Slide 1 Phishing Emails CS 142 Lecture Notes: Security Attacks: Phishing.

Slides:



Advertisements
Similar presentations
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
Advertisements

CS 142 Lecture Notes: FormsSlide 1 Simple Form Product: Price:
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
CS1203 Uploading homework to be graded. C Click Here.
HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
CS 142 Lecture Notes: URLs and LinksSlide 1 Uniform Resource Locators (URLs) Scheme Host Name.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
MECC Central Rollout Technical Information for IT Managers.
CS 142 Lecture Notes: Large Scale ApplicationsSlide 1 Basic Model May 30, 2014 Web Server Application Server Database HTTPHTTP?SQL.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Alpha Five User Group, Bill Parker, SSL Security and WAS, July 2007 SSL Security with Alpha Five App Server Protecting sensitive or personal data.
URLs for Pictures ht.jpg
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
788.11J Presentation “sensors for phishing” (i.e., your short name of the paper’s title) Presented by Student Name.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Lectures and Practicals Mon 8-10 SC1222 TUE SC1222 Office: SC Website: mis.csit.sci.tsu.ac.th/kanida.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
Spoofing Keegan Haukaas, Samuel Robertson, Jack Murdock.
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
Usable Security Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last slide for.
 We live in an information age where it's very easy to publish on the Internet. The average person can write their own blog and add to Wikipedia. Anything.
High Assurance / Enhanced Validation Name of Presenter: Kevin Brown Date: August 5th Confidential.
CS5540 HCI Sept 07 CS5540 HCI Assignment 1 Interface vs. Functionality Partner 1 Name Partner 2 Name Fall 2008.
Workshop: Programme management organization in Lithuania.
A Quick Insight Paper about phishing attacks based on usability study Users required to classify websites as fraudulent/legitimate using security tools.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
An Evaluation Of Extended Validation and Picture-in-Picture Phishing Attacks Presented by Hui (Henry) Fang Collin Jackson, Daniel R. Simon, Desney S. Tan,
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /3/17 1 Data Mining and Machine Learning Lab.
Web SecurityIdentity Verification Services Signing Services Enterprise Security © 2007 GeoTrust, Inc. All rights reserved. How SSL is Changing to Increase.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
LOOK-ALIKES Introduction to Raman Spectroscopy. Which of the following is poisonous? A B.
CS5540 HCI CS5540 HCI Assignment 3 Affordance v Mapping Partner 1 Name Partner 2 Name Fall 2008.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Transport Layer Security (TLS) Extensions: Extension Definitions draft-ietf-tls-rfc4366-bis-00.
Gilda certificates. Certification Authority
网上报账系统包括以下业务: 日常报销 差旅费报销 借款业务 1. 填写报销内容 2. 选择支付方式 (或冲销借款) 3. 提交预约单 4. 打印预约单并同分类粘 贴好的发票一起送至财务 处 预约报销步骤: 网上报账系统 薪酬发放管理系统 财务查询系统 1.
Web4Labels 3.1 Connection security via https 04/2016 -
IT Security Awareness Day October 19, 2016
CS7026: Authoring for Digital Media HTML Authoring
4 Criteria for evaluating digital information
continued on next slide
Indiana U t Wendy Balmer
CS 142 Lecture Notes: Network Security
GeoMesh Blockchain Networking - Slide Presentation
CS 142 Lecture Notes: Network Security
Starter What is identity theft?
                                                                                                                                                                                                                                                
continued on next slide
continued on next slide
Phishing.
RAMCloud Architecture
CS 142 Lecture Notes: Security Attacks: Phishing
Public-Key Certificates
RAMCloud Architecture
Uniform Resource Locators (URLs)
CS 142 Lecture Notes: Security Attacks: Phishing
CS 142 Lecture Notes: Security Attacks: Phishing
CS 142 Lecture Notes: Securing the Connection
Teaching you NOT to fall for Phish
CS 142 Lecture Notes: Network Security
CS 140 Lecture Notes: Introduction
CS 140 Lecture Notes: Introduction
CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena
continued on next slide
continued on next slide
Presentation transcript:

Slide 1 Phishing s CS 142 Lecture Notes: Security Attacks: Phishing

Slide 2 Legitimate: Extended Validation

CS 142 Lecture Notes: Security Attacks: PhishingSlide 3 Obviously Illegitimate

CS 142 Lecture Notes: Security Attacks: PhishingSlide 4 Look-alike Characters

CS 142 Lecture Notes: Security Attacks: PhishingSlide 5 Legitimate Partners Can Look Fishy ???

CS 142 Lecture Notes: Security Attacks: PhishingSlide 6 International Character Sets ● What does this URL refer to? ● This is a host name only! Chinese characters that look like "/", "?", and "="

CS 142 Lecture Notes: Security Attacks: PhishingSlide 7 Picture in picture

CS 142 Lecture Notes: Security Attacks: PhishingSlide 8 HTTPS Indicators HTTPHTTPS Firefox 10 IE 8 Chrome 17

CS 142 Lecture Notes: Security Attacks: PhishingSlide 9 Extended Validation Certificates ExtendedNormal HTTPS Firefox 10 IE 8 Chrome 17 Certificate Authority

CS 142 Lecture Notes: Security Attacks: PhishingSlide 10