Phishing

Only available on StudyMode
  • Download(s) : 103
  • Published : January 3, 2013
Open Document
Text Preview
PHISHING
DONT BE A PHISH BAIT

TABLE OF CONTENTS

1. Introduction ----------------------------------------------------- 1 2. What is Phishing ----------------------------------------------------- 2 3. Phishing History ----------------------------------------------------- 4 4. Types of Phishing --------------------------------------------------- 4 5. How to recgnize Phishing Scam -----------------------------------6 6. Phishing pages ------------------------------------------------------- 8 7. How to handle Phishing E mail ----------------------------------- 9 8. Phishing trends in year 2012 -------------------------------------- 11 9. Conclusion ----------------------------------------------------------- 12 10. References ----------------------------------------------------------- 13

INTRODUCTION

The Internet has brought an exciting global marketplace directly to our fingertips, allowing us to shop and invest at our convenience. Yet when you provide personal information and check out your "shopping cart" at an online store, can you be certain your purchase will be safe? Can someone steal your credit card number during a transaction? Can you confirm that you are doing business with a reputable Web site and not with a shady imposter? 

Although millions of people do business over the Internet daily, it's still important that you take steps to protect yourself. The Internet is unique technology with characteristics that offer potential for certain types of fraud. As a result, scam artists are continually trying to create new schemes to take your money.

The Internet is essentially an open communications system, so it's important that private and confidential information, such as credit card numbers and personal financial data, remains private during e-commerce. The Internet is also relatively anonymous, so it's important that you confidently confirm a person or entity's identity before conducting business with them.

One of most common scams today is "phishing" where crooks carefully copy the look of bank, government and other legitimate institutions' communication in fraudulent e-mails and related Web sites in an attempt to obtain customers' account information and personal identification numbers (PINs).   Various efforts are underway to help consumers authenticate the origin of email communication, a currently difficult task. 

What is Phishing

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. It is a type of deception designed to steal valuable personal data. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. The attackers have become more sophisticated and also their phishing e mail messages and pop up windows. They often include official looking logos from real organisations and other identifying information taken directly from legitimate web sites.

To make these phishing e mail messages look even more legitimate, the attacker may place a link in them that appears to go to the legitimate web site, but it actually takes you to a phony scam site or possibly a pop up window that looks exactly like the official site. These copycat sites are also called “spoofed” web sites. Once you are at one of these spoofed sites, you might unwittingly send personal information to the con artists.

Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Phishing emails usually appear to come from a well-known organization and ask for...
tracking img