Download presentation
Presentation is loading. Please wait.
Published byGeorgiana Parker Modified over 9 years ago
1
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu
2
Page 2 Outline Threats to Identity Theft Phishing – Definition – Methods Pharming – Definition – Methods Safeguards Project aims
3
Page 3 Identify Theft Two major Identity theft threats Aim at stealing personal sensitive data – ID & password – Passport information – SSN – Bank account numbers – Credit card numbers – etc
4
Page 4 Statistical Highlights for 2nd Half, 2008 Phishing Activity Trends Report, 2nd Half 2008
5
Page 5 Statistical Highlights for 2nd Half, 2008 Phishing Activity Trends Report, 2nd Half 2008
6
Page 6 Phishing
7
Page 7 Methods / Techniques Misspelled URLs – (http://www.eccs.ucf.edu/account) Spoofing URLs (http://www.google.com@members.hacker.com) Javascript International Domain Names
8
Page 8 Pharming
9
Page 9 Methods / Techniques Email Viruses – Alters the computer’s host file DNS Poisoning – Nothing on computer changes – The company’s website is “hijacked” Web Cache Poisoning Drive-by pharming
10
Page 10 Safeguards Specialized “Anti-Phishing” Software Spam filters Multifactor authentication Challenge Questions Secure connections DNS protection
11
Page 11 The project aims at studying the methods of Phishing and Pharming, and analyzing the effectiveness of the safeguards against these methods. Proposal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.