Download presentation
Presentation is loading. Please wait.
Published byElijah Nicholson Modified over 9 years ago
2
Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft. Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft.
3
Identity Theft Theft
4
Outlook 2003 SP2/2007 contains some protection from phishing e-mails. Outlook 2003 SP2/2007 contains some protection from phishing e-mails. By not replying directly to e- mails asking for personal information. By never clicking on a link in an e-mail in order to enter your log-in information or password. By not copying and pasting a URL address from a suspicious e-mail.
5
Pharming (pronounced “farming”) is the term for when criminal hackers redirect Internet traffic from one Web site to a different, identical-looking site in order to trick you into entering your user name and password into the database on their fake site. o Pharming (pronounced “farming”) is the term for when criminal hackers redirect Internet traffic from one Web site to a different, identical-looking site in order to trick you into entering your user name and password into the database on their fake site. o Pharming might sound similar to e-mail phishing scams, but pharming is insidious, because you can be redirected to a false site without any participation or knowledge on your part.
6
The possibility of the DNS (Domain Name System) setting on the user’s wired or wireless broadband router being changed. o The possibility of the DNS (Domain Name System) setting on the user’s wired or wireless broadband router being changed. o Hackers having complete control of the broadband connections.
7
By running separate name servers for redundancy on different network segments. o By running separate name servers for redundancy on different network segments. o By restricting dynamic DNS updates when possible. o By restricting zone transfers only to authorized devices. o By using firewall services both at the network perimeter & on the DNS servers.
8
Anonymous, unsolicited bulk mail. Real spam is sent with spoofed or harvested sender addresses to conceal the sender. Real spam is sent in mass quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective the initial mail have to be high volume.
9
Spam can be used to download viruses, worms and Trojans onto your computer. Spam can be used to download viruses, worms and Trojans onto your computer.
10
Free Anti-Spam Software Free Anti-Spam Software By not replying to the address in the “from” field. By not loading HTML e-mail with images. By not using the “remove” link (unsubscribe link) on any links in the spam e-mails. By using your e-mail client or web service filters (or message rules) to discard a good portion of spam.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.