Your SlideShare is downloading. ×
Computer 4 ict
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Computer 4 ict


Published on

Published in: Education

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Name : Rubentiraan Group Member :Cheah Zu Cheng Class : 4ICT Phishing
  • 2.
    • What is Phishing?
    • Phishing techniques
    • Damage caused by phishing.
    • Ways of anti-phishing.
    • Basic safety rules.
    • Conclusion
  • 3.  
  • 4.
    • Link Manipulation Links are internet addresses that direct one to a specific website.
    • Filter Evasion This is the use of images instead of texts.
    • Website forgery There are some phishing scams that use JavaScript commands to alter an address bar that user sign in at a bank or service of the phisher.
    • Phone Phishing This is done by using a fake caller ID data to make it appear that the call came from a trusted organization.
  • 5.
    • The phishes can run up charges on our account.
    • They can open new accounts, sign utility or loan contracts in our name.
    • They can use a false ID and commit crimes using our personal information.
    • Obtained substantial financial loss between bank and customer, for example.
    • It can destroy our life because loss of money.
    • Loss of access to e-mail.
  • 6.
    • Social responses
    • Technical responses
    • Helping to identify legitimate websites
    • Browsers alerting users to fraudulent websites
    • Augmenting password logins
    • Eliminating phishing mail
    • Monitoring and takedown
    • Use password-authenticated key agreement protocols
    • Edit Legal responses
  • 7. Keeping yourself, your family and your computer protected is essential if you want to enjoy a safe Internet experience. If you are worried about viruses, spyware or any other Internet danger and want to find out more about keeping yourself safe online and/or maintaining your computer, follow the links on this page. Chat safety Cell phones, chat rooms, instant messaging, IRC, newsgroups, bulleting boards, forums, online gaming E-mail safety Phishing, scams and fraud, spam, spoofing, viruses Personal information safety Hacking, identity theft, online shopping and auctions, spyware, Web site safety Other online safety issues Downloading music Online dating Parry's Internet safety guide for parents
  • 8.
    • When phishing treat is disseminated no one with an Inbox can be immune or protected from the attack. Corporations, financial institutions and consumers will be victimized and thus lead to lost of both time and money. Phishing attacks continue to escalate in terms of complexity, frequency and harshness.
  • 9.
    • http://