The Meaning of Phishing

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Impact Of ICT On Society

PHISHING

NAME: Chew Pang Tzen


Class: 4SC5
The Meaning Of Phishing
• Phishing means a criminal activity using social engineering
techniques.
• Phishers attempt to fraudulently acquire sensitive
infromation, such as passwords and credit card details, by
masquerading as a trustworthy person or business in an
electronic communication.
• Phishing is typically carried out using email or an instant
message
• The term phishing is a leetspeak variant of fishing, probably
increasingly sophisticated lures to ‘’fish for users’ financial
information and passwords.
The Meaning Of Phishing
• Phishing is a fraudulent attempt, usually made through
email, to steal your personal information. The best way to
protect yourself from phishing is to learn how to
recognize a phish.
• Phishing emails usually appear to come from a well-
known organization and ask for your personal information
— such as credit card number, social security number,
account number or password. Often times phishing
attempts appear to come from sites, services and
companies with which you do not even have an account.
Meaning Of PhiShing
• In order for Internet criminals to successfully
"phish" your personal information, they must
get you to go from an email to a website.
Phishing emails will almost always tell you to
click a link that takes you to a site where your
personal information is requested. Legitimate
organizations would never request this
information of you via email.
Tools and Tactics
• Using IP addresses instead of domain names
in hyperlinks that address the take website.
Many innocent users will not check that an IP
address as registered and assigned to the
target organization that the branded take web
site claims to represent.
Tools and Tactics
• Registering similar sounding DNS domains and
setting up fake web sites that closely mimic
the domain name of the target website, in the
hope that users will mistake the fake domain
name for the real domain name.
Tools and Tactics
• Embedding hyperlinks from the real target web site into
the HTML contents of an email about the fake phishing
web site, so that the user’s web browser maks most of
the HTTP connections to the real web server and only a
small number of connections to the fake web server. IF
the user’s email client software supports auto-rendering
of the content, their client may attempt to connect
automatically to the fake web server as soon as the email
is read, and manual browser may not notice the small
number of connections to a malicious server amongst the
normal network activity to the real website.
Example Of Phishing
• Generic greeting. Phishing emails are usually sent in large
batches. To save time, Internet criminals use generic names like
"First Generic Bank Customer" so they don't have to type all
recipients' names out and send emails one-by-one. If you don't
see your name, be suspicious.
• Forged link. Even if a link has a name you recognize somewhere
in it, it doesn't mean it links to the real organization. Roll your
mouse over the link and see if it matches what appears in the
email. If there is a discrepency, don't click on the link. Also,
websites where it is safe to enter personal information begin
with "https" — the "s" stands for secure. If you don't see
"https" do not proceed.
Example Of Phishing
• Requests personal information. The point of sending
phishing email is to trick you into providing your
personal information. If you receive an email requesting
your personal information, it is probably a phishing
attempt.
• Sense of urgency. Internet criminals want you to provide
your personal information now. They do this by making
you think something has happened that requires you to
act fast. The faster they get your information, the faster
they can move on to another victim.
Damage Caused BY Phishing
• The damage caused by phishing ranges from loss of access to
email to substantial financial loss. This style of identity theft is
becoming more popular, because of the ease with which
unsuspecting people often divulge personal information to
phishers, including credit cards numbers, social security
numbers, and mothers maiden names. There are also fears
that identity thieves can obtain some such information simply
by accessing public records. Once they have the information
they need and want, the phishers will use that person’s detail
to create fake accounts using the victims name, using up a
persons credit, or even prevent the victim from accessing to
their own accounts.
How They Attack
• Most attacks of phishing use some form of technical
deception designed to make a link in an email
appear to belong to the spoofed organization.
Misspelled URLs or the use of subdomains are
common tricks used by phishers, such as this
example URL, http://www.maybank.home.com/.
One method of spoofing links used web addresses
containing the @ symbol, which were used to
include a username and password in a web URL .
How Detect Phishing
• It is actually very noticeable. You will see misspelled
URLS. One way seeing it is discovering @ in the web
addresses, example
http://www/hotmail.com@members.com
• Some web browsers such as Mozilla and Internet
Explorer has closed this off while Opera gives a
warning and an option to get off the website. In
another popular method of phishing, an attackers uses
a bank or other services websites scripts on the victim.
These types of attack known as cross – site scripting
Conclusion
• Phishing e–mails are only a small aspect of the
overall phishing economy and until now, the only
aspect seen by the most people. The phishing
economy is a decentralized and self–organized
social network of merchants and consumers
governed by laws of supply and demand. This
clearer picture of the landscape, the players, and
insight into phishing operations will hopefully
assist in the fight against online fraud.
Reference
• http://www.phishtank.com/what_is_phishing.
php
• http://smklangkawi.edu.my/blogict/?cat=1&p
aged=3
• http://en.wikipedia.org/wiki/Phishing

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy