Preview

Phishing

Powerful Essays
Open Document
Open Document
2531 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Phishing
PHISHING
DONT BE A PHISH BAIT

TABLE OF CONTENTS

1. Introduction ----------------------------------------------------- 1 2. What is Phishing ----------------------------------------------------- 2 3. Phishing History ----------------------------------------------------- 4 4. Types of Phishing --------------------------------------------------- 4 5. How to recgnize Phishing Scam -----------------------------------6 6. Phishing pages ------------------------------------------------------- 8 7. How to handle Phishing E mail ----------------------------------- 9 8. Phishing trends in year 2012 -------------------------------------- 11 9. Conclusion ----------------------------------------------------------- 12 10. References ----------------------------------------------------------- 13

INTRODUCTION

The Internet has brought an exciting global marketplace directly to our fingertips, allowing us to shop and invest at our convenience. Yet when you provide personal information and check out your "shopping cart" at an online store, can you be certain your purchase will be safe? Can someone steal your credit card number during a transaction? Can you confirm that you are doing business with a reputable Web site and not with a shady imposter?

Although millions of people do business over the Internet daily, it's still important that you take steps to protect yourself. The Internet is unique technology with characteristics that offer potential for certain types of fraud. As a result, scam artists are continually trying to create new schemes to take your money.

The Internet is essentially an open communications system, so it's important that private and confidential information, such as credit card numbers and personal financial data, remains private during e-commerce. The Internet is also relatively anonymous, so it's important that you confidently confirm a person or entity's identity before conducting

You May Also Find These Documents Helpful

  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    DQ4: How might you explain to a friend who is not technically savvy what phishing is and how it can be avoided? What are five tips you would provide to help your friend avoid phishing?…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Deceptive Phishing Attacks

    • 1051 Words
    • 5 Pages

    “Phishing” is when cybercriminals try to get personal information like credit card numbers to steal money and passwords to important accounts. They can get this information from you and your computer. They can do it through emails, text messages, phone calls even. There are many techniques and styles attackers use to get this information out of people.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Although many people believe that online shopping is much easier than going to the actual store, it can also be dangerous. When it comes to entering personal credit card information, most people do not really think about how this information is being stored in their computer. Not only is it being stored in the computer, but the company that the customers are buying from is also storing the information in their database. There have been numerous cases lately where people are hacking…

    • 882 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Pii Research Paper

    • 484 Words
    • 2 Pages

    Most people don’t give a second thought to the information they are asked to provide when using ecommerce sites or creating accounts on various sites such as Facebook and Twitter. What is the data you entered being used for? What happens to this information once you have entered it and completed your transaction with a business? How is this information stored and for how long? How is my information protected from theft? Will my information be sold to third parties? What are my rights should my personal data be lost or compromised? These are questions everyone should ask because your information in the wrong hands can be used to steal your money, steal your identity or both.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Introduction: Online shopping has become a part of everyday’s life but it can be dangerous if you’re not using it safely. For example, in 2009 my brother was looking for a job online, so he came across this website that asked for a $1.79 and they would provide him with a job. My brother got my dad’s credit card and paid the $1.79 but they didn’t provide him with any jobs. At the end of the month my dad received his credit card statement and it turned out that they had taken one hundred seventy nine dollars twice. We tried contacting them with the number they provided online but it didn’t work, so we called the credit card company. The company took like two months to get a hold of them and get the money back. So how many of you guys shop online? Do you all know if the websites you use are safe or not?…

    • 945 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ethical Hacking

    • 1563 Words
    • 7 Pages

    Lesson 1: Introduction to Ethical Hacking | Problem Definition -Why Security? Essential Terminologies Elements of Security The Security, Functionality and Ease of se Triangle Case Study What does a Malicious Hacker do?…

    • 1563 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Browser Security Report

