Download presentation
Presentation is loading. Please wait.
Published byEthel Cooper Modified over 9 years ago
1
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY
2
What is Phishing ? The practice of sending out fake emails, or spam, written to appear as if they have been sent by banks or other reputable organizations, with the intent of luring the recipient into revealing sensitive information The practice of sending out fake emails, or spam, written to appear as if they have been sent by banks or other reputable organizations, with the intent of luring the recipient into revealing sensitive information E.g - usernames, passwords, account IDs, ATM PINs or credit card details E.g - usernames, passwords, account IDs, ATM PINs or credit card details
3
attacks will direct the recipient to a web page designed to mimic a target organisation's own visual identity to harvest the user's personal information often leaving the victim unaware of the attack Obtaining this type of personal data is attractive to blackhats
4
Who Is Behind The Phishes & Why SCAM ARTISTS send out millions of these scam e-mails in the hopes that even a few recipients will act on them and provide their personal and financial information e-mail address that has been made public on the Internet - more susceptible to phishing e-mail address can be saved by spiders that search the Internet Compared to
5
WHY ? They can grab as many e-mail addresses as they can they can cheaply and easily access millions of valid e-mail addresses to send these scams to
6
Examples of Phishing PayPal phishing example PayPal phishing example An example of a phishing email targeted at PayPal users. An example of a phishing email targeted at PayPal users. In an example PayPal phish, spelling mistakes in the email and the presence of an IP address in the link (visible in the tooltip under the yellow box) are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details is not a guarantee of legitimacy. In an example PayPal phish, spelling mistakes in the email and the presence of an IP address in the link (visible in the tooltip under the yellow box) are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details is not a guarantee of legitimacy. SouthTrust Bank example In this second example, targeted at SouthTrust Bank users, the phisher has used an image to make it harder for anti-phishing filters to detect by scanning for text commonly used in phishing emails.
7
Damage causes loss of access to email to substantial financial loss loss of access to email to substantial financial loss Its more popular because of the ease with which unsuspecting people often divulge personal information to phishers Its more popular because of the ease with which unsuspecting people often divulge personal information to phishers Once this information is acquired, the phishers may use a person's details to create fake accounts in a victim's name Once this information is acquired, the phishers may use a person's details to create fake accounts in a victim's name
8
Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites and e-mail consists of computer programs that attempt to identify phishing content contained in websites and e-mail often integrated with web browsers and email clients as a toolbar that displays the real domain name for the website the viewer is visiting, in an attempt to prevent fraudulent websites from masquerading as other legitimate web sites often integrated with web browsers and email clients as a toolbar that displays the real domain name for the website the viewer is visiting, in an attempt to prevent fraudulent websites from masquerading as other legitimate web sites may also be included as a built-in capability of some web browsers may also be included as a built-in capability of some web browsers
9
Anti-Phishing Programs Microsoft Windows Internet Explorer 7 Microsoft Windows Internet Explorer 7 Firefox 2.0 Firefox 2.0 Netscape 8.1 Netscape 8.1 Netcraft Toolbar Netcraft Toolbar Google Safe Browsing (usable with Firefox) Google Safe Browsing (usable with Firefox) eBay Toolbar eBay Toolbar Phishtank SiteChecker Phishtank SiteChecker
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.