SlideShare ist ein Scribd-Unternehmen logo
1 von 10
2
3




     Phishing is the act of fooling a computer user into submitting
        personal information by creating a counterfeit website that
        looks like a real (and trusted) site. It is a hacker technique of
        "fishing" for passwords and other secret financial info.

        Phishing (pronounced "fishing") is a type of online identity
        theft. It uses email and fraudulent websites that are designed
        to steal your personal data or information such as credit card
        numbers, passwords, account data, or other information.
4




    1.   Hacker embeds fake login
         form to the XSS vulnerable
         page. It might be on-line
         shop, internet
         banking, payment
         system, etc.

    2.   Hacker sends Email with the
         link to this transformed
         page (actually link contains     3.   User clicks the link and opens fake
         HTML injection code as a              web-page. If user enters his
         parameter). This email looks          username and password to login, all
         pretty similar to emails              of their account details will be sent to
         typically sent from this web-         hacker’s web-server.
         site to registered users (only        User may not notice anything strange
         without user name in                  because real “Home” or “Welcome”
         greeting)                             pages are what he was expecting to
                                               see.
5
6




       Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.
       Beware of links in email. If you see a link in a suspicious email message, don't click on it.
       Threats. Have you ever received a threat that your Hotmail account would be closed if you
        didn't respond to an email message? The email message shown above is an example of
        the same trick.
       Spoofing popular websites or companies. Scam artists use graphics in email that appear
        to be connected to legitimate websites but actually take you to phony scam sites or
        legitimate-looking pop-up windows.
7




       1. Use The Right Domain Name. Every time you log into your social
        media profile, make sure you’re on the correct domain name of the
        website. Some sites may have short-cut URL’s, but a good way to tell
        if a site is legitimate is if it ends in the site’s name (e.g. en-
        gb.facebook.com is the legitimate address for Facebook users in the
        UK).

       2. Change Passwords Frequently. Changing your login password
        every few months (or more often if you want to be safer) will throw
        off almost any hacker on your trail. Passwords should be as long and
        complex as possible using both numbers and letters non-
        consecutively. Avoid reusing old passwords and predictable patterns
        when changing them, like adding the current month at the end.
8




       3. Avoid Deceptive and Unfamiliar Links. Clicking deceptive and
        unfamiliar links or copying and pasting unfamiliar URL’s on your
        browser can automatically give hackers control over your
        account. If you don’t know what it is, even if it comes from a
        familiar or legitimate contact, don’t access it.

       4. Choose Apps Wisely. Third-party apps for news, games, and
        other categories first request permission to access your account,
        but may do more when you’re not around. Remove apps you
        don’t use regularly to reduce the chances of it happening.

       5. Update Your Browser. Popular online browsers, like Google
        Chrome or Internet Explorer, have built in security measures that
        enable phishing and malware protection.
9




       Phishing is identity theft. It is fraud. It
        masquerades as legitimate and
        trustworthy entities in order to obtain
        sensitive data. It then uses it to “rip
        off” the misled user with often tragic
        consequences.
       A good protection involves being
        vigilant and having decent Internet
        security software installed – like
        Norton 360. Norton 360 comes with
        many protective
        features, including identity theft
        protection. In addition to this, services
        like LifeLock add an additional security
        layer when about identity theft alone.
10




     1.   http://www.surfnetkids.com/what_is_phishing.htm

     2.   http://www.microsoft.com/en-
          gb/security/resources/phishing-whatis.aspx

     3.   http://www.sec.state.ma.us/sct/sctphish/avoid_phish
          ing_scams.pdf

     4.   http://www.betterantivirus.com/nod32-and-virus-
          news/archives/1690-Detecting-a-Phishing-or-Spear-
          Phishing-Email.html

     5.   http://internetsecurityhome.com/what-is-phishing/

Weitere ähnliche Inhalte

Mehr von Kak Yong

Module networks
Module networksModule networks
Module networks
Kak Yong
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
Kak Yong
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
Kak Yong
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
Kak Yong
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
Kak Yong
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
Kak Yong
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
Kak Yong
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
Kak Yong
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
Kak Yong
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
Kak Yong
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
Kak Yong
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
Kak Yong
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
Kak Yong
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
Kak Yong
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Kak Yong
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Kak Yong
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Kak Yong
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Kak Yong
 
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Kak Yong
 

Mehr von Kak Yong (20)

Module networks
Module networksModule networks
Module networks
 
Synopsis
SynopsisSynopsis
Synopsis
 
La5 ict-topic-5-programming
La5 ict-topic-5-programmingLa5 ict-topic-5-programming
La5 ict-topic-5-programming
 
La4 ict-topic-4-multimedia
La4 ict-topic-4-multimediaLa4 ict-topic-4-multimedia
La4 ict-topic-4-multimedia
 