    • 885 Words
    • 4 Pages

    Web Forgery (Phishing) is a way of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. The name “phishing” is come from the real life activity of fishing, the criminals are the fisherman, they puts a bait at the hook, thus, pretending to be a genuine food for fish (web users), but the hook inside it takes the complete fish out of the pool. Phishing attacks are typically come from email messages or instant massagers that attempt the lure recipient into giving their personal information on fake web sites whose look and feel are almost identical to the real one, they might even use the logo, images and details from the real site.…

    • 885 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Internet Ethics

    • 1639 Words
    • 7 Pages

    The internet is a global network of networks using universal standards to connect millions of different networks (Laudon & Laudon, 2012). With millions of people trafficking the networks everyday it is virtually impossible to monitor all unethical behaviors. Throughout the internet there are people who are publishing false information, using fake identification, hacking accounts for financial benefits, or countless other criminal acts and there is no way of stopping all of them. The internet is open to everyone and a lot of these modern businesses can’t function without it. A lot of the problems dealt in the internet aren't solely on business users but anyone who has access to internet, so whatever affects the casual user defiantly affects the business user.…

    • 1639 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    E Fraud

    • 4360 Words
    • 18 Pages

    An e- fraud is considered to be an electronic crime that affects not only individuals businesses and governments but also allows for very negatively intelligent people and hackers to use their intelligence to log into other’s accounts use their credit card numbers and banking password and transact huge amounts of trade and money . it has been seen that e fraud is on the increase and this is because of the low levels of awareness, the inappropriate counter measures that are ineffective to handle this kind of fraud has led to e frauds being on the increase .The only area that has been actively involved in reducing the impact of fraud is the technical side leaving the other so many variables out of the purview of the e fraud scenario. This has made e fraud even more easier because there have been no mechanisms to reduce these occurrences and even if there are there has been limited penalties issued to the frauds that happen on the cyber space.…

    • 4360 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    First, the internet has become a dominate tool for people to abuse. Spam, scam, fraud, hacking, and identity theft are the most common problems we all have to confront. In the past, we had to do everything by hands, but today everything can be done online with one button or a click of mouse. That is why “cybercrimes” are everywhere on the internet. The information on profiles can be hacked easily if we are carefree to fill out these unsafe forms online. For instances, you are looking for a job, and then you find a job you want online. However, if you were not careful to read the contents on your web pages, hackers or other groups can steal or look up your information without your permission like your social security, bank account, or something else. Before you apply for a job or fill out these forms online, you should talk a look first if it is safe for privacy or your information is protected. In addition, online shopping is one of the examples. It has become popular for every person. It is faster, easier, and more convenient. However, is it always safe to shop online? The answer is no. No one can guarantee your information is safe. You can be cheated easily if you do not know for sure what you shop online. For examples, you receive a promotion code in your email from a…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Internet Scam

    • 1316 Words
    • 6 Pages

    The aim of this chapter is to give an overview of Internet fraud in general. The Internet fraud definition, types and examples will be discussed. The chapter identifies some web applications that are suffering from Internet fraud as well as some statistics for Internet fraud impact. It also presents some existing techniques and strategies to detect and prevent Internet fraud.…

    • 1316 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cybercrime in India

    • 449 Words
    • 2 Pages

    Cases of spam, hacking, cyber stalking and email fraud are rampant and, although cyber crimes cells have been set up in major cities. The problem is that most cases remain unreported due to a lack of awareness.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Mc Mary Kom

    • 823 Words
    • 4 Pages

    As the trend of buying goods and availing services online continues to soar, the frauds and security concerns associated with the same are also on a rise. Technological advancement has given a major boost to e-commerce and other such concepts, which revolve around the computers, and more importantly, the Internet. The concept of online shopping is no more alien to anybody in the world. Millions of people log onto these shopping websites in order to make shopping a convenient affair. What they fail to understand, however, is the fact that they are compromising on their security by not abiding by the rules of safe online shopping. With so many issues of online frauds coming to light every day, it is surprising to see that people continue their online shopping spree, without paying any heed to their own security.…

    • 823 Words
    • 4 Pages
    Good Essays