Presentation is loading. Please wait.

Presentation is loading. Please wait.

Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card.

Similar presentations


Presentation on theme: "Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card."— Presentation transcript:

1

2 Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft.  Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive information that could lead to identity theft.

3  Identity Theft Theft

4 Outlook 2003 SP2/2007 contains some protection from phishing e-mails.  Outlook 2003 SP2/2007 contains some protection from phishing e-mails.  By not replying directly to e- mails asking for personal information.  By never clicking on a link in an e-mail in order to enter your log-in information or password.  By not copying and pasting a URL address from a suspicious e-mail.

5 Pharming (pronounced “farming”) is the term for when criminal hackers redirect Internet traffic from one Web site to a different, identical-looking site in order to trick you into entering your user name and password into the database on their fake site. o Pharming (pronounced “farming”) is the term for when criminal hackers redirect Internet traffic from one Web site to a different, identical-looking site in order to trick you into entering your user name and password into the database on their fake site. o Pharming might sound similar to e-mail phishing scams, but pharming is insidious, because you can be redirected to a false site without any participation or knowledge on your part.

6 The possibility of the DNS (Domain Name System) setting on the user’s wired or wireless broadband router being changed. o The possibility of the DNS (Domain Name System) setting on the user’s wired or wireless broadband router being changed. o Hackers having complete control of the broadband connections.

7 By running separate name servers for redundancy on different network segments. o By running separate name servers for redundancy on different network segments. o By restricting dynamic DNS updates when possible. o By restricting zone transfers only to authorized devices. o By using firewall services both at the network perimeter & on the DNS servers.

8  Anonymous, unsolicited bulk mail. Real spam is sent with spoofed or harvested sender addresses to conceal the sender. Real spam is sent in mass quantities.  Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost-effective the initial mail have to be high volume.

9 Spam can be used to download viruses, worms and Trojans onto your computer.  Spam can be used to download viruses, worms and Trojans onto your computer.

10 Free Anti-Spam Software  Free Anti-Spam Software  By not replying to the address in the “from” field.  By not loading HTML e-mail with images.  By not using the “remove” link (unsubscribe link) on any links in the spam e-mails.  By using your e-mail client or web service filters (or message rules) to discard a good portion of spam.

11


Download ppt "Phishing (pronounced “fishing”) is the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card."

Similar presentations


Ads by Google