PHISHING Presented by: Alya =) 4 server ‘07
INTRODUCTION <ul><li>What is “Phishing”??? </li></ul><ul><li>»  Technique for acquiring your personal information and subs...
<ul><li>How does it occur??? </li></ul><ul><li>» Conducted by email. </li></ul><ul><li>» Receive an authentic-looking emai...
<ul><li>Who perpetrates it??? </li></ul><ul><li>» Phishers are scam artists. </li></ul><ul><li>» Send millions of emails, ...
HOW CAN I RECOGNIZE  A PHISHING EMAIL?
HOW CAN I MINIMIZE THE POSSIBILITY OF  BEING CAUGHT BY A PHISHING SCAM? <ul><li>•  Be on guard </li></ul><ul><li>•  Don't ...
WHAT SHOULD I DO IF I THINK I'VE  RECEIVED A PHISHING EMAIL?
WHY SHOULD I PROTECT  AGAINST PHISHING? <ul><li>*Phishing attacks usually target:  </li></ul><ul><li>- Bank information – ...
WHAT SHOULD I DO IF  I'VE BEEN CAUGHT?
CONCLUSION <ul><li>•  Disturbing signs of evolving. </li></ul><ul><li>•  Attacks becoming savvier & attackers beginning to...
REFERENCES <ul><li>Date of searching the information on the internet; </li></ul><ul><li>-09 MAY 2007- </li></ul><ul><li>-2...
 
Upcoming SlideShare
Loading in …5
×

Ict Phishing (Present)

16,018 views

Published on

Published in: Technology
6 Comments
9 Likes
Statistics
Notes
  • thanks for this useful information. tengah siapkan assignment. buat reference ye :)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • how to download ?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • free free download this latest version 100% working.
    download link- http://gg.gg/hqcf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • tiru ea.. membe nk.. ^_^
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • macam mana nak copy and paste ?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
16,018
On SlideShare
0
From Embeds
0
Number of Embeds
67
Actions
Shares
0
Downloads
541
Comments
6
Likes
9
Embeds 0
No embeds

No notes for slide

Ict Phishing (Present)

  1. 1. PHISHING Presented by: Alya =) 4 server ‘07
  2. 2. INTRODUCTION <ul><li>What is “Phishing”??? </li></ul><ul><li>» Technique for acquiring your personal information and subsequently committing fraud in your name. </li></ul><ul><li>» Include stealing your identity or emptying your checking and savings accounts. </li></ul><ul><li>» A form of cyber-crime that's growing faster than the ability of the police or courts to deal with it. </li></ul><ul><li>» Simply a play on the word &quot;fishing&quot; — scammers drop email lures into the sea of Internet users, hoping to hook your personal information. </li></ul><ul><li>» More dangerous variation called “spear phishing” </li></ul><ul><li>» More insidious than regular phishing. </li></ul><ul><li>» Assume that your sensitive information has been captured or is at risk. </li></ul><ul><li>» Until you’ve installed and run an anti-spyware program, do not log in to any of your financial accounts. </li></ul><ul><li>» Crimeware will record your password and account information and transmit it to the crooks, who then sell it to the highest bidder. </li></ul>
  3. 3. <ul><li>How does it occur??? </li></ul><ul><li>» Conducted by email. </li></ul><ul><li>» Receive an authentic-looking email message that appears to come from a legitimate business. </li></ul><ul><li>» Ask you to divulge or verify personal data such as an account number, password, credit card number or Social Security number. </li></ul><ul><li>» Possible for you to be phished by mail, telephone or even in person. </li></ul><ul><li>» Through the use of Instant Messaging (IM), which can also be used for identity theft as well as spreading viruses and spyware. </li></ul>INTRODUCTION
  4. 4. <ul><li>Who perpetrates it??? </li></ul><ul><li>» Phishers are scam artists. </li></ul><ul><li>» Send millions of emails, realizing that even few recipients give them identifying information. </li></ul><ul><li>» Purchase software specifically designed to help set up and manage a phishing scam site. </li></ul><ul><li>Who is affected by phishing? </li></ul><ul><li>» Popular targets are users of online banking services and auction sites. </li></ul><ul><li>» Email address has been made public anywhere on the Internet then you are more susceptible to phishing. </li></ul><ul><li>» Scammers can use spidering or Web-crawling programs to search the Internet and collect millions of email addresses. </li></ul>INTRODUCTION
  5. 5. HOW CAN I RECOGNIZE A PHISHING EMAIL?
  6. 6. HOW CAN I MINIMIZE THE POSSIBILITY OF BEING CAUGHT BY A PHISHING SCAM? <ul><li>• Be on guard </li></ul><ul><li>• Don't fill out a form on a Web site unless you know it is secure. </li></ul><ul><li>• Regularly check your bank, credit and debit card statements (paper and online). </li></ul><ul><li>• Ensure that your browser is up to date. </li></ul><ul><li>• Install and maintain antivirus and anti-spyware software </li></ul><ul><li>• Consider installing a phish-blocking toolbar on your Web browser. </li></ul><ul><li>• Stay informed. </li></ul>
  7. 7. WHAT SHOULD I DO IF I THINK I'VE RECEIVED A PHISHING EMAIL?
  8. 8. WHY SHOULD I PROTECT AGAINST PHISHING? <ul><li>*Phishing attacks usually target: </li></ul><ul><li>- Bank information – such as VISA and PayPal accounts. </li></ul><ul><li>- Username and password information. </li></ul><ul><li>- Social Security numbers. </li></ul><ul><li>- Mother maiden’s name can be used to retrieve forgotten or lost credentials. </li></ul><ul><li>*The above information allows scammers to: </li></ul><ul><li>- Make fraudulent charges on your credit or debit card. </li></ul><ul><li>- Make use of your credentials on different online services to commit crime without being caught. </li></ul>
  9. 9. WHAT SHOULD I DO IF I'VE BEEN CAUGHT?
  10. 10. CONCLUSION <ul><li>• Disturbing signs of evolving. </li></ul><ul><li>• Attacks becoming savvier & attackers beginning to share code and techniques with virus writers called crackers. </li></ul><ul><li>• Slow down unless service providers adequately address consumer security concerns in the form of strong authentication. </li></ul><ul><li>• Time to educate their users on how to spot a phishing attack. </li></ul><ul><li>• Email requests for passwords, credit card numbers, and other private data are never legitimate. </li></ul>
  11. 11. REFERENCES <ul><li>Date of searching the information on the internet; </li></ul><ul><li>-09 MAY 2007- </li></ul><ul><li>-20 JUNE 2007- </li></ul><ul><li>Web; </li></ul><ul><li>http://www.ncsu.edu/it/essentials/antivirus_security/phishing/intro.html </li></ul><ul><li>http://www.ncsu.edu/it/essentials/antivirus_security/phishing/recognize.html </li></ul><ul><li>http://www.ncsu.edu/it/essentials/antivirus_security/phishing/receive.html </li></ul><ul><li>http://www.ncsu.edu/it/essentials/antivirus_security/phishing/avoid.html </li></ul><ul><li>http://www.ncsu.edu/it/essentials/antivirus_security/phishing/whatdo.html </li></ul>

×