-layer addresses. It
was wise of you to start the discussion with a definition of ARP. You have demonstrated how the
OSI model works as a framework of ARP. You have also discussed adequately how ARP works
and functions in different Operating Systems (OS). Also, you presented a recommendation for
stress management techniques, giving suggestions on how he could use them. Your exhibition of
the most applicable model, the readiness model, is in line with the situation, demonstrating how
it is relevant, and when it would work while giving viable examples. Lastly, you choose the
individuals to discuss, while choosing the applicable type of protocol with a viable explanation
from the textbook on the meaning of this type of follower.