Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.

Slides:



Advertisements
Similar presentations
Slide # 1 Title Slide Preamble Introduce Participants and roles
Advertisements

ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
How It Applies In A Virtual World
Norman SecureSurf Protect your users when surfing the Internet.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Over 3,000 computers are affected monthly by Malware and Phishing.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
1 Getting A Hook On Phishing Laurie Werner Miami University Chuck Frank Northern Kentucky University.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Safe Internet Use Mark Wheatley CSI Onsite
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Phishing: Trends and Countermeasures Blaine Wilson.
How Phishing Works Prof. Vipul Chudasama.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
E-Commerce & Bank Security By: Mark Reed COSC 480.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Understand Protection LESSON Security Fundamentals.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
ISYM 540 Current Topics in Information System Management
Cyber Security Awareness Workshop
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Security.
Security in mobile technologies
Phishing, Pharming, and Spam
Presentation transcript:

Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu

Page 2 Outline Threats to Identity Theft Phishing – Definition – Methods Pharming – Definition – Methods Safeguards Project aims

Page 3 Identify Theft Two major Identity theft threats Aim at stealing personal sensitive data – ID & password – Passport information – SSN – Bank account numbers – Credit card numbers – etc

Page 4 Statistical Highlights for 2nd Half, 2008 Phishing Activity Trends Report, 2nd Half 2008

Page 5 Statistical Highlights for 2nd Half, 2008 Phishing Activity Trends Report, 2nd Half 2008

Page 6 Phishing

Page 7 Methods / Techniques Misspelled URLs – ( Spoofing URLs Javascript International Domain Names

Page 8 Pharming

Page 9 Methods / Techniques Viruses – Alters the computer’s host file DNS Poisoning – Nothing on computer changes – The company’s website is “hijacked” Web Cache Poisoning Drive-by pharming

Page 10 Safeguards Specialized “Anti-Phishing” Software Spam filters Multifactor authentication Challenge Questions Secure connections DNS protection

Page 11 The project aims at studying the methods of Phishing and Pharming, and analyzing the effectiveness of the safeguards against these methods. Proposal