ict phishing (present)

12
PHISHING Presented by: Alya =) 4 server ‘07

Upload: aleeya91

Post on 09-May-2015

13.360 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Ict   Phishing (Present)

PHISHING

Presented by:Alya =)

4 server ‘07

Page 2: Ict   Phishing (Present)

INTRODUCTIONWhat is “Phishing”??? » Technique for acquiring your personal information and subsequently

committing fraud in your name. » Include stealing your identity or emptying your checking and

savings accounts. » A form of cyber-crime that's growing faster than the ability of the

police or courts to deal with it. » Simply a play on the word "fishing" — scammers drop email lures into

the sea of Internet users, hoping to hook your personal information. » More dangerous variation called “spear phishing” » More insidious than regular phishing. » Assume that your sensitive information has been captured or is at

risk. » Until you’ve installed and run an anti-spyware program, do not log in

to any of your financial accounts. » Crimeware will record your password and account information and

transmit it to the crooks, who then sell it to the highest bidder.

Page 3: Ict   Phishing (Present)

How does it occur??? » Conducted by email. » Receive an authentic-looking email message that appears to

come from a legitimate business. » Ask you to divulge or verify personal data such as an

account number, password, credit card number or Social Security number.

» Possible for you to be phished by mail, telephone or even in person.

» Through the use of Instant Messaging (IM), which can also be used for identity theft as well as spreading viruses and spyware.

INTRODUCTION

Page 4: Ict   Phishing (Present)

Who perpetrates it??? » Phishers are scam artists. » Send millions of emails, realizing that even few recipients give

them identifying information. » Purchase software specifically designed to help set up and

manage a phishing scam site.

Who is affected by phishing? » Popular targets are users of online banking services and auction

sites. » Email address has been made public anywhere on the Internet

then you are more susceptible to phishing. » Scammers can use spidering or Web-crawling programs to search

the Internet and collect millions of email addresses.

INTRODUCTION

Page 5: Ict   Phishing (Present)

HOW CAN I RECOGNIZE A PHISHING EMAIL?

Page 6: Ict   Phishing (Present)

HOW CAN I MINIMIZE THE POSSIBILITY OF BEING CAUGHT BY A PHISHING SCAM?

• Be on guard

• Don't fill out a form on a Web site unless you know it is secure.

• Regularly check your bank, credit and debit card statements (paper and online).

• Ensure that your browser is up to date.

• Install and maintain antivirus and anti-spyware software

• Consider installing a phish-blocking toolbar on your Web browser.

• Stay informed.

Page 7: Ict   Phishing (Present)

WHAT SHOULD I DO IF I THINK I'VE RECEIVED A PHISHING EMAIL?

Page 8: Ict   Phishing (Present)

WHY SHOULD I PROTECT AGAINST PHISHING?

*Phishing attacks usually target: - Bank information – such as VISA and PayPal accounts. - Username and password information. - Social Security numbers. - Mother maiden’s name can be used to retrieve forgotten or lost

credentials.

*The above information allows scammers to: - Make fraudulent charges on your credit or debit card. - Make use of your credentials on different online services to

commit crime without being caught.

Page 9: Ict   Phishing (Present)

WHAT SHOULD I DO IF I'VE BEEN CAUGHT?

Page 10: Ict   Phishing (Present)

CONCLUSION• Disturbing signs of evolving.• Attacks becoming savvier & attackers beginning to

share code and techniques with virus writers called crackers.

• Slow down unless service providers adequately address consumer security concerns in the form of strong authentication.

• Time to educate their users on how to spot a phishing attack.

• Email requests for passwords, credit card numbers, and other private data are never legitimate.

Page 11: Ict   Phishing (Present)

REFERENCES Date of searching the information on the internet; -09 MAY 2007-

-20 JUNE 2007-

Web;http://www.ncsu.edu/it/essentials/antivirus_security/phishing/intro.htmlhttp://www.ncsu.edu/it/essentials/antivirus_security/phishing/

recognize.htmlhttp://www.ncsu.edu/it/essentials/antivirus_security/phishing/

receive.htmlhttp://www.ncsu.edu/it/essentials/antivirus_security/phishing/

avoid.htmlhttp://www.ncsu.edu/it/essentials/antivirus_security/phishing/

whatdo.html

Page 12: Ict   Phishing (Present)