La6 ict-topic-6-information-systems
La6 ict-topic-6-information-systemsLa6 ict-topic-6-information-systems
La6 ict-topic-6-information-systems
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 
La1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-societyLa1 ict-topic-1-ict-and-society
La1 ict-topic-1-ict-and-society
 
Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02Bidangpembelajaran6 2-120925005654-phpapp02
Bidangpembelajaran6 2-120925005654-phpapp02
 
Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02Bidangpembelajaran6 1-120925005634-phpapp02
Bidangpembelajaran6 1-120925005634-phpapp02
 
Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02Bidangpembelajaran5 3-120925005106-phpapp02
Bidangpembelajaran5 3-120925005106-phpapp02
 
Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02Bidangpembelajaran5 2-120925005109-phpapp02
Bidangpembelajaran5 2-120925005109-phpapp02
 
Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01Bidangpembelajaran5 1-120925005019-phpapp01
Bidangpembelajaran5 1-120925005019-phpapp01
 
Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01Bidangpembelajaran4 3-120925004752-phpapp01
Bidangpembelajaran4 3-120925004752-phpapp01
 
Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02Bidangpembelajaran4 2-120925004637-phpapp02
Bidangpembelajaran4 2-120925004637-phpapp02
 
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
Bidangpembelajaran3 3tingkatan4-120716213007-phpapp02
 
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
Bidangpembelajaran3 2tingkatan4-120716212821-phpapp01
 
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
Bidangpembelajaran3 1tingkatan4-120716212628-phpapp02
 
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
Bidangpembelajaran2 3tingkatan4-120716120706-phpapp02
 
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
Bidangpembelajaran2 2tingkatan4-120716120611-phpapp02
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Phishing

  • 1.
  • 2. 2
  • 3. 3  Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit website that looks like a real (and trusted) site. It is a hacker technique of "fishing" for passwords and other secret financial info.  Phishing (pronounced "fishing") is a type of online identity theft. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information.
  • 4. 4 1. Hacker embeds fake login form to the XSS vulnerable page. It might be on-line shop, internet banking, payment system, etc. 2. Hacker sends Email with the link to this transformed page (actually link contains 3. User clicks the link and opens fake HTML injection code as a web-page. If user enters his parameter). This email looks username and password to login, all pretty similar to emails of their account details will be sent to typically sent from this web- hacker’s web-server. site to registered users (only User may not notice anything strange without user name in because real “Home” or “Welcome” greeting) pages are what he was expecting to see.
  • 5. 5
  • 6. 6  Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.  Beware of links in email. If you see a link in a suspicious email message, don't click on it.  Threats. Have you ever received a threat that your Hotmail account would be closed if you didn't respond to an email message? The email message shown above is an example of the same trick.  Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
  • 7. 7  1. Use The Right Domain Name. Every time you log into your social media profile, make sure you’re on the correct domain name of the website. Some sites may have short-cut URL’s, but a good way to tell if a site is legitimate is if it ends in the site’s name (e.g. en- gb.facebook.com is the legitimate address for Facebook users in the UK).  2. Change Passwords Frequently. Changing your login password every few months (or more often if you want to be safer) will throw off almost any hacker on your trail. Passwords should be as long and complex as possible using both numbers and letters non- consecutively. Avoid reusing old passwords and predictable patterns when changing them, like adding the current month at the end.
  • 8. 8  3. Avoid Deceptive and Unfamiliar Links. Clicking deceptive and unfamiliar links or copying and pasting unfamiliar URL’s on your browser can automatically give hackers control over your account. If you don’t know what it is, even if it comes from a familiar or legitimate contact, don’t access it.  4. Choose Apps Wisely. Third-party apps for news, games, and other categories first request permission to access your account, but may do more when you’re not around. Remove apps you don’t use regularly to reduce the chances of it happening.  5. Update Your Browser. Popular online browsers, like Google Chrome or Internet Explorer, have built in security measures that enable phishing and malware protection.
  • 9. 9  Phishing is identity theft. It is fraud. It masquerades as legitimate and trustworthy entities in order to obtain sensitive data. It then uses it to “rip off” the misled user with often tragic consequences.  A good protection involves being vigilant and having decent Internet security software installed – like Norton 360. Norton 360 comes with many protective features, including identity theft protection. In addition to this, services like LifeLock add an additional security layer when about identity theft alone.
  • 10. 10 1. http://www.surfnetkids.com/what_is_phishing.htm 2. http://www.microsoft.com/en- gb/security/resources/phishing-whatis.aspx 3. http://www.sec.state.ma.us/sct/sctphish/avoid_phish ing_scams.pdf 4. http://www.betterantivirus.com/nod32-and-virus- news/archives/1690-Detecting-a-Phishing-or-Spear- Phishing-Email.html 5. http://internetsecurityhome.com/what-is-phishing/