Presentation is loading. Please wait.

Presentation is loading. Please wait.

ISYM 540 Current Topics in Information System Management

Similar presentations


Presentation on theme: "ISYM 540 Current Topics in Information System Management"— Presentation transcript:

1 ISYM 540 Current Topics in Information System Management
Phishing ISYM 540 Current Topics in Information System Management

2 Hackers want to… Use you to spread their worms and viruses.
Install spyware programs on your computer so they can monitor everything you do on the Internet. Alter your browser, forcing it to visit websites you don't want to visit. Get your personal information Goal 1 is usually about “FUN” Goals 2, 3 and 4 are usually about MONEY!

3 Phishing Means to a fraud Spam/ forged emails Fake sites
Trojans/ malware Web 2.0 (JavaScript, Ajax, xss, etc) Personal data are the object of interest: credit card numbers, bank accounts details , PINs, etc.

4 Phishing technique Unsolicited message („spam“) as the initiator Bogus website random URL; or confusingly similar domain name Variety of other techniques - Cross-site scripting, Man-in-the-middle attack, HTML form in the spam .

5 WHY PHISHING ATTACK! Lack of Knowledge • computer system
• security and security indicators • web fraud Visual Deception • Visually deceptive text • Images masking underlying text

6 Phishing – random URL

7 Phishing – confusingly similar domain name
fake websites • usually not hosted in the US. • usually not up for more than a few days.

8 Phishing – HTML form in email
eBay phishing A fake link

9 Phishing and domain name registries
November 2007: Over phishing websites detected just in this month Removing domain names is not the ultimate solution website still accessible through the IP address

10 TO protect your personal and financial information
Be suspicious of messages that contain urgent requests for personal financial information, even if they appear to be from a trusted source (PayPal, eBay, your bank, etc.). Do not click links in messages that you suspect are not legitimate. Instead, open a new browser window and type in the URL directly. Do not disclose personal or financial data in . Verify the security of the websites you visit by making sure that the web address begins with https: rather than http: before submitting credit card or other sensitive information online. Review your bank, credit, and debit card statements regularly to ensure that all transactions are legitimate. Keep your browser up to date and make sure to apply all released security patches.

11


Download ppt "ISYM 540 Current Topics in Information System Management"

Similar presentations


Ads by Google