Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.

Similar presentations


Presentation on theme: "Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy."— Presentation transcript:

1 Information Security and Privacy Pertaining to Phishing and Internet Scams
Brian Corl COSC 316 Information Security and Privacy

2 Definitions and recent statistics
Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam s Possible losses Prevention techniques

3 Important Scam Definitions
Phishing- An online scam in which the perpetrator sends out a large number of legitimate looking s that appear to come from respected companies (such as banks, credit card companies, etc.) with the intent of "fishing" for personal and financial information from the recipient. These s are falsely claiming to be the respected company who needs the user's information to update their files, when in fact, it is an attempt to scam the user into surrendering private information that will later be used for identity theft. (Netlingo)

4 Important Scam Definitions
Spear Phishing- an spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing is a specific attack against a certain company or organization. (whatis) Spoofing- the forgery of an header so that the message appears to have originated from someone or somewhere other than the actual source. (whatis)

5 PhishTank.com’s Month Overview

6 Why is phishing so dangerous?
s and websites can be convincing or hard to distinguish from the real company Uses pictures and websites from existing companies Can sometimes link to the real website to seem even more realistic address seems legitimate

7 Common Phishing Tactics and Identifiers
Reply s are requested to be sent to a different address Reason for the information request Account information is outdated Account has been selected for varification Limited time threats Threats of discontinued service or deactivated accounts Security Statement Assure the victim that the company can be trusted with the requested information Use of the TRUSTe symbol to fake legitimacy (even though this symbol is supposed to be displayed to show security) Information Collection Link to a site that requires information be submitted Request for an reply with information included Due to the short life span of phishing sites…

8 Common Phishing Tactics and Identifiers
Fake links or hidden destinations Links that take you to a different destination than stated in the Using the IP address of the website, which can be modified even farther by representing it in a different format (hex,oct) Symbol and Hexadecimal Commands When used in http or https, all text before becomes ignored @ can be concealed even further by using %40, which is it’s hexadecimal representation Putting a null (%00) in front of will sometimes hide the real destination, giving only the user info tag

9 Fake Link Examples <a class="m1" target="_blank" title="Update" href=" Actual link address Stated link addres

10 Fake Link Examples onMouseOver modification
<Aonmouseover="window.status=' return true“ onmouseout="window.status=' " Typed Address onMouseOver Address Actual Address

11 Phishing Email Examples

12 Possible Losses/Criminal Targets
Personal Social Security Number Credit Card Numbers Bank Accounts Private Information Businesses Credibility Money Customer Information Employee Information Private Documents

13 Prevention Techniques, Methods, and Advancements
Businesses should have policies on what information should never be given out Ex: passwords, usernames, important files Most businesses will never ask you to give out your private information in an Contact the company by phone if unsure about an Do not give personal information out in an Programs and communities are being developed to fight against phishing

14 Overview Important definitions and statistics
Why phishing is so dangerous What makes up a phishing attack Examples Losses and preventions


Download ppt "Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy."

Similar presentations


Ads by Google