hacking phishing

8
HACKING PHISHING NETIQUETTE Presented By, DHANYA J R Social

Upload: dhanyadhanya121

Post on 07-Apr-2017

30 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Hacking phishing

HACKING PHISHING NETIQUETTE

Presented By, DHANYA J R Social Science Christ Nagar college of Education Thiruvallam

Page 2: Hacking phishing

1. HACKING Computer Hacking refers to the practice of modifying Computer Hardware and software to accomplish a goal that is considered to be outside of the creator’s original objective those individuals who engage in computer hacking activities are typically referred to as called Hacker.

Page 3: Hacking phishing

SEVEN STEPS OF HACKING 1.Reconnaissance

2.Probe

3.Toe hold

4.Advancement

5.Stealth

6.Listening post

7.Take over

Page 4: Hacking phishing

2. PHISHING Phishing the act of stealing persona l information via the internet for the purpose of committing financial fraud has be come a significant criminal activity on the internet.

Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information.

Originally phishing was identified as the use of electronic mail messages from a trusted agent such as a bank, auction or online commerce site.

Recently the definition of phishing has grown to encompass a wider variety of electronic financial crimes.

Page 5: Hacking phishing

Causes of phishingMisleading e-mailsNo check of source address Vulnerability in browsersNo strong authentication websites of banks and financial institutions Limited use of digital signatures Non availability of secure desktop toolsLack of user awarenessVulnerability in applications

Page 6: Hacking phishing

3. NETIQUETTE

Netiquette is simply internet Etiquette or a set of expectations that describes appropriate behaviors when interacting online netiquette is network etiquette the do’s and don’ts of online communication.

Page 7: Hacking phishing

Netiquette GuidelinesBe friendly and Positive

Use proper Language

Use affective Communication

Page 8: Hacking phishing

T H A N K Y O U