• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Ict   Phishing (Present)
 

Ict Phishing (Present)

on

  • 12,916 views

 

Statistics

Views

Total Views
12,916
Views on SlideShare
12,898
Embed Views
18

Actions

Likes
8
Downloads
358
Comments
5

3 Embeds 18

https://twitter.com 9
http://www.freewebs.com 5
http://www.slideshare.net 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

15 of 5 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • how to download ?
    Are you sure you want to
    Your message goes here
    Processing…
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
    Are you sure you want to
    Your message goes here
    Processing…
  • tiru ea.. membe nk.. ^_^
    Are you sure you want to
    Your message goes here
    Processing…
  • macam mana nak copy and paste ?
    Are you sure you want to
    Your message goes here
    Processing…
  • nice one
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Ict   Phishing (Present) Ict Phishing (Present) Presentation Transcript

    • PHISHING Presented by: Alya =) 4 server ‘07
    • INTRODUCTION
      • What is “Phishing”???
      • » Technique for acquiring your personal information and subsequently committing fraud in your name.
      • » Include stealing your identity or emptying your checking and savings accounts.
      • » A form of cyber-crime that's growing faster than the ability of the police or courts to deal with it.
      • » Simply a play on the word "fishing" — scammers drop email lures into the sea of Internet users, hoping to hook your personal information.
      • » More dangerous variation called “spear phishing”
      • » More insidious than regular phishing.
      • » Assume that your sensitive information has been captured or is at risk.
      • » Until you’ve installed and run an anti-spyware program, do not log in to any of your financial accounts.
      • » Crimeware will record your password and account information and transmit it to the crooks, who then sell it to the highest bidder.
      • How does it occur???
      • » Conducted by email.
      • » Receive an authentic-looking email message that appears to come from a legitimate business.
      • » Ask you to divulge or verify personal data such as an account number, password, credit card number or Social Security number.
      • » Possible for you to be phished by mail, telephone or even in person.
      • » Through the use of Instant Messaging (IM), which can also be used for identity theft as well as spreading viruses and spyware.
      INTRODUCTION
      • Who perpetrates it???
      • » Phishers are scam artists.
      • » Send millions of emails, realizing that even few recipients give them identifying information.
      • » Purchase software specifically designed to help set up and manage a phishing scam site.
      • Who is affected by phishing?
      • » Popular targets are users of online banking services and auction sites.
      • » Email address has been made public anywhere on the Internet then you are more susceptible to phishing.
      • » Scammers can use spidering or Web-crawling programs to search the Internet and collect millions of email addresses.
      INTRODUCTION
    • HOW CAN I RECOGNIZE A PHISHING EMAIL?
    • HOW CAN I MINIMIZE THE POSSIBILITY OF BEING CAUGHT BY A PHISHING SCAM?
      • • Be on guard
      • • Don't fill out a form on a Web site unless you know it is secure.
      • • Regularly check your bank, credit and debit card statements (paper and online).
      • • Ensure that your browser is up to date.
      • • Install and maintain antivirus and anti-spyware software
      • • Consider installing a phish-blocking toolbar on your Web browser.
      • • Stay informed.
    • WHAT SHOULD I DO IF I THINK I'VE RECEIVED A PHISHING EMAIL?
    • WHY SHOULD I PROTECT AGAINST PHISHING?
      • *Phishing attacks usually target:
      • - Bank information – such as VISA and PayPal accounts.
      • - Username and password information.
      • - Social Security numbers.
      • - Mother maiden’s name can be used to retrieve forgotten or lost credentials.
      • *The above information allows scammers to:
      • - Make fraudulent charges on your credit or debit card.
      • - Make use of your credentials on different online services to commit crime without being caught.
    • WHAT SHOULD I DO IF I'VE BEEN CAUGHT?
    • CONCLUSION
      • • Disturbing signs of evolving.
      • • Attacks becoming savvier & attackers beginning to share code and techniques with virus writers called crackers.
      • • Slow down unless service providers adequately address consumer security concerns in the form of strong authentication.
      • • Time to educate their users on how to spot a phishing attack.
      • • Email requests for passwords, credit card numbers, and other private data are never legitimate.
    • REFERENCES
      • Date of searching the information on the internet;
      • -09 MAY 2007-
      • -20 JUNE 2007-
      • Web;
      • http://www.ncsu.edu/it/essentials/antivirus_security/phishing/intro.html
      • http://www.ncsu.edu/it/essentials/antivirus_security/phishing/recognize.html
      • http://www.ncsu.edu/it/essentials/antivirus_security/phishing/receive.html
      • http://www.ncsu.edu/it/essentials/antivirus_security/phishing/avoid.html
      • http://www.ncsu.edu/it/essentials/antivirus_security/phishing/whatdo.html
    •