CS 142 Lecture Notes: Security Attacks: Phishing

Slides:



Advertisements
Similar presentations
PayPal Phishing Example. Can you tell which is real? 1. 2.
Advertisements

Standard 1.02 Investigate uses of the Internet and World Wide Web.
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
Firefox To get the IE Add-On for Firefox – Open Firefox – Click on the menu icon in the upper right corner:
How to use offline web admin (OWA)
CS1203 Uploading homework to be graded. C Click Here.
HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
CS 142 Lecture Notes: URLs and LinksSlide 1 Uniform Resource Locators (URLs) Scheme Host Name.
Windows Internet Explorer 7 – Illustrated Essentials Unit B - Getting the Most from Internet Explorer 7.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Lectures and Practicals Mon 8-10 SC1222 TUE SC1222 Office: SC Website: mis.csit.sci.tsu.ac.th/kanida.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
System settings for e-tendering portal
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
CS 241 Section (04/19/12). MP8  Web Server  Due: Tuesday, May 1 st, 11:59pm  What will you be doing?  Creating a web-server in C that serves HTML.
 We live in an information age where it's very easy to publish on the Internet. The average person can write their own blog and add to Wikipedia. Anything.
High Assurance / Enhanced Validation Name of Presenter: Kevin Brown Date: August 5th Confidential.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Making a Logbook Entry. Go to Click on Sign In.
A Quick Insight Paper about phishing attacks based on usability study Users required to classify websites as fraudulent/legitimate using security tools.
An Evaluation Of Extended Validation and Picture-in-Picture Phishing Attacks Presented by Hui (Henry) Fang Collin Jackson, Daniel R. Simon, Desney S. Tan,
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Share Spearheadtroopers.com Article/s. How to share Spearheadtroopers.com Articles? Share to Facebook Social Media 1.Open Mozilla Firefox or Google Chrome.
SLARTS AFTER SCHOOL CLASS SCHEDULING TUTORIAL. Step 1 – Sign in to your account: my.slarts.org Step 2 – click on Class Scheduling (on left of screen)
Day 1 on Tech Use March 26, Students ◦ Log in at:  j.mp/cmsgaggle (don’t use www or  use FireFox browser ◦ Username: flastxxxx  first.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Slide 1 Phishing s CS 142 Lecture Notes: Security Attacks: Phishing.
Transport Layer Security (TLS) Extensions: Extension Definitions draft-ietf-tls-rfc4366-bis-00.
Gilda certificates. Certification Authority
网上报账系统包括以下业务: 日常报销 差旅费报销 借款业务 1. 填写报销内容 2. 选择支付方式 (或冲销借款) 3. 提交预约单 4. 打印预约单并同分类粘 贴好的发票一起送至财务 处 预约报销步骤: 网上报账系统 薪酬发放管理系统 财务查询系统 1.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
GSE Web Mail User Guide ICT Directorate Table of Contents How to Logon Opening View Navigation Mail Contacts Calendar 2.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Unvalidated Redirects & Forwards
Setting and Upload Products
4 Criteria for evaluating digital information
ISYM 540 Current Topics in Information System Management
How to install Skype (Step by Step Guide).
How to Check if a site's connection is secure ?
CS 142 Lecture Notes: Network Security
GeoMesh Blockchain Networking - Slide Presentation
CS 142 Lecture Notes: Network Security
Starter What is identity theft?
Student Sportsmanship Course
CS 142 Lecture Notes: Security Attacks: Phishing
CS 142 Lecture Notes: Security Attacks: Phishing
CS 142 Lecture Notes: Securing the Connection
Put the names of the people in the group here
Teaching you NOT to fall for Phish
CS 142 Lecture Notes: Network Security
Lesson 2 Attaching a Document.
Put the names of the people in the group here
DIGITAL ENCRYPTION INSTRUCTIONS FOR MICROSOFT OUTLOOK 2007
Lecture 1 Kanida Sinmai
Google Chromebook Certificate Deployment
CLICK TO START.
Internet Vocabulary Beth Felton McKelvey.
CLICK TO START.
GenCyber Day Website Security.
Call Now : Click : -
Call Now : Click : -
Call Now : Click : -
Presentation transcript:

CS 142 Lecture Notes: Security Attacks: Phishing Phishing Emails CS 142 Lecture Notes: Security Attacks: Phishing

Obviously Illegitimate http://rusprory.mass.hc.ru/old_site/update/index.php CS 142 Lecture Notes: Security Attacks: Phishing

Look-alike Characters CS 142 Lecture Notes: Security Attacks: Phishing

International Character Sets What does this URL refer to? www.bank.com/accounts/login.php?q=me.badguy.cn This is a host name only! Chinese characters that look like "/", "?", and "=" CS 142 Lecture Notes: Security Attacks: Phishing

CS 142 Lecture Notes: Security Attacks: Phishing Picture in picture CS 142 Lecture Notes: Security Attacks: Phishing

Legitimate Partners Can Look Fishy ??? ??? CS 142 Lecture Notes: Security Attacks: Phishing

CS 142 Lecture Notes: Security Attacks: Phishing HTTPS Indicators HTTP HTTPS Firefox 10 IE 8 Click on fav icon gives pop-up on bottom. Chrome 17 CS 142 Lecture Notes: Security Attacks: Phishing 7

Extended Validation Certificates CS 142 Lecture Notes: Security Attacks: Phishing

Extended Validation Certificates Normal HTTPS Firefox 10 IE 8 Click on fav icon gives pop-up on bottom. Chrome 17 Certificate Authority CS 142 Lecture Notes: Security Attacks: Phishing 9

CS 142 Lecture Notes: Security Attacks: Phishing