Name   : Rubentiraan Group Member :Cheah Zu Cheng Class   : 4ICT Phishing
What is Phishing? Phishing techniques Damage caused by phishing. Ways of anti-phishing. Basic safety rules. Conclusion
 
Link Manipulation  Links are internet addresses that direct one to a specific website. Filter Evasion  This is the use of images instead of texts. Website forgery  There are some phishing scams that use JavaScript commands to alter an address bar that  user  sign in at a bank or service of the phisher.  Phone Phishing  This is done by using a fake caller ID data to make it appear that the call came from a trusted organization.
The phishes can run up charges on our account. They can open new accounts, sign utility or loan contracts  in our name. They can use a false ID and commit crimes using our personal information. Obtained substantial financial loss between bank and customer, for example. It can destroy our life because loss of money. Loss of access to e-mail.
Social responses Technical responses Helping to identify legitimate websites Browsers alerting users to fraudulent websites Augmenting password logins Eliminating phishing mail Monitoring and takedown Use password-authenticated key agreement protocols Edit Legal responses
Keeping yourself, your family and your computer protected is essential if you want to enjoy a safe Internet experience. If you are worried about viruses, spyware or any other Internet danger and want to find out more about keeping yourself safe online and/or maintaining your computer, follow the links on this page. Chat safety Cell phones, chat rooms, instant messaging, IRC, newsgroups, bulleting boards, forums, online gaming  E-mail safety Phishing, scams and fraud, spam, spoofing, viruses  Personal information safety Hacking, identity theft, online shopping and auctions, spyware, Web site safety  Other online safety issues Downloading music   Online dating   Parry's Internet safety guide for parents
When phishing treat is disseminated no one with an Inbox can be immune or protected from the attack. Corporations, financial institutions and consumers will be victimized and thus lead to lost of both time and money. Phishing attacks continue to escalate in terms of complexity, frequency and harshness.
http:// en.wikipedia.org/wiki/Phishing#Phishing_techniques   http://www.waset.org/journals/ijhss/v2/v2-1-7.pdf   http://www.avira.com/en/threats/what_is_phishing.html

Computer 4 ict

  • 1.
    Name : Rubentiraan Group Member :Cheah Zu Cheng Class : 4ICT Phishing
  • 2.
    What is Phishing?Phishing techniques Damage caused by phishing. Ways of anti-phishing. Basic safety rules. Conclusion
  • 3.
  • 4.
    Link Manipulation Links are internet addresses that direct one to a specific website. Filter Evasion This is the use of images instead of texts. Website forgery There are some phishing scams that use JavaScript commands to alter an address bar that user sign in at a bank or service of the phisher. Phone Phishing This is done by using a fake caller ID data to make it appear that the call came from a trusted organization.
  • 5.
    The phishes canrun up charges on our account. They can open new accounts, sign utility or loan contracts in our name. They can use a false ID and commit crimes using our personal information. Obtained substantial financial loss between bank and customer, for example. It can destroy our life because loss of money. Loss of access to e-mail.
  • 6.
    Social responses Technicalresponses Helping to identify legitimate websites Browsers alerting users to fraudulent websites Augmenting password logins Eliminating phishing mail Monitoring and takedown Use password-authenticated key agreement protocols Edit Legal responses
  • 7.
    Keeping yourself, yourfamily and your computer protected is essential if you want to enjoy a safe Internet experience. If you are worried about viruses, spyware or any other Internet danger and want to find out more about keeping yourself safe online and/or maintaining your computer, follow the links on this page. Chat safety Cell phones, chat rooms, instant messaging, IRC, newsgroups, bulleting boards, forums, online gaming E-mail safety Phishing, scams and fraud, spam, spoofing, viruses Personal information safety Hacking, identity theft, online shopping and auctions, spyware, Web site safety Other online safety issues Downloading music Online dating Parry's Internet safety guide for parents
  • 8.
    When phishing treatis disseminated no one with an Inbox can be immune or protected from the attack. Corporations, financial institutions and consumers will be victimized and thus lead to lost of both time and money. Phishing attacks continue to escalate in terms of complexity, frequency and harshness.
  • 9.
    http:// en.wikipedia.org/wiki/Phishing#Phishing_techniques http://www.waset.org/journals/ijhss/v2/v2-1-7.pdf http://www.avira.com/en/threats/what_is_phishing.html