Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Phishing, what you should know L kout Initiative.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Phishing, what you should know L kout Initiative Office of Information Technology.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Internet Phishing Not the kind of Fishing you are used to.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
How It Applies In A Virtual World
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
Reliability & Desirability of Data
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing: Trends and Countermeasures Blaine Wilson.
How Phishing Works Prof. Vipul Chudasama.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Jamie Salazar.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Important Information Provided by Information Technology Center
ISYM 540 Current Topics in Information System Management
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
Computer Security.
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Presentation transcript:

Adam Soph, Alexandra Smith, Landon Peterson

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy company in an electronic communication.

Phishers decide which business to target and determine how to get customers addresses. Once they know which business to spoof and who their victims are, they creates methods for delivering the messages and collecting data.

Then the phisher sends a phony message that appears to be from a reputable source. And finally they collect the victims information when the victim opens the message or the phony website.

Some phishing s contain software that can harm your computer or track your activities on the Internet without your knowledge.

The phisher infects the computer with viruses to convince people to unwittingly participate in money laundering. Most people associate with messages that spoof or mimic banks or other businesses such as Amazon or eBay.

 Be Suspicious of any with urgent request for personal financial information.  Don’t use the link in an , instant message or chat to any web page if you suspect the message might not be authentic or you don’t know the sender or user’s handle.

 Avoid filling out forms in address that ask for personal financial information  Always ensure that you’re using a secure website when submitting credit card and other sensitive information via your web browser.

 Remember not all scam sites will try to show the and/or the security lock. Get in the idea habit of looking at address lines too.  Consider installing a web browser tool bar to help protect you from known fraudulent websites. Theses toolbars match where you are going with list of known phisher websites.  Regularly log into your online account

 Regularly check your bank, credit card and debit card statements to ensure that all transactions are legitimate.  Ensure that your browser is up to date and security patches applies.  Always report “Phishing” or “spoofed” s to the following groups.

 Passwords – A word or a series of characters and symbols you type in, in order to access file or memory unit.  Spoofing – An activity in which the senders address and other parts of the header are altered to appear as though the originated from a legitimate source.

 Phreaking – A slang term coined to describe the activity of a culture of people that study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.  Social Engineering – The act of manipulating people into performing actions or disclose confidential information, rather than by breaking in or using technical cracking techniques; essentially a fancier, more technical way of lying.

 Telecommunication – The transmission of information over significant distances to communicate.  Instant Messaging – The transmission of information over significant distances to communicate.

 Website Forgery – To make a website that is false of a company in order to obtain personal information. Example: A bank website, or other website that needs login information.  AOL Phishing – An early phishing technique used to obtain information over AOL.

  m m  ts/alt127.shtm ts/alt127.shtm   FAQs.html FAQs.html  m m