Name   : Rubentiraan Group Member :Cheah Zu Cheng Class   : 4ICT Phishing
<ul><li>What is Phishing? </li></ul><ul><li>Phishing techniques </li></ul><ul><li>Damage caused by phishing. </li></ul><ul...
 
<ul><li>Link Manipulation  Links are internet addresses that direct one to a specific website. </li></ul><ul><li>Filter Ev...
<ul><li>The phishes can run up charges on our account. </li></ul><ul><li>They can open new accounts, sign utility or loan ...
<ul><li>Social responses </li></ul><ul><li>Technical responses </li></ul><ul><li>Helping to identify legitimate websites <...
Keeping yourself, your family and your computer protected is essential if you want to enjoy a safe Internet experience. If...
<ul><li>When phishing treat is disseminated no one with an Inbox can be immune or protected from the attack. Corporations,...
<ul><li>http:// en.wikipedia.org/wiki/Phishing#Phishing_techniques   </li></ul><ul><li>http://www.waset.org/journals/ijhss...
Upcoming SlideShare
Loading in …5
×

Computer 4 ict

2,460 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,460
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
95
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Computer 4 ict

  1. 1. Name : Rubentiraan Group Member :Cheah Zu Cheng Class : 4ICT Phishing
  2. 2. <ul><li>What is Phishing? </li></ul><ul><li>Phishing techniques </li></ul><ul><li>Damage caused by phishing. </li></ul><ul><li>Ways of anti-phishing. </li></ul><ul><li>Basic safety rules. </li></ul><ul><li>Conclusion </li></ul>
  3. 4. <ul><li>Link Manipulation Links are internet addresses that direct one to a specific website. </li></ul><ul><li>Filter Evasion This is the use of images instead of texts. </li></ul><ul><li>Website forgery There are some phishing scams that use JavaScript commands to alter an address bar that user sign in at a bank or service of the phisher. </li></ul><ul><li>Phone Phishing This is done by using a fake caller ID data to make it appear that the call came from a trusted organization. </li></ul>
  4. 5. <ul><li>The phishes can run up charges on our account. </li></ul><ul><li>They can open new accounts, sign utility or loan contracts in our name. </li></ul><ul><li>They can use a false ID and commit crimes using our personal information. </li></ul><ul><li>Obtained substantial financial loss between bank and customer, for example. </li></ul><ul><li>It can destroy our life because loss of money. </li></ul><ul><li>Loss of access to e-mail. </li></ul>
  5. 6. <ul><li>Social responses </li></ul><ul><li>Technical responses </li></ul><ul><li>Helping to identify legitimate websites </li></ul><ul><li>Browsers alerting users to fraudulent websites </li></ul><ul><li>Augmenting password logins </li></ul><ul><li>Eliminating phishing mail </li></ul><ul><li>Monitoring and takedown </li></ul><ul><li>Use password-authenticated key agreement protocols </li></ul><ul><li>Edit Legal responses </li></ul>
  6. 7. Keeping yourself, your family and your computer protected is essential if you want to enjoy a safe Internet experience. If you are worried about viruses, spyware or any other Internet danger and want to find out more about keeping yourself safe online and/or maintaining your computer, follow the links on this page. Chat safety Cell phones, chat rooms, instant messaging, IRC, newsgroups, bulleting boards, forums, online gaming E-mail safety Phishing, scams and fraud, spam, spoofing, viruses Personal information safety Hacking, identity theft, online shopping and auctions, spyware, Web site safety Other online safety issues Downloading music Online dating Parry's Internet safety guide for parents
  7. 8. <ul><li>When phishing treat is disseminated no one with an Inbox can be immune or protected from the attack. Corporations, financial institutions and consumers will be victimized and thus lead to lost of both time and money. Phishing attacks continue to escalate in terms of complexity, frequency and harshness. </li></ul>
  8. 9. <ul><li>http:// en.wikipedia.org/wiki/Phishing#Phishing_techniques </li></ul><ul><li>http://www.waset.org/journals/ijhss/v2/v2-1-7.pdf </li></ul><ul><li>http://www.avira.com/en/threats/what_is_phishing.html </li></ul>

×