ICT-phishing

12,911 views

Published on

Published in: Technology, Design
3 Comments
2 Likes
Statistics
Notes
No Downloads
Views
Total views
12,911
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
345
Comments
3
Likes
2
Embeds 0
No embeds

No notes for slide

ICT-phishing

  1. 1. BY: MOHD HANAFI BIN SAMIRAN CLASS 4 WARUNA CLICK HERE FOR MORE…. Group member: 1.MOHD. HANAFI B. SAMIRAN 2.MUHAMMAD KHAIRAN SYAMIL B. ZOLKEPLY
  2. 2. <ul><li>How they Attack? </li></ul><ul><li>What is Phishing? </li></ul><ul><li>How to Detect.? </li></ul><ul><li>Examples. </li></ul><ul><li>Damage caused by phishing. </li></ul><ul><li>Conclusion. </li></ul><ul><li>Sources of references. </li></ul>CONTENT
  3. 3. What is pHisHing??? <ul><li>Phishing is defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity this is normally done through emails and an instant message. </li></ul>
  4. 4. How They ATTACK….. <ul><li>Most attacks of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.maybank.home.com/ . </li></ul><ul><li>One method of spoofing links used web addresses containing the @ symbol, which were used to include a username and password in a web URL </li></ul>
  5. 5. How TO DEteCt….. <ul><li>It is actually very noticeable. You will see misspelled URLs. One way seeing it is discovering @ in the web addresses e.g. http://www.hotmail.com@members.com. </li></ul><ul><li>Some web browsers such as Mozilla and Internet Explorer has closed this off while Opera gives a warning and an option to get off the website. In another popular method of phishing, an attacker uses a bank or other services website scripts on the victim.These types of attack known as cross-site scripting. </li></ul>
  6. 6. Example l
  7. 7. Example ll
  8. 8. Damage caused by phishing. <ul><li>The damage caused by phishing ranges from loss of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the ease with which unsuspecting people often divulge personal information to phishers, including credit card numbers , social security numbers, and mothers maiden names. </li></ul><ul><li>There are also fears that identity thieves can obtain some such information simply by accessing public records. Once they have the information they need and want, the phishers will use that person’s detail to create fake accounts using the victims name, using up a persons credit, or even prevent the victim from accessing to their own accounts </li></ul>
  9. 9. Conclusion….. <ul><li>Phishing e–mails are only a small aspect of the overall phishing economy and until now, the only aspect seen by the most people. The phishing economy is a decentralized and self–organized social network of merchants and consumers governed by laws of supply and demand. This clearer picture of the landscape, the players, and insight into phishing operations will hopefully assist in the fight against online fraud . </li></ul>
  10. 10. Source Of Information <ul><li>1.WEBSITE </li></ul><ul><li>http://www.wikipedia.org/wiki/Anti-phishing_software </li></ul><ul><li>http://www.phishtank.com/what _is_phishing.ptp?view=website </li></ul><ul><li>http://www.microsoft.com/?Phishing-Techniques&id=1818216 </li></ul><ul><li>http://www.webopedia.com/phishing.html </li></ul><ul><li>2.BOOKS. </li></ul><ul><li>PHISHING :CUTTING THE IDENTITY THEFT LINE.BY RACHEL LININGER & RUSSELL DEAN UINES . </li></ul>

×