SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
What is Cybercrime? 	“Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . 	From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words  “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
Phishing Map
Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 :  Basil Y. Alothman 083153 :  SudadMuamarmuammar 071190 :  Mohammed SiddiqAlRais 061028 :  Khalid Abdulla alqaraibanalmuhairi 071002 :  Akram M. EleyanAkram 071337 :  Fatma Mohamed Bin Ghubash Al ma 061393 :  FatmaJassimAlbastaki 044011 :  Mohammed I. FarhoodAlboreesha 041036 :  ZiadAdnanAbdo
Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form .  Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name.  Good Luck & Regards,  Dr. Mathew Nicho 
How people get protected ?
Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
Never Trust TinyURL.com links !!
Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security  locker SSL Only shop with vendors you trust to  avoid to be an victim .
Use Internet VISA CARD.
References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL  Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman
Thanks You.. 

Weitere ähnliche Inhalte

Was ist angesagt?

Phishing
PhishingPhishing
Phishing
Syahida
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
Dawn Hicks
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 

Was ist angesagt? (20)

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phising
PhisingPhising
Phising
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Andere mochten auch

LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox
BlueHornet
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1
BlueHornet
 

Andere mochten auch (16)

BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
 
LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1
 
Implementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideImplementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical Guide
 
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
 
Use Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueUse Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive Revenue
 
Preventing the "Oops!" Email
Preventing the "Oops!" EmailPreventing the "Oops!" Email
Preventing the "Oops!" Email
 
BlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMA
 
Using Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessUsing Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing Effectiveness
 
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
 
Social media, technology and advocacy
Social media, technology and advocacySocial media, technology and advocacy
Social media, technology and advocacy
 
Presentacio desafio stem
Presentacio desafio stemPresentacio desafio stem
Presentacio desafio stem
 
Ransart Boot
Ransart  BootRansart  Boot
Ransart Boot
 
Cookston Portfolio
Cookston PortfolioCookston Portfolio
Cookston Portfolio
 
Five Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseFive Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy Database
 
Solucion examen termodinamica
Solucion examen termodinamicaSolucion examen termodinamica
Solucion examen termodinamica
 

Ähnlich wie Phishing

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
esksaints
 

Ähnlich wie Phishing (20)

cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
123.pptx
123.pptx123.pptx
123.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh
 
Facebook
FacebookFacebook
Facebook
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Phishing

  • 1. Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
  • 2. What is Cybercrime? “Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
  • 3. What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
  • 4. What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
  • 6. Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
  • 7.
  • 8.
  • 9.
  • 10. Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 : Basil Y. Alothman 083153 : SudadMuamarmuammar 071190 : Mohammed SiddiqAlRais 061028 : Khalid Abdulla alqaraibanalmuhairi 071002 : Akram M. EleyanAkram 071337 : Fatma Mohamed Bin Ghubash Al ma 061393 : FatmaJassimAlbastaki 044011 : Mohammed I. FarhoodAlboreesha 041036 : ZiadAdnanAbdo
  • 11. Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form . Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name. Good Luck & Regards, Dr. Mathew Nicho 
  • 12.
  • 13. How people get protected ?
  • 14. Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
  • 16. Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security locker SSL Only shop with vendors you trust to avoid to be an victim .
  • 18. References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman

Hinweis der Redaktion

  1. Those Listing of my gathering information from university of Dubai class I gather this information from website as I know that from the website the E-mail must start with: s00000@ud.ac.ae