SlideShare a Scribd company logo
Spoofing
Ivan Bermudez – María Barros – Geraldy Hidalgo –
Felipe Reyes
What is spoofing ?
 Spoofing is a malicius practice performed by cybernetic thiefs who want
personal information like banking credentials, passwords, money.
 The purpose is to falsificate too many information that this people want for
the cybernauts to got their objetive
Clasification
 The spoofing is clasificated in:
 Suplantation of IP
 Suplantation of ARP
 Suplantation of DNS
 Suplantation of WEB
 Suplantation of E-Mail
 Suplantation of GPS
Places where you can find spoofing
 Porn sites
 Game shops
 Bank pages
 Ads
Conclusion
Rules to be safe on internet
 1- Dont show your passwords to anyone
 2- Dont answer unknow link in your email or facebook
 3- Make schedule to use and play on internet
 4- Keep your computer updated and download a great anti virus
 5- Dont post personal information in the social networks
 6- Dont chat with people that you dont know
 7- Dont send nudes
 8- Be nice in chat
 9- Dont buy things on unknow pages
 10- More control from the parents on the childs

More Related Content

What's hot

My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
Phishing
PhishingPhishing
Phishing
jennifer123mora
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
Marian Merritt
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
Phantom Encrypt
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
Jayna Mistry
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
Mukarram Dhorajiwala
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
hellishyard9256
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
RobbiePaterson2
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
PhishingBox
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
Instant Checkmate
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing

What's hot (14)

My protection plan
My protection planMy protection plan
My protection plan
 
Phishing
PhishingPhishing
Phishing
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
Encrypted mobile communications
Encrypted mobile communicationsEncrypted mobile communications
Encrypted mobile communications
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Users guide
Users guideUsers guide
Users guide
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 

Similar to Spoofing

Spoofing
SpoofingSpoofing
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in managementlily004
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 
Phishing
PhishingPhishing
Phishing
guicelacatalina
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
Stephen Cobb
 
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
Acuant
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
HeideYlanan1
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting Hacked
Jakub Kałużny
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Mayank Garg
 

Similar to Spoofing (20)

Spoofing
SpoofingSpoofing
Spoofing
 
Phishing
PhishingPhishing
Phishing
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
workers participation in management
workers participation in managementworkers participation in management
workers participation in management
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting Hacked
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

Spoofing

  • 1. Spoofing Ivan Bermudez – María Barros – Geraldy Hidalgo – Felipe Reyes
  • 2. What is spoofing ?  Spoofing is a malicius practice performed by cybernetic thiefs who want personal information like banking credentials, passwords, money.  The purpose is to falsificate too many information that this people want for the cybernauts to got their objetive
  • 3. Clasification  The spoofing is clasificated in:  Suplantation of IP  Suplantation of ARP  Suplantation of DNS  Suplantation of WEB  Suplantation of E-Mail  Suplantation of GPS
  • 4. Places where you can find spoofing  Porn sites  Game shops  Bank pages  Ads
  • 6. Rules to be safe on internet  1- Dont show your passwords to anyone  2- Dont answer unknow link in your email or facebook  3- Make schedule to use and play on internet  4- Keep your computer updated and download a great anti virus  5- Dont post personal information in the social networks  6- Dont chat with people that you dont know  7- Dont send nudes  8- Be nice in chat  9- Dont buy things on unknow pages  10- More control from the parents on the childs