Escolar Documentos
Profissional Documentos
Cultura Documentos
recipients
p into revealing
g their p
personal
information such as :
Usernames
Passwords
Credit cards
Social security
y numbers
Some porpular websites such as YouTube,
Facebook, Myspace, Friendster or PayPal are
commonly used to lure the unsuspecting.
unsuspecting
Phishing is typically carried out by e-
e-mail or
instant message.
message
It often directs the users to enter details at fake
websites.
Phishing is also an example of social engineering
techniques
q used to fool users,, and exploits
p the
poor usability of current web security
technologies.
This is an example of a phishing e-
e-mail, disguised as an official e
e--mail
from a ((fictional)) bank.
In an example PayPal
phishing,
hi hi spelling
lli mistakes
i t k iin
the ee--mail and the presence
of an IP address in the link
are both clues that this is a
phishing attempt.
Phishing will lead to substantial financial loss.
loss
legislation
user training
public awareness
technical security measures.
Anti-phishing Software
Anti-
Computer insecurity
Comfidence trick
Dancing pigs
Defensive computing
DomainKeys
D i K
E-mail spoofing
Pharming
Rock Phish Kit
Social engineering
Vishing
Not to use any links that your phishing email has
p
provided.
Never provide personal information over the phone
if you did not initiate the call.
Protect your computer with a password, change it
frequently.
To p
protect yourself
y you
y need to stay
y all the more alert
and knowledgeable.
http://en.wikipedia.org/wiki/Phishing
http://www.answers.com/topic/phishing#Anti-
http://www.answers.com/topic/phishing#Anti-
phishing
Shell Cashman
Shelly Ca h a Vermaat
Ve aat, Discovering
Vermaat, Di c e i C Computers
te
2007,, Thompson, 2007
2007
SABRINA LEE
NUR IRDINA ZAHIRAH
NURUL ZAFIRAH
SYARIFAH ALUWIAH