SlideShare a Scribd company logo
SPOOFING
Bárbara Jara
Ignacia Sánchez
Paulina Villanueva
Felipe Díaz
• Is a fraudulent or malicious practice in
which communication is sent from an
unknown source disguised as a source
known to the receiver.
WHAT IS
SPOOFING?
• Filtering on the router: Implementing
input and output filters on your router
is a good idea to start your defence
against spoofing.
• Encryption and Authentication:
Performing encryption and
authentication will also reduce spoofing
threats
HOW TO
KEEP SAFE
•
IP Spoofing, PRA spoofing, DNS
spoofing, identity theft (identity
theft), email spoofing
TYPES OF
SPOOFING
Its a type of scam where an
intruder attempts to gain
unauthorized acces to your
computer
SPOOFING PHISHING
• Download information in your
laptop
• Recovery method
10 RULES TO BE SAFE ON
INTERNET
1.- Be responsible with your sons internet using.
2.-Use parental blocking in the computers.
3.-Use safety passwords. (Numbers mixed with letters).
4.-Install antivirus software's.
5.-Change your password constantly.
6.-Don’t upload photos with extremely personal info.
7.-Block your computer camera.
8.-Don’t accept strange people messages.
9.-Be responsible with your internet using.
10.-Be careful about the addiction that you can get playing video games.

More Related Content

PPTX
Spyware risk it's time to get smart
PPTX
Basic Internet Security
PPTX
Hacking intro
PPT
Adult Internet Safety
PPT
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
PPTX
OPSEC for OMBUDSMEN
PDF
Smartphone security issues
PPTX
Cyber crime and security threads
Spyware risk it's time to get smart
Basic Internet Security
Hacking intro
Adult Internet Safety
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
OPSEC for OMBUDSMEN
Smartphone security issues
Cyber crime and security threads

What's hot (19)

PDF
Cyber security and Privacy Awareness manual
PPTX
Cybercrime
PPTX
Internet security
PPTX
Cyber security
PPT
Cyber Security and Cyber Awareness
PPTX
What is IT security[1]
DOCX
How Secure is Your Home Network Poster
PPTX
Security Awareness 9 10 09 V4 Viruses
PPTX
How to keep your laptop & mobile safe
PPTX
Security Awareness 9 10 09 V4 Virus Trojan
PDF
Traveling safely with smartphones 16 jun14
PPTX
Dos and Don'ts of Internet Security
PPTX
Cyber security
PPTX
Cyber Security Awareness
PPTX
Cyber security
PPTX
Spyware
PDF
Internet security
PPTX
Spoofing
Cyber security and Privacy Awareness manual
Cybercrime
Internet security
Cyber security
Cyber Security and Cyber Awareness
What is IT security[1]
How Secure is Your Home Network Poster
Security Awareness 9 10 09 V4 Viruses
How to keep your laptop & mobile safe
Security Awareness 9 10 09 V4 Virus Trojan
Traveling safely with smartphones 16 jun14
Dos and Don'ts of Internet Security
Cyber security
Cyber Security Awareness
Cyber security
Spyware
Internet security
Spoofing
Ad

Similar to Spoofing v2 (20)

PPTX
PPTX
Spoofing
PPTX
PPT
8 - IP Spoofing.ppt8 - IP Spoofing.ppt8 - IP Spoofing.ppt
PPTX
Spoofing
PDF
Spoofing Attack - Meaning, Working & Prevention Plan Explained | USCSI®
PPTX
Spoofing
PPTX
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
PPTX
Access Controls Attacks
PPTX
PPTX
risk of internet the spoofing
PPT
spoofing.ppt
PPT
Spoofing
PPTX
Web spoofing hacking
PPTX
342_IP_Spoofing.pptx
PPTX
Information security
PPTX
Webspoofing
PPTX
Ip spoofing ppt
PPTX
Spamming, spoofing, Dos&DDos attack
PPTX
Phishing
Spoofing
8 - IP Spoofing.ppt8 - IP Spoofing.ppt8 - IP Spoofing.ppt
Spoofing
Spoofing Attack - Meaning, Working & Prevention Plan Explained | USCSI®
Spoofing
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Access Controls Attacks
risk of internet the spoofing
spoofing.ppt
Spoofing
Web spoofing hacking
342_IP_Spoofing.pptx
Information security
Webspoofing
Ip spoofing ppt
Spamming, spoofing, Dos&DDos attack
Phishing
Ad

Recently uploaded (20)

PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Classroom Observation Tools for Teachers
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Types and Its function , kingdom of life
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
RMMM.pdf make it easy to upload and study
Abdominal Access Techniques with Prof. Dr. R K Mishra
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPH.pptx obstetrics and gynecology in nursing
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Classroom Observation Tools for Teachers
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
O5-L3 Freight Transport Ops (International) V1.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Complications of Minimal Access Surgery at WLH
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
VCE English Exam - Section C Student Revision Booklet
Institutional Correction lecture only . . .

Spoofing v2

  • 2. • Is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. WHAT IS SPOOFING?
  • 3. • Filtering on the router: Implementing input and output filters on your router is a good idea to start your defence against spoofing. • Encryption and Authentication: Performing encryption and authentication will also reduce spoofing threats HOW TO KEEP SAFE
  • 4. • IP Spoofing, PRA spoofing, DNS spoofing, identity theft (identity theft), email spoofing TYPES OF SPOOFING
  • 5. Its a type of scam where an intruder attempts to gain unauthorized acces to your computer SPOOFING PHISHING • Download information in your laptop • Recovery method
  • 6. 10 RULES TO BE SAFE ON INTERNET 1.- Be responsible with your sons internet using. 2.-Use parental blocking in the computers. 3.-Use safety passwords. (Numbers mixed with letters). 4.-Install antivirus software's. 5.-Change your password constantly. 6.-Don’t upload photos with extremely personal info. 7.-Block your computer camera. 8.-Don’t accept strange people messages. 9.-Be responsible with your internet using. 10.-Be careful about the addiction that you can get playing video games.