Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)

Slides:



Advertisements
Similar presentations
Legal Meetings: Extended Instructions on Movica and Screencast.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Direct Attacks on Computational Devices
  Cyberbullying can be as simple as continuing to send e- mail or text harassing someone who has said they want no further contact with the sender.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Threats To A Computer Network
What are Requirements? Functional requirements describe a list of functions that the system must accomplish. Nonfunctional requirements describe other.
Quiz Review.
By: Marcus Owens. Essential Components Your computer depends on two things: hardware and software. Hardware are physical components that make up your.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Input and Output devices Input ports are connections at the back of a computer. Input devices are connected to these ports, for example, a keyboard which.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Software Engineering for Secure Systems Individual Research Project Hiram Garcia.
Information Security Phishing Update CTC
AI&SS Administrative Group April, Meal Reimbursements. Invoices, Check Requests Year end deadlines for Accounting De-obligation of Accounts “Phishing”
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Keylogger A presentation of computer safety. What is a Keylogger?  A keylogger is an invisible tool for surveillance that allows you to monitor the activities.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Computer main parts. Hardware  It refers to all physical parts of a computer system.
May be reproduced for classroom use. © Classroom Connect Computer Parts and Vocabulary.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Why Information Security is very important? What is Key Logger ?
Objectives: Identify problems that can occur if hardware is not properly maintained Identify routine maintenance that should be performed by users Identify.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Vocabulary By: jacourtland webster. Aggregator an aggregator is any device that serves multiple other devices or users either with its own capabilities.
COMPUTER MAIN PART DANILO GARCÍA GONZÁLEZ TÉCNICO EN SISTEMAS.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
BASIC COMPONENTS.  Central processing unit.  The most powerful microprocessor chip in your computer.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Internet safety By Suman Nazir
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Digital Literacy: Computer Basics
Open-Ended Questions:Closed-Ended Questions: What problems are you experiencing? What software has been installed recently? What were you doing when you.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
]Hacking Team[ RCS Remote Control System DEMO PROCEDURES.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
By: Maxwell Varner.  Description/Background  Uses for Keyloggers  Types of Keyloggers  Prevention Methods  Causes for Concern  Wrap-up  Questions/Discussion.
Best Free Key logger Download Computer & Internet Monitoring Software.
By BIJAY ACHARYA Twitter.com/acharya_bijay
National Cyber Security Month
TOPIC 6: SYSTEM START-UP AND CONFIGURATION
Electronic Mail.
Felix’s Technology Dictionary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
What is keystroke logging?
Week 7 - Wednesday CS363.
Presentation transcript:

Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishtank: An web based solution to validate a site. -

Phishtank Functionality -Verify a site -Search a phishing site from existing list -Add a site into the phishing list

Keyloggers Definition: “A keylogger is something that records keystrokes made on a computer. It captures every key pressed on the keyboard and stores it down in a file or memory bank that can be viewed by the person performing the monitoring in real-time, or at a later date.” [1] There are two types of keylogger: hardware keylogger and software keylogger [1]

Hardware Keylogger Three types [1]: Inline devices that are attached to the keyboard cable Devices which can be installed inside standard keyboards Actual replacement keyboards that contain the key logger already built- in It only can be discovered by people and removed physically

Software Keylogger Actual keylogger( It records: Which applications are run and closed All keystrokes pressed (keystroke logger) All content copied to the clipboard All print activity Any disk changes Any Internet connections made, and all websites visited Startup/shutdown operations

Actual Keylogger generates: Screen captures for a set time period Encrypted log files for all activity Reports in text and html format