ISYM 540 Current Topics in Information System Management

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Internet Scams and Money- Making Models. A way You can be scammed online.
Quiz Review.
How It Applies In A Virtual World
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Over 3,000 computers are affected monthly by Malware and Phishing.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Safe Internet Use Mark Wheatley CSI Onsite
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
What is Spam? d min.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
Personal spaces.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Staying safe on the internet
Computer Security.
9 ways to avoid viruses and spyware
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
WJEC GCSE Computer Science
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

ISYM 540 Current Topics in Information System Management Phishing ISYM 540 Current Topics in Information System Management

Hackers want to… Use you to spread their worms and viruses. Install spyware programs on your computer so they can monitor everything you do on the Internet. Alter your browser, forcing it to visit websites you don't want to visit. Get your personal information Goal 1 is usually about “FUN” Goals 2, 3 and 4 are usually about MONEY!

Phishing Means to a fraud Spam/ forged emails Fake sites Trojans/ malware Web 2.0 (JavaScript, Ajax, xss, etc) Personal data are the object of interest: credit card numbers, bank accounts details , PINs, etc.

Phishing technique Unsolicited message („spam“) as the initiator Bogus website random URL; or confusingly similar domain name Variety of other techniques - Cross-site scripting, Man-in-the-middle attack, HTML form in the spam email.

WHY PHISHING ATTACK! Lack of Knowledge • computer system • security and security indicators • web fraud Visual Deception • Visually deceptive text • Images masking underlying text

Phishing – random URL

Phishing – confusingly similar domain name fake websites • usually not hosted in the US. • usually not up for more than a few days.

Phishing – HTML form in email eBay phishing email A fake link

Phishing and domain name registries November 2007: Over 23.000 phishing websites detected just in this month Removing domain names is not the ultimate solution website still accessible through the IP address

TO protect your personal and financial information Be suspicious of email messages that contain urgent requests for personal financial information, even if they appear to be from a trusted source (PayPal, eBay, your bank, etc.). Do not click links in email messages that you suspect are not legitimate. Instead, open a new browser window and type in the URL directly. Do not disclose personal or financial data in email. Verify the security of the websites you visit by making sure that the web address begins with https: rather than http: before submitting credit card or other sensitive information online. Review your bank, credit, and debit card statements regularly to ensure that all transactions are legitimate. Keep your browser up to date and make sure to apply all released security patches.