1 / 16

Spyware Project

Adam Soph, Alexandra Smith, Landon Peterson. Spyware Project. Phishing. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy company in an electronic communication. . How Does Phishing Work?.

dwight
Download Presentation

Spyware Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Adam Soph, Alexandra Smith, Landon Peterson Spyware Project

  2. Phishing Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy company in an electronic communication.

  3. How Does Phishing Work? Phishers decide which business to target and determine how to get customers email addresses. Once they know which business to spoof and who their victims are, they creates methods for delivering the messages and collecting data.

  4. How Does Phishing Work? (Continued) Then the phisher sends a phony message that appears to be from a reputable source. And finally they collect the victims information when the victim opens the message or the phony website.

  5. What Damage Does it Cause on a Computer/ Network? Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.

  6. How Does a Computer Become Infected? The phisher infects the computer with viruses to convince people to unwittingly participate in money laundering. Most people associate with email messages that spoof or mimic banks or other businesses such as Amazon or eBay.

  7. What Are Some Steps to Avoid this Type of Spyware? • Be Suspicious of any email with urgent request for personal financial information. • Don’t use the link in an email, instant message or chat to any web page if you suspect the message might not be authentic or you don’t know the sender or user’s handle.

  8. What Are Some Steps to Avoid this Type of Spyware? (Cont.) • Avoid filling out forms in email address that ask for personal financial information • Always ensure that you’re using a secure website when submitting credit card and other sensitive information via your web browser.

  9. What Are Some Steps to Avoid this Type of Spyware? (Cont.) • Remember not all scam sites will try to show the http:// and/or the security lock. Get in the idea habit of looking at address lines too. • Consider installing a web browser tool bar to help protect you from known fraudulent websites. Theses toolbars match where you are going with list of known phisher websites. • Regularly log into your online account

  10. What Are Some Steps to Avoid this Type of Spyware? (Cont.) • Regularly check your bank, credit card and debit card statements to ensure that all transactions are legitimate. • Ensure that your browser is up to date and security patches applies. • Always report “Phishing” or “spoofed” emails to the following groups.

  11. Vocabulary • Passwords – A word or a series of characters and symbols you type in, in order to access file or memory unit. • Email Spoofing – An email activity in which the senders address and other parts of the email header are altered to appear as though the email originated from a legitimate source.

  12. Vocabulary (Cont.) • Phreaking – A slang term coined to describe the activity of a culture of people that study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. • Social Engineering – The act of manipulating people into performing actions or disclose confidential information, rather than by breaking in or using technical cracking techniques; essentially a fancier, more technical way of lying.

  13. Vocabulary (Cont.) • Telecommunication – The transmission of information over significant distances to communicate. • Instant Messaging – The transmission of information over significant distances to communicate.

  14. Vocabulary (Cont.) • Website Forgery – To make a website that is false of a company in order to obtain personal information. Example: A bank website, or other website that needs login information. • AOL Phishing – An early phishing technique used to obtain information over AOL.

  15. References • http://en.wikipedia.org/wiki/Phishing • http://computer.howstuffworks.com/phishing.htm • http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm • http://www.antiphishing.org/consumerrecs.html • http://www.webroot.com/En_Us/csc/spyware-FAQs.html • http://computer.howstuffworks.com/phishing.htm

More Related