Phishing, Pharming, and Spam

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Protect Your Good Name Reduce Your Risk of Identity Theft Kevin Lewis
Important Facts you should know about the Net
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Security Awareness Presenter: Royce Wilkerson.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Identity Theft The Dangers Involved and How It Affects You!
Topic 5: Basic Security.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Identity Theft One of America's fastest growing crimes.
Protect Your Good Name Reduce your Risk of Identity Theft.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Lesson 10A: The Three D’s of Identify Theft
Identity Theft It’s a crime!
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Mrs. Esman Computer Special
Reduce Your Risk of Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
Unit 4 IT Security.
Level 2 Diploma Unit 11 IT Security
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Protecting Your Identity:
Network security threats
Reduce Your Risk of Identity Theft
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Reduce Your Risk of Identity Theft
Personal Safety Online
Reduce Your Risk Of Identity Theft
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

Phishing, Pharming, and Spam By Glen R. Dunlap

Phishing Phishing is a criminal activity that works using social engineering techniques. This can be done through email, instant message, and cell phones. Phishing is used to steal passwords and credit card information.

Pharming Pharming is the act in which a person is redirected to a bogus site. This is done through the exploitation of the DNS Server or the changing of the hosts files.

Types of Spam E-mail spam Forum spam Spamdexing Messaging spam

Purpose of Spam Advertising

Spam is Popular! Low cost of advertising. Large variety of view.

Phishing Dangers Identity theft. Fraudulent charges. Stolen data. Private information stolen. Your shopping history view.

Pharming Dangers Stolen passwords Identity theft Fraudulent charges. Stolen data. Private information stolen.

Spam Dangers Slowed servers Cost to Internet providers Cost to victims Inappropriate content shown to minors Time Space on computer/Email acount

Protection Firewalls Anti virus Protection Spyware removal software License check Ad-ware removal program Educated on the dangers Pop-up Blocker

Works Cited http://en.wikipedia.org/wiki/Phishing http://en.wikipedia.org/wiki/Pharming http://en.wikipedia.org/wiki/Spam_%28electronic%29 http://en.wikipedia.org/wiki/E-mail_spam http://en.wikipedia.org/wiki/Forum_spam http://en.wikipedia.org/wiki/Spamdexing http://en.wikipedia.org/wiki/Messaging_spam

The End Surf Safe!