Presentation is loading. Please wait.

Presentation is loading. Please wait.

Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.

Similar presentations


Presentation on theme: "Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details."— Presentation transcript:

1 Adam Soph, Alexandra Smith, Landon Peterson

2 Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy company in an electronic communication.

3 Phishers decide which business to target and determine how to get customers email addresses. Once they know which business to spoof and who their victims are, they creates methods for delivering the messages and collecting data.

4 Then the phisher sends a phony message that appears to be from a reputable source. And finally they collect the victims information when the victim opens the message or the phony website.

5 Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.

6 The phisher infects the computer with viruses to convince people to unwittingly participate in money laundering. Most people associate with email messages that spoof or mimic banks or other businesses such as Amazon or eBay.

7  Be Suspicious of any email with urgent request for personal financial information.  Don’t use the link in an email, instant message or chat to any web page if you suspect the message might not be authentic or you don’t know the sender or user’s handle.

8  Avoid filling out forms in email address that ask for personal financial information  Always ensure that you’re using a secure website when submitting credit card and other sensitive information via your web browser.

9  Remember not all scam sites will try to show the http:// and/or the security lock. Get in the idea habit of looking at address lines too.  Consider installing a web browser tool bar to help protect you from known fraudulent websites. Theses toolbars match where you are going with list of known phisher websites.  Regularly log into your online account

10  Regularly check your bank, credit card and debit card statements to ensure that all transactions are legitimate.  Ensure that your browser is up to date and security patches applies.  Always report “Phishing” or “spoofed” emails to the following groups.

11  Passwords – A word or a series of characters and symbols you type in, in order to access file or memory unit.  Email Spoofing – An email activity in which the senders address and other parts of the email header are altered to appear as though the email originated from a legitimate source.

12  Phreaking – A slang term coined to describe the activity of a culture of people that study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.  Social Engineering – The act of manipulating people into performing actions or disclose confidential information, rather than by breaking in or using technical cracking techniques; essentially a fancier, more technical way of lying.

13  Telecommunication – The transmission of information over significant distances to communicate.  Instant Messaging – The transmission of information over significant distances to communicate.

14  Website Forgery – To make a website that is false of a company in order to obtain personal information. Example: A bank website, or other website that needs login information.  AOL Phishing – An early phishing technique used to obtain information over AOL.

15  http://en.wikipedia.org/wiki/Phishing http://en.wikipedia.org/wiki/Phishing  http://computer.howstuffworks.com/phishing.ht m http://computer.howstuffworks.com/phishing.ht m  http://www.ftc.gov/bcp/edu/pubs/consumer/aler ts/alt127.shtm http://www.ftc.gov/bcp/edu/pubs/consumer/aler ts/alt127.shtm  http://www.antiphishing.org/consumerrecs.html http://www.antiphishing.org/consumerrecs.html  http://www.webroot.com/En_Us/csc/spyware- FAQs.html http://www.webroot.com/En_Us/csc/spyware- FAQs.html  http://computer.howstuffworks.com/phishing.ht m http://computer.howstuffworks.com/phishing.ht m

16


Download ppt "Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details."

Similar presentations


Ads by Google