SlideShare a Scribd company logo
PHISHING Presented by: Alya =) 4 server ‘07
INTRODUCTION What is “Phishing”??? »  Technique for acquiring your personal information and subsequently committing fraud in your name. »  Include  stealing your identity  or emptying your checking and savings accounts. »  A form of cyber-crime that's growing faster than the ability of the police or courts to deal with it. »  Simply a play on the word "fishing" — scammers drop email lures into the sea of Internet users, hoping to hook your personal information.  »  More dangerous variation called “spear phishing” »  More insidious than regular phishing. »  Assume that your sensitive information has been captured or is at risk.  »  Until you’ve installed and run an anti-spyware program, do not log in to any of your financial accounts.  »  Crimeware will record your password and account information and transmit it to the crooks, who then sell it to the highest bidder.
How does it occur??? » Conducted by email. » Receive an authentic-looking email message that appears to come from a legitimate business. » Ask you to divulge or verify personal data such as an account number, password, credit card number or Social Security number. » Possible for you to be phished by mail, telephone or even in person. » Through the use of Instant Messaging (IM), which can also be used for identity theft as well as spreading viruses and spyware.  INTRODUCTION
Who perpetrates it??? » Phishers are scam artists. » Send millions of emails, realizing that even few recipients give them identifying information. » Purchase software specifically designed to help set up and manage a phishing scam site. Who is affected by phishing? » Popular targets are users of online banking services and auction sites. » Email address has been made public anywhere on the Internet then you are more susceptible to phishing. » Scammers can use spidering or Web-crawling programs to search the Internet and collect millions of email addresses.  INTRODUCTION
HOW CAN I RECOGNIZE  A PHISHING EMAIL?
HOW CAN I MINIMIZE THE POSSIBILITY OF  BEING CAUGHT BY A PHISHING SCAM? •  Be on guard •  Don't fill out a form on a Web site unless you know it is secure. •  Regularly check your bank, credit and debit card statements (paper and online). •  Ensure that your browser is up to date. •  Install and maintain antivirus and anti-spyware software •  Consider installing a phish-blocking toolbar on your Web browser. •  Stay informed.
WHAT SHOULD I DO IF I THINK I'VE  RECEIVED A PHISHING EMAIL?
WHY SHOULD I PROTECT  AGAINST PHISHING? *Phishing attacks usually target:  - Bank information – such as VISA and PayPal accounts.  - Username and password information.  - Social Security numbers.  - Mother maiden’s name can be used to retrieve forgotten or lost credentials.  *The above information allows scammers to:  - Make fraudulent charges on your credit or debit card.  - Make use of your credentials on different online services to commit crime without being caught.
WHAT SHOULD I DO IF  I'VE BEEN CAUGHT?
CONCLUSION •  Disturbing signs of evolving. •  Attacks becoming savvier & attackers beginning to share code and techniques with virus writers called crackers. •  Slow down unless service providers adequately address consumer security concerns in the form of strong authentication. •  Time to educate their users on how to spot a phishing attack. •  Email requests for passwords, credit card numbers, and other private data are never legitimate.
REFERENCES Date of searching the information on the internet; -09 MAY 2007- -20 JUNE 2007- Web; http://www.ncsu.edu/it/essentials/antivirus_security/phishing/intro.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/recognize.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/receive.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/avoid.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/whatdo.html
 

More Related Content

PPT
Phishing
PPT
P H I S H I N G
PPT
ICT-phishing
PPTX
Phishing
PPT
Strategies to handle Phishing attacks
PPTX
Phishing
PPTX
PPTX
Anti phishing
Phishing
P H I S H I N G
ICT-phishing
Phishing
Strategies to handle Phishing attacks
Phishing
Anti phishing

What's hot (20)

PPT
Phishing
PPT
Phishing
PPT
Phishing
PDF
Phishing exposed
PPT
Intro phishing
PPT
Phishing attacks ppt
PPTX
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
PPTX
Phishing Attack : A big Threat
PPT
Phishing
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPTX
Phishing scams in banking ppt
PPT
Phishing: Swiming with the sharks
PPTX
Phishing
PPTX
Phishing techniques
PPTX
Phishing
PDF
Phishing
PPT
PPTX
Phishing--The Entire Story of a Dark World
PPTX
Phishing attack
PPTX
Phising a Threat to Network Security
Phishing
Phishing
Phishing
Phishing exposed
Intro phishing
Phishing attacks ppt
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing Attack : A big Threat
Phishing
Phishing attack, with SSL Encryption and HTTPS Working
Phishing scams in banking ppt
Phishing: Swiming with the sharks
Phishing
Phishing techniques
Phishing
Phishing
Phishing--The Entire Story of a Dark World
Phishing attack
Phising a Threat to Network Security
Ad

Similar to Ict Phishing (Present) (20)

