ict phishing presentation

of 12 /12
Presented by: Fakhruddin Mustaffa 1

Author: muhammad-faizal-bin-josman

Post on 08-May-2017




2 download

Embed Size (px)


Page 1: Ict Phishing Presentation

Presented by:Fakhruddin Mustaffa


Page 2: Ict Phishing Presentation

What is “Phishing”??? » Technique for acquiring your personal information and subsequently

committing fraud in your name. » Include stealing your identity or emptying your checking and

savings accounts. » A form of cyber-crime that's growing faster than the ability of the

police or courts to deal with it. » Simply a play on the word "fishing" — scammers drop email lures into

the sea of Internet users, hoping to hook your personal information. » More dangerous variation called “spear phishing” » More insidious than regular phishing. » Assume that your sensitive information has been captured or is at risk. » Until you’ve installed and run an anti-spyware program, do not log in

to any of your financial accounts. » Crimeware will record your password and account information and

transmit it to the crooks, who then sell it to the highest bidder. 2

Page 3: Ict Phishing Presentation

How does it occur??? » Conducted by email. » Receive an authentic-looking email message that

appears to come from a legitimate business. » Ask you to divulge or verify personal data such as an

account number, password, credit card number or Social Security number.

» Possible for you to be phished by mail, telephone or even in person.

» Through the use of Instant Messaging (IM), which can also be used for identity theft as well as spreading viruses and spyware.


Page 4: Ict Phishing Presentation

Who perpetrates it??? » Phishers are scam artists. » Send millions of emails, realizing that even few recipients

give them identifying information. » Purchase software specifically designed to help set up and

manage a phishing scam site.

Who is affected by phishing? » Popular targets are users of online banking services and

auction sites. » Email address has been made public anywhere on the

Internet then you are more susceptible to phishing. » Scammers can use spidering or Web-crawling programs to

search the Internet and collect millions of email addresses.


Page 5: Ict Phishing Presentation


Page 6: Ict Phishing Presentation

• Be on guard

• Don't fill out a form on a Web site unless you know it is secure.

• Regularly check your bank, credit and debit card statements (paper and online).

• Ensure that your browser is up to date.

• Install and maintain antivirus and anti-spyware software

• Consider installing a phish-blocking toolbar on your Web browser.

• Stay informed.


Page 7: Ict Phishing Presentation


Page 8: Ict Phishing Presentation

*Phishing attacks usually target: - Bank information – such as VISA and PayPal accounts. - Username and password information. - Social Security numbers. - Mother maiden’s name can be used to retrieve forgotten

or lost credentials. *The above information allows scammers to: - Make fraudulent charges on your credit or debit card. - Make use of your credentials on different online services

to commit crime without being caught.


Page 9: Ict Phishing Presentation


Page 10: Ict Phishing Presentation

• Disturbing signs of evolving.• Attacks becoming savvier & attackers beginning to

share code and techniques with virus writers called crackers.

• Slow down unless service providers adequately address consumer security concerns in the form of strong authentication.

• Time to educate their users on how to spot a phishing attack.

• Email requests for passwords, credit card numbers, and other private data are never legitimate.


Page 11: Ict Phishing Presentation


Date of searching the information on the internet; -15 FEBRUARY 2013 Web;http://www.ncsu.edu/it/essentials/antivirus_security/phishing/






Page 12: Ict Phishing Presentation