Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

How to protect yourself, your computer, and others on the internet
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Social impacts of the use of it By: Mohamed Abdalla.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
how to prevent them from being successful
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing is a form of social engineering that attempts to steal sensitive information.
Ethics Tutorial Assignment#2
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Wireless Spoofing Attacks on Mobile Devices
Phishing, Pharming, and Spam
Presentation transcript:

Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006

Phishing (not with a pole)  A criminal activity online in which Phishers attempt to gain access to classified information such as credit card/bank account numbers and passwords.  Comes from the word “fishing” because of the many lures that phishers use to deceive phishes.  Usually occurs in or instant messages.  Has been somewhat controlled by legislation, user training, and technology.

Phishing (for your money)  First occurred on AOL during the 1990s.  Recent forms of Phishing include false s from the IRS and scams directed towards members of specific banks (spear phishing).  Social networking sites that encourage identity theft have a 70% success rate for phishing.  Phishers disguise their sites to look like a banks own site by using pictures, false links, and false web addresses.  Both PayPal and SouthTrust Bank have had problems with phishers in recent years.

Phishing (don’t get hooked)  Phishing can result in stolen money, identity theft, and a loss of access to bank, credit card, and accounts  From May 2004 to May 2005, 2.1 million people became the victims of phishers. This led to a monetary loss of $929million for users and $2billion for businesses.  You can protect yourself by looking for specific, personal information in each that asks for banking and account confirmation.  Some companies now make anti-phishing software.

Pharming (without a barn)  Pharming occurs when a pharmer either changes an IP address on his victim’s computer or changes the address at the DSN server (the telephone book of the internet).  Unlike phishing, where a user may notice that the address of a site is wrong, pharming changes what website the address goes to so that the user may never know the difference. Therefore, the pharmer can make his fake site to look identical to the site the user was trying to reach.

Pharming (no chickens either)  The idea that files on a personal computer will be changed is not a big worry.  The biggest threat is that a pharmer will reconfigure or rewrite the embedded software of a DSN server (firmware); therefore, changing the routing process for all IP addresses.  A pharmer can also completely replace the firmware of a server and begin to “eavesdrop,” make middle-man transactions, and follow the internet habits of users.  All of this can be done using wireless routers which makes pharming even more dangerous.

Pharming (bring home the cows)  In 2005, Panix, a domain name in New York city was hijacked into Australia. No money was lost.  To verify an instance of pharming click on start>run>type “command.” In the command prompt type nslookup, a space, and then the questionable IP address. If the domain looks legitimate, then everything is probably all right.  Otherwise, turn the case over to a computer technician for further analysis.

Spam (the other lunchmeat)  Spam can target , instant messaging, mobile phones, newsgroup, web searches, and online gaming.  The most common and most annoying kind of spam is in .  Spam is relatively cheap and convenient to produce because the public pays the cost.  Spam is hated world wide because of its annoying nature

Spam (now made with turkey)  Those who produce spam do their best hide their generating computers.  The spam makes its way through spam blocks on accounts by purposely misspelling words. (ex. Wiater instead of Waiter)  Most spam involves illegal activities such as porn and the Nigerian banking scams.  Spam even combines viruses to turn victims’ computers into zombies that continuously generate small amounts of spam.

Spam (pops up everywhere)  The cost to most victims is the loss in time for surfing the internet or checking .  Countermeasures against spam include filters, greylists, blacklists, traps and restrictions.  Filters are not well liked because of their many false hits.  Spam traps are dormant addresses that collect spam messages. However, these trap some businesses that add customers to mailing lists by pulling addresses off other mailing lists.