Presentation is loading. Please wait.

Presentation is loading. Please wait.

PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.

Similar presentations


Presentation on theme: "PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking."— Presentation transcript:

1

2 PREPARED BY: SYAIDATUL SYAZANA BT PAUZI

3 INTRODUCTION What is the definition of Phishing Hacking

4 An attempt to acquire information such as: Username Password Credit Cards details Communication purporting to be from popular social web sites, for example: Online Booking Ticket Flight

5 Is a form of illegal intrusion into computer systems Modifying computer software or data to accomplish a goal outside of the creator’s original purpose People involved are known as hackers

6

7 Ways To Stop Computer Phishing and Hacking Good Password Selection Different accounts, different passwords Complex password Use Multiple or layered identity level of security 1 level id and password to access low security account and information Stronger authentication for higher risk account or information Use callback systems Dial the server’s telephone number; the modem can help to connect 1 computer to another. Use ‘’Know & Have’’ authentication Token Smartcard Biometric authentication

8 Phishing and unethical hacking are irresponsible acts. Always take safety precautions to avoid from becoming the victim in phishing and hacking activities. Never respond to an unknown e-mail asking for our private information. Only make transactions via secure websites that have ‘https’ or the padlock icon. CONCLUSION

9 CREDITS Hacking Image: http://3.bp.blogspot.com/_kdrphzeOB5k/SvnKiscB6- I/AAAAAAAAArc/FhGmGFaXnXk/s400/hacking_big.jpgHacking Image: http://3.bp.blogspot.com/_kdrphzeOB5k/SvnKiscB6- I/AAAAAAAAArc/FhGmGFaXnXk/s400/hacking_big.jpg Phishing Image: http://www.kcomputerrepairoc.com/wp- content/uploads/2011/08/protect-yourself-from-phishing.jpg Thinking Image: http://www.theemotionmachine.com/wp- content/uploads/Thinking.jpg Information taken from: http://www.londonancestor.com/security/secure-pc.htmInformation taken from: http://www.londonancestor.com/security/secure-pc.htm

10 CREDITS Background Music: "The Long Goodbye" by John Pazdan http://ccmixter.org/files/flatwound/14476 is licensed under a Creative Commons license: http://creativecommons.org/licenses/by/2.5/ http://ccmixter.org/files/flatwound/14476

11


Download ppt "PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking."

Similar presentations


Ads by Google