PPTX
Phishing technology
PPTX
Phishing technology
PPTX
Phishing technology
PPT
P H I S H I N G
PPTX
PHISHING PROJECT REPORT
PDF
Phishing is a type of cyber attack that involves tricking individuals.pdf
PPTX
Phishing
PDF
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
PDF
Phishing.pdf
PPTX
IS Presetation.pptx
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPT
Recognize Phishing Scams and Fraudulent E-mails
PPT
Phishing
PPTX
Phishing technology
PDF
Study on Phishing Attacks and Antiphishing Tools
PPTX
Phishing attack till now
PPTX
Phishing Technology
Phishing technology
Phishing technology
Phishing technology
P H I S H I N G
PHISHING PROJECT REPORT
Phishing is a type of cyber attack that involves tricking individuals.pdf
Phishing
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
Phishing.pdf
IS Presetation.pptx
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Recognize Phishing Scams and Fraudulent E-mails
Phishing
Phishing technology
Study on Phishing Attacks and Antiphishing Tools
Phishing attack till now
Phishing Technology
Ad

More from aleeya91 (6)

PPT
~History Of Malaysia~
PPT
How To Use Anti Spyware
PPT
Ict - Motherboard
PPT
Ict - Computer Security
PPT
Ict - Programming
PPT
Ict - Computer Ethics
~History Of Malaysia~
How To Use Anti Spyware
Ict - Motherboard
Ict - Computer Security
Ict - Programming
Ict - Computer Ethics

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Electronic commerce courselecture one. Pdf
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Chapter 3 Spatial Domain Image Processing.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity

Ict Phishing (Present)

  • 1. PHISHING Presented by: Alya =) 4 server ‘07
  • 2. INTRODUCTION What is “Phishing”??? » Technique for acquiring your personal information and subsequently committing fraud in your name. » Include stealing your identity or emptying your checking and savings accounts. » A form of cyber-crime that's growing faster than the ability of the police or courts to deal with it. » Simply a play on the word "fishing" — scammers drop email lures into the sea of Internet users, hoping to hook your personal information. » More dangerous variation called “spear phishing” » More insidious than regular phishing. » Assume that your sensitive information has been captured or is at risk. » Until you’ve installed and run an anti-spyware program, do not log in to any of your financial accounts. » Crimeware will record your password and account information and transmit it to the crooks, who then sell it to the highest bidder.
  • 3. How does it occur??? » Conducted by email. » Receive an authentic-looking email message that appears to come from a legitimate business. » Ask you to divulge or verify personal data such as an account number, password, credit card number or Social Security number. » Possible for you to be phished by mail, telephone or even in person. » Through the use of Instant Messaging (IM), which can also be used for identity theft as well as spreading viruses and spyware. INTRODUCTION
  • 4. Who perpetrates it??? » Phishers are scam artists. » Send millions of emails, realizing that even few recipients give them identifying information. » Purchase software specifically designed to help set up and manage a phishing scam site. Who is affected by phishing? » Popular targets are users of online banking services and auction sites. » Email address has been made public anywhere on the Internet then you are more susceptible to phishing. » Scammers can use spidering or Web-crawling programs to search the Internet and collect millions of email addresses. INTRODUCTION
  • 5. HOW CAN I RECOGNIZE A PHISHING EMAIL?
  • 6. HOW CAN I MINIMIZE THE POSSIBILITY OF BEING CAUGHT BY A PHISHING SCAM? • Be on guard • Don't fill out a form on a Web site unless you know it is secure. • Regularly check your bank, credit and debit card statements (paper and online). • Ensure that your browser is up to date. • Install and maintain antivirus and anti-spyware software • Consider installing a phish-blocking toolbar on your Web browser. • Stay informed.
  • 7. WHAT SHOULD I DO IF I THINK I'VE RECEIVED A PHISHING EMAIL?
  • 8. WHY SHOULD I PROTECT AGAINST PHISHING? *Phishing attacks usually target: - Bank information – such as VISA and PayPal accounts. - Username and password information. - Social Security numbers. - Mother maiden’s name can be used to retrieve forgotten or lost credentials. *The above information allows scammers to: - Make fraudulent charges on your credit or debit card. - Make use of your credentials on different online services to commit crime without being caught.
  • 9. WHAT SHOULD I DO IF I'VE BEEN CAUGHT?
  • 10. CONCLUSION • Disturbing signs of evolving. • Attacks becoming savvier & attackers beginning to share code and techniques with virus writers called crackers. • Slow down unless service providers adequately address consumer security concerns in the form of strong authentication. • Time to educate their users on how to spot a phishing attack. • Email requests for passwords, credit card numbers, and other private data are never legitimate.
  • 11. REFERENCES Date of searching the information on the internet; -09 MAY 2007- -20 JUNE 2007- Web; http://www.ncsu.edu/it/essentials/antivirus_security/phishing/intro.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/recognize.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/receive.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/avoid.html http://www.ncsu.edu/it/essentials/antivirus_security/phishing/whatdo.html
  • 12.