0
PHISHING….. Created by: Benson Oo CLICK  HERE  FOR MORE….
<ul><li>What is  Phishing ? </li></ul><ul><li>How they Attack? </li></ul><ul><li>How to Detect? </li></ul><ul><li>Damage c...
What is pHisHing??? <ul><li>Phishing is defined as the fraudulent acquisition of personal information by tricking an indiv...
How They ATTACK….. <ul><li>Most attacks of phishing use some form of technical deception designed to make a link in an ema...
How TO DEteCt….. <ul><li>It is actually very noticeable. You will see misspelled URLs. One way seeing it is discovering @ ...
Damage caused by phishing. <ul><li>The damage caused by phishing ranges from loss of access to email to substantial financ...
Conclusion….. <ul><li>Phishing e–mails are only a small aspect of the overall phishing economy and until now, the only asp...
Source Of Information <ul><li>www.wikipedia.org </li></ul><ul><li>www.antiphishing.org </li></ul><ul><li>www.google.com </...
Upcoming SlideShare
Loading in...5
×

P H I S H I N G

12,849

Published on

is to fulfill my SPM

Published in: Technology, Design
1 Comment
3 Likes
Statistics
Notes
  • thank it can be a guide :)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
12,849
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
502
Comments
1
Likes
3
Embeds 0
No embeds

No notes for slide

Transcript of "P H I S H I N G"

  1. 1. PHISHING….. Created by: Benson Oo CLICK HERE FOR MORE….
  2. 2. <ul><li>What is Phishing ? </li></ul><ul><li>How they Attack? </li></ul><ul><li>How to Detect? </li></ul><ul><li>Damage caused by phishing . </li></ul><ul><li>Conclusion. </li></ul><ul><li>Source of Information. </li></ul>CONTENT
  3. 3. What is pHisHing??? <ul><li>Phishing is defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity this is normally done through emails and an instant message. </li></ul>
  4. 4. How They ATTACK….. <ul><li>Most attacks of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.maybank.home.com/. One method of spoofing links used web addresses containing the @ symbol, which were used to include a username and password in a web URL </li></ul>
  5. 5. How TO DEteCt….. <ul><li>It is actually very noticeable. You will see misspelled URLs. One way seeing it is discovering @ in the web addresses e.g. http://www.hotmail.com@members.com. Some web browsers such as Mozilla and Internet Explorer has closed this off while Opera gives a warning and an option to get off the website. In another popular method of phishing, an attacker uses a bank or other services website scripts on the victim.These types of attack known as cross-site scripting. </li></ul>
  6. 6. Damage caused by phishing. <ul><li>The damage caused by phishing ranges from loss of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the ease with which unsuspecting people often divulge personal information to phishers, including credit card numbers , social security numbers, and mothers maiden names. There are also fears that identity thieves can obtain some such information simply by accessing public records. Once they have the information they need and want, the phishers will use that person’s detail to create fake accounts using the victims name, using up a persons credit, or even prevent the victim from accessing to their own accounts </li></ul>
  7. 7. Conclusion….. <ul><li>Phishing e–mails are only a small aspect of the overall phishing economy and until now, the only aspect seen by the most people. The phishing economy is a decentralized and self–organized social network of merchants and consumers governed by laws of supply and demand. This clearer picture of the landscape, the players, and insight into phishing operations will hopefully assist in the fight against online fraud. </li></ul>
  8. 8. Source Of Information <ul><li>www.wikipedia.org </li></ul><ul><li>www.antiphishing.org </li></ul><ul><li>www.google.com </li></ul><ul><li>www.webopedia.com </li></ul><ul><li>www.computerworld.com </li></ul><ul><li>www.yahoo.com </li></ul><ul><li>www.honeynet.org </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×