Top Banner
Name : Rubentiraan Group Member :Cheah Zu Cheng Class : 4ICT Phishi ng
9
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer 4 ict

Name : RubentiraanGroup Member :Cheah Zu ChengClass : 4ICT

Phishing

Page 2: Computer 4 ict

What is Phishing? Phishing techniques Damage caused by phishing. Ways of anti-phishing. Basic safety rules. Conclusion

Page 3: Computer 4 ict
Page 4: Computer 4 ict

Link Manipulation Links are internet addresses that direct one to a specific website.

Filter Evasion This is the use of images instead of texts.

Website forgery There are some phishing scams that use JavaScript commands to alter an address bar that user sign in at a bank or service of the phisher.

Phone Phishing This is done by using a fake caller ID data to make it appear that the call came from a trusted organization.

Page 5: Computer 4 ict

The phishes can run up charges on our account.They can open new accounts, sign utility or loan contracts in our name.They can use a false ID and commit crimes using our personal information.Obtained substantial financial loss between bank and customer, for example.It can destroy our life because loss of money.Loss of access to e-mail.

Page 6: Computer 4 ict

Social responses Technical responses Helping to identify legitimate websites Browsers alerting users to fraudulent

websites Augmenting password logins Eliminating phishing mail Monitoring and takedown Use password-authenticated key agreement

protocols Edit Legal responses

Page 7: Computer 4 ict

Keeping yourself, your family and your computer protected is essential if you want to enjoy a safe

Internet experience. If you are worried about viruses, spyware or any other Internet danger and want to find

out more about keeping yourself safe online and/or maintaining your computer, follow the links on this

page.Chat safety

Cell phones, chat rooms, instant messaging, IRC, newsgroups, bulleting boards, forums, online gaming

E-mail safetyPhishing, scams and fraud, spam, spoofing, viruses

Personal information safetyHacking, identity theft, online shopping and auctions,

spyware, Web site safety Other online safety issues

Downloading music Online dating

Parry's Internet safety guide for parents

Page 8: Computer 4 ict

When phishing treat is disseminated no one with an Inbox can be immune or protected from the attack. Corporations, financial institutions and consumers will be victimized and thus lead to lost of both time and money. Phishing attacks continue to escalate in terms of complexity, frequency and harshness.

Page 9: Computer 4 ict

http://en.wikipedia.org/wiki/Phishing#Phishing_techniques

http://www.waset.org/journals/ijhss/v2/v2-1-7.pdf

http://www.avira.com/en/threats/what_is_phishing.html