Tittl e

481 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
481
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Tittl e

  1. 1. TittlE : PhishinG Group name:Shom wei yong(captain) Yun youliang Kavi Toh jun hou
  2. 2. Contents !!* How they Attack ??* What Is Phishing ??* How To Detect ??* Example* Damage Caused By Phishing.* Conclusion.*Sources Of References.
  3. 3. What Is Phishing* Phishing is defines as thefraudulent acquisition of personalinformation by tricking anindividual into believing theattacker is a trustworty entity thisis normally done throught emailand an instant message.
  4. 4. How they attack…•Most attacks of phishing use some form oftechnical deception designed to make a linkin an email appear to belong to the spoofedorganization . Misspelled URLs or the use ofsubdomains are common trick used byphishers,hhttp://www.maybank.home.com/* One method of spoofing links used webaddresses containing the @ symbol, whichwere used include username and passwordin a web URL
  5. 5. How To DETecT* Is is actually very noticeable. You will see misspelledURLs .One way seeing discovering @ in the web adressese.g.http:/www.hotmail.com@members.com* Some web browers such as Mozilla and internetExplorer has closed this off while Opera gives a warningand an optain to get off the website. In another popularmethod of phishing, an attacker uses a bank or otherservices website scripts on the victim. These types ofatack known as crosssite scripting.
  6. 6. DAMAGE CAUSED BY pHISHING•The damage caused by phishing ranges fromloss of access to email to substantailfinancial loss. This style of identity thefy isbecoming more popular,because of the easewith which unsuspecting people oftendivulge personal information tophishers,including credit card number,sosialsecurity number anf miothers maiden names.*There are also fears that identify theivescan obtain some such information they needand want the phishers will use that person’sdetail to create fake account using thevictims name, using up a persons credit oreven the victim from accesssing their ownacounts.
  7. 7. Conclusion !!* Phishing e-mails are only a small aspet of theoverall phishing economy and until now, the onlyaspet seen by the most people. The phishingeconomy is a decentralized and self-organizedsosial network of merchants and consumersgoverned by laws of supply and demand. Thisclearer picture of the landscape, the players, andinsight into phishing operations will hopefully assistin the fight against online fraud.
  8. 8. Sources and reference*www.google.com*www.wikipedia.com*http:/www.hotmail.com@members.com*hhttp://www.maybank.home.com/

×