By The Blank Mind Group Dana Fellows Jason Kohut Rick Barton Darrell Fraser Kuo-Luen Chang Darrell Fraser Kuo-Luen Chang.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Phishing Tales: Honestly, the problem is ‘this big’ Peter Black, Queensland University of Technology
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
PHISHING By, Himanshu Mishra Parrag Mehta. OUTLINE What is Phishing ? Phishing Techniques Message Delivery Effects of Phishing Anti-Phishing Techniques.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Phishing – Read Behind The Lines Veljko Pejović
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
ICASAS206A Detect and protect from spam and destructive software Identify and Stop Spam Warren Toomey North Coast TAFE Port Macquarie campus.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Internet Vulnerabilities & Criminal Activity Phishing, Nigerian 419’s, & High-Yield Investment Programs (HYIP) /31/2011.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Phishing: Trends and Countermeasures Blaine Wilson.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
A Matter of Your Personal Security Phishing Revised 11/30/15.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
By: Valerie Boscia PHISHING. PHISHING OVERVIEW Pronounced “fishing” To Phish: defined by the Oxford English Dictionary as “To perpetrate a fraud on the.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Dr. Harold Cothern, Educause/SonicWall, Hendra Harianto Tuty, Microsoft.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Important Information Provided by Information Technology Center
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing is a form of social engineering that attempts to steal sensitive information.
Information Security Session October 24, 2005
Phishing.
Computer Security.
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Presentation transcript:

By The Blank Mind Group Dana Fellows Jason Kohut Rick Barton Darrell Fraser Kuo-Luen Chang Darrell Fraser Kuo-Luen Chang

 Definition  History  Problematic Behaviors  Laws  Compliance Guidelines  Penalties  Current Management Application  Client Based Anti-Phishing Programs

 According to Merriam-Webster, “phishing” is “a scam by which an user is duped into revealing personal or confidential information which the scammer can use illicitly.”  Wikipedia states “in the field of computer security phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in electronic communication.”

Spear Phishing Whale Phishing When phishers personalize their attacks to their intended targets to increase the probability of success. A sneaky attempt by scammers to hijack the personal computers of top-ranking business executives.

 Phishing has existed in different forms for years Mail scamsTelephone scamsHas evolved along with technologyNow used electronically

Gullible consumers easily duped Mass ing capability increases probability of hooking victims Phishing is a Global problem and therefore difficult to regulate or prosecute United States is the World Leader in Phishing sites. See Jason Kohut’s BlogBlog

 Federal Level ◦ CAN-SPAM (Controlling the Assault of Non-Solicited Pornography And Marketing) Act of 2003  Signed into law by George W. Bush  Sets standards for sending commercial  It is a misdemeanor to send spam with falsified header information!

 Anti-Phishing Act of 2004(never got past committee)  Introduced by Senator Patrick Leahy  Anti-Phishing Act of 2005(never enacted)  This law, had it passed, would have placed large fines and lengthy prison sentences for “fake websites and bogus websites” developed for the purpose of defrauding individuals  First law to differentiate and target “phishing” specifically

 No State/Local Laws in Missouri ◦ Other states have enacted laws within their borders.  Federal Laws Control Phishing because it’s Interstate Fraud  Phishing has not yet been addressed by the lawmakers of Missouri

 Commercial allowed as long as it conforms to three types of compliances: Compliance #1-Unsubscribe A method to unsubscribe from future s must be provided Compliance #2 – Content: Relevant Subject Lines Accurate “From” lines Legitimate Physical address of the publisher/advertiser Content is exempt if it consists of national security messages, political messages, or religious messages

 Social Networking Websites ◦ Due to their popularity, social networking websites have become popular phishing holes.  Criminals pretending to be the IRS to attain sensitive information from U.S. taxpayers. ◦ IRS Video Warning About Phishing IRS Video Warning About Phishing

After the last annual calculations of your fiscal activity we have determined that you are eligible to receive a tax refund of $ Please submit the tax refund request and allow us 6-9 days in order to process it. A refund can be delayed for a variety of reasons. For example submitting invalid records or applying after the deadline. To access the form for your tax refund, please click here Regards, Internal Revenue Service

 Compliance #3 – Sending Behavior Message cannot be sent through an open relay Message cannot be sent to a harvested address Message cannot contain a false header

 Jeffrey Brett Goodin  First person prosecuted under CAN-SPAM Act  Conned AOL customers by sending s that appeared to be from AOL’s billing department, which required users to reveal their personal and credit card information  Sentenced in 2007 to 70 months  Ordered to pay over 1 million dollars to his victims.

 Management needs to inform employees about the potential threats of phishing and the signs to look for. ◦ Don’t give out company login information to suspicious s. ◦ Never login through an from a business partner if asked. Go to their corporate website and login how you normally would.

 Update internet browsers to the latest versions. ◦ Make sure your browser has the SSL (Secure Socket Layer) certificate selected.  Computer Security Programs ◦ Avira Premium Security Suite ◦ McAfee SiteAdvisor ◦ ESET Smart Security ◦ Phishtank (SiteChecker)  Windows Mail  eBay Toolbar

 Definition  History  Problematic Behaviors  Laws  Compliance Guidelines  Penalties  Current Management Application  Client Based Anti-Phishing Programs