SlideShare a Scribd company logo
NETWORK SECURITY MALIT 216: Information Networks and Resource Sharing May 17, 2010
I. Goals of Security ,[object Object],[object Object],[object Object]
Therefore, public access computer security must at least ensure: ,[object Object],[object Object],[object Object],[object Object]
II. Planning for Security ,[object Object],[object Object],[object Object]
II. Planning for Security...  Con’t 1/3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II. Planning for Security...  Con’t 1/3 ,[object Object],[object Object],[object Object],[object Object]
I. Goals of Security ,[object Object]
[object Object]
[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object]
What is SPAM ? Title : SPAM AND PHISHING SCAMS WXGB6310  Management of Internet Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SPAM PHISHING SCAMS WEBLIOGRAPHIES
WXGB6310  Management of Internet Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SPAM PHISHING SCAMS WEBLIOGRAPHIES What is SPAM ? Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES What is it BAD? ,[object Object],[object Object],Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES 3.  The theft of resources . An increasing number of  spammers, such as Quantum Communications, send  most or all of their mail via innocent intermediate  systems, to avoid blocks that many systems have  placed against mail coming directly from the  spammers' systems.  4.  It's all garbage . The spam messages I've seen have  almost without exception advertised stuff that's  worthless, deceptive, and partly or entirely fraudulent.  What is it BAD? Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES How to AVOID? 1.  Disguise e-mail addresses posted in a public  electronic place.  2.  Use multiple e-mail addresses. 3.  Use a filter. -  Read carefully when filling out online  forms requesting your e-mail address, and exercise  your choice. 4.  Short e-mail addresses are easy to guess, and may  receive more spam.  Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES What is PHISHING SCAMS? - The term "phishing" – as in fishing for  confidential  information  - refers to a scam that encompasses  fraudulently obtaining and using an individual's  personal or financial information.  - Phishing scams are just another attempt  to get  valuable information . Scammers send a mass email to  every address they can find. Typically the message will  appear to come from a bank or financial institution. The  email states that you should update your information  for one reason or another, and they usually provide a  link that you can click to do so.  Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES How PHISHING SCAMS works? 1.  A consumer receives an e-mail which appears to  originate from a financial institution, government  agency, or other well-known/reputable entity.  2.  The message describes an urgent reason you must  "verify" or "re-submit" personal or confidential  information by clicking on a link embedded in the  message.  3.  The provided link appears to be the Web site of the  financial institution, government agency or other  well-known/reputable entity, but in "phishing" scams,  the Web site belongs to the fraudster/scammer.  Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES ,[object Object],[object Object],How PHISHING SCAMS works? Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Example Of Phishing Scams Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Example Of Phishing Scams Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Example Of Phishing Scams Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Things You Do to protect Yourself from Phishing Attacts? Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES 5.  Avoid filling out forms in email messages asking for  personal financial information.  6.  Avoid spoofed sites by typing the URL directly into  your browser's address bar yourself.  7.  When prompted for a password, give an incorrect  one first. A phishing site will accept it; a legitimate  one won't.  Things You Do to protect Yourself from Phishing Attacts? Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Differences Between PHISHING and SPAM Messages Given phishing email is unsolicited, it is a form of spam. However, the differences between old-style spam and phishing email are critical.  Old-style spammed email is often authentic, albeit a nuisance, promoting a real product or service, while phishing email messages are based on fraud and deceit.  While spammers often seek attention through the use of their messages, phishers avoid attention, masquerading as a trusted source in order to get you to divulge information they can use for their own malicious purposes.  Title : SPAM AND PHISHING SCAMS
WXGB6310  Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Phishing Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Spam Title : SPAM AND PHISHING SCAMS

More Related Content

What's hot

Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
mfaheemakhtar
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Cyber crime
Cyber crimeCyber crime
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Cyber security
Cyber securityCyber security
Cyber security
Debaroy1995
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Moumita Chatterjee
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 

What's hot (20)

Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Internet security
Internet securityInternet security
Internet security
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet security
Internet securityInternet security
Internet security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

Similar to internet security

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
Phishing
PhishingPhishing
Phishing
shivli0769
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
MahdiRahmani15
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
Neeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
MariGogokhia
 
Cyber Security Guide
Cyber Security GuideCyber Security Guide
Cyber Security Guide
Chris Roche
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
Sarim Khawaja
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 

Similar to internet security (20)

TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Phishing
PhishingPhishing
Phishing
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Cyber Security Guide
Cyber Security GuideCyber Security Guide
Cyber Security Guide
 
Phishing attack types and mitigation strategies
Phishing attack types and mitigation strategiesPhishing attack types and mitigation strategies
Phishing attack types and mitigation strategies
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Phishing
PhishingPhishing
Phishing
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 

