Download presentation
Presentation is loading. Please wait.
Published byBernard Hunt Modified over 9 years ago
2
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing emails are designed to look like they are official. Phishing emails also request immediate visit to update personal details.
3
Spear phishing are highly specialized attacks that are targeted to small groups in collecting information to have access to many systems. Social networks may be effected by spam or malware links that are added in apps or compromised accounts.
4
An electronic equivalent of junk, bulk, unwanted, or unsolicited email. Ensuring the filtered junk mail is a way to check the needed emails from the unwanted ones. Limiting viewers accessibility to the email profile blocks unnecessary online presence of people.
5
Creating TCP/IP packets to use someone’s else’s IP address to hide the original IP like chatting on-line, sending emails, and surfing the web. Man-in-the-middle, routing redirect, source routing, blind spoofing, and flooding are examples of spoofing.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.