Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Primary Threats to Computer Security
BlueRedGreenPurpleOrange.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Chapter 7: The Web and 1 The Web and Chapter 7.
Threats To A Computer Network
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Spam Sonia Jahid University of Illinois Fall 2007.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Drive-by pharming is an interesting type of networking attack that combines multiple networking vulnerabilities and average user laziness to create an.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Security fundamentals Topic 9 Securing internet messaging.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Protecting the Server and Client Lesson 5. Objectives.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Understand Protection LESSON Security Fundamentals.
2 Computer JEOPARDY How’s Your Inbox? Computers Get Sick Too See You in Cyberspace W Cubed ScatteredBits
Unit 3 Section 6.4: Internet Security
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
What is it? Why do I keep getting from Barracuda? SPAM.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft.  Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft.

 Identity Theft Theft

Outlook 2003 SP2/2007 contains some protection from phishing s.  Outlook 2003 SP2/2007 contains some protection from phishing s.  By not replying directly to e- mails asking for personal information.  By never clicking on a link in an in order to enter your log-in information or password.  By not copying and pasting a URL address from a suspicious .

Pharming (pronounced “farming”) is the term for when criminal hackers redirect Internet traffic from one Web site to a different, identical-looking site in order to trick you into entering your user name and password into the database on their fake site. o Pharming (pronounced “farming”) is the term for when criminal hackers redirect Internet traffic from one Web site to a different, identical-looking site in order to trick you into entering your user name and password into the database on their fake site. o Pharming might sound similar to phishing scams, but pharming is insidious, because you can be redirected to a false site without any participation or knowledge on your part.

The possibility of the DNS (Domain Name System) setting on the user’s wired or wireless broadband router being changed. o The possibility of the DNS (Domain Name System) setting on the user’s wired or wireless broadband router being changed. o Hackers having complete control of the broadband connections.

By running separate name servers for redundancy on different network segments. o By running separate name servers for redundancy on different network segments. o By restricting dynamic DNS updates when possible. o By restricting zone transfers only to authorized devices. o By using firewall services both at the network perimeter & on the DNS servers.

 Anonymous, unsolicited bulk mail. Real spam is sent with spoofed or harvested sender addresses to conceal the sender. Real spam is sent in mass quantities.  Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective the initial mail have to be high volume.

Spam can be used to download viruses, worms and Trojans onto your computer.  Spam can be used to download viruses, worms and Trojans onto your computer.

Free Anti-Spam Software  Free Anti-Spam Software  By not replying to the address in the “from” field.  By not loading HTML with images.  By not using the “remove” link (unsubscribe link) on any links in the spam s.  By using your client or web service filters (or message rules) to discard a good portion of spam.