More from Cheryl Tanicala-Roldan

Research publishing and Cariana Collaboration Renewal-program
Research publishing and Cariana Collaboration Renewal-programResearch publishing and Cariana Collaboration Renewal-program
Research publishing and Cariana Collaboration Renewal-programCheryl Tanicala-Roldan
 
greenstone-bbla seminar july 2010-cheyrl
greenstone-bbla seminar july 2010-cheyrlgreenstone-bbla seminar july 2010-cheyrl
greenstone-bbla seminar july 2010-cheyrl
Cheryl Tanicala-Roldan
 
Photoshop in marketing
Photoshop in marketingPhotoshop in marketing
Photoshop in marketing
Cheryl Tanicala-Roldan
 
Web 2.0/Library20
Web 2.0/Library20Web 2.0/Library20
Web 2.0/Library20
Cheryl Tanicala-Roldan
 
Lecture may 11-searching techniques
Lecture may 11-searching techniquesLecture may 11-searching techniques
Lecture may 11-searching techniques
Cheryl Tanicala-Roldan
 

More from Cheryl Tanicala-Roldan (7)

Plai carlc ched-memo2014
Plai carlc ched-memo2014Plai carlc ched-memo2014
Plai carlc ched-memo2014
 
Research publishing and Cariana Collaboration Renewal-program
Research publishing and Cariana Collaboration Renewal-programResearch publishing and Cariana Collaboration Renewal-program
Research publishing and Cariana Collaboration Renewal-program
 
greenstone-bbla seminar july 2010-cheyrl
greenstone-bbla seminar july 2010-cheyrlgreenstone-bbla seminar july 2010-cheyrl
greenstone-bbla seminar july 2010-cheyrl
 
Photoshop in marketing
Photoshop in marketingPhotoshop in marketing
Photoshop in marketing
 
user centeredness_info systems
user centeredness_info systemsuser centeredness_info systems
user centeredness_info systems
 
Web 2.0/Library20
Web 2.0/Library20Web 2.0/Library20
Web 2.0/Library20
 
Lecture may 11-searching techniques
Lecture may 11-searching techniquesLecture may 11-searching techniques
Lecture may 11-searching techniques
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

internet security

  • 1. NETWORK SECURITY MALIT 216: Information Networks and Resource Sharing May 17, 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES 3. The theft of resources . An increasing number of spammers, such as Quantum Communications, send most or all of their mail via innocent intermediate systems, to avoid blocks that many systems have placed against mail coming directly from the spammers' systems. 4. It's all garbage . The spam messages I've seen have almost without exception advertised stuff that's worthless, deceptive, and partly or entirely fraudulent. What is it BAD? Title : SPAM AND PHISHING SCAMS
  • 16. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES How to AVOID? 1. Disguise e-mail addresses posted in a public electronic place. 2. Use multiple e-mail addresses. 3. Use a filter. - Read carefully when filling out online forms requesting your e-mail address, and exercise your choice. 4. Short e-mail addresses are easy to guess, and may receive more spam. Title : SPAM AND PHISHING SCAMS
  • 17. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES What is PHISHING SCAMS? - The term "phishing" – as in fishing for confidential information - refers to a scam that encompasses fraudulently obtaining and using an individual's personal or financial information. - Phishing scams are just another attempt to get valuable information . Scammers send a mass email to every address they can find. Typically the message will appear to come from a bank or financial institution. The email states that you should update your information for one reason or another, and they usually provide a link that you can click to do so. Title : SPAM AND PHISHING SCAMS
  • 18. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES How PHISHING SCAMS works? 1. A consumer receives an e-mail which appears to originate from a financial institution, government agency, or other well-known/reputable entity. 2. The message describes an urgent reason you must "verify" or "re-submit" personal or confidential information by clicking on a link embedded in the message. 3. The provided link appears to be the Web site of the financial institution, government agency or other well-known/reputable entity, but in "phishing" scams, the Web site belongs to the fraudster/scammer. Title : SPAM AND PHISHING SCAMS
  • 19.
  • 20. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Example Of Phishing Scams Title : SPAM AND PHISHING SCAMS
  • 21. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Example Of Phishing Scams Title : SPAM AND PHISHING SCAMS
  • 22. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Example Of Phishing Scams Title : SPAM AND PHISHING SCAMS
  • 23.
  • 24. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES 5. Avoid filling out forms in email messages asking for personal financial information. 6. Avoid spoofed sites by typing the URL directly into your browser's address bar yourself. 7. When prompted for a password, give an incorrect one first. A phishing site will accept it; a legitimate one won't. Things You Do to protect Yourself from Phishing Attacts? Title : SPAM AND PHISHING SCAMS
  • 25. WXGB6310 Management of Internet Resources SPAM PHISHING SCAMS WEBLIOGRAPHIES Differences Between PHISHING and SPAM Messages Given phishing email is unsolicited, it is a form of spam. However, the differences between old-style spam and phishing email are critical. Old-style spammed email is often authentic, albeit a nuisance, promoting a real product or service, while phishing email messages are based on fraud and deceit. While spammers often seek attention through the use of their messages, phishers avoid attention, masquerading as a trusted source in order to get you to divulge information they can use for their own malicious purposes. Title : SPAM AND PHISHING SCAMS
  • 26.