Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Breaking Trust On The Internet
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
ICT Essential Skills. (electronic mail) Snail Mail.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
PART THREE E-commerce in Action Norton University E-commerce in Action.
A Student’s Guide to Proper and Safe Web Behavior
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Safe Internet Use Mark Wheatley CSI Onsite
BUSINESS B1 Information Security.
Scams & Schemes Common Sense Media.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Viruses & Destructive Programs
C8- Securing Information Systems
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Computer viruses are small software programs designed to spread from one computer to another corrupt or delete data on your computer.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Information Security Sharon Welna Information Security Officer.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
What is a spam? w abuse-faq/spam-faq.html w Spam is flooding the Internet with many copies of the same message,
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
A Student’s Guide to Proper and Safe Web Behavior
Securing Information Systems
Unit 3 Section 6.4: Internet Security
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Lesson 3 Safe Computing.
Securing Information Systems
How to Protect your Identity Online PIYUSH HARSH
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Phishing, Pharming, and Spam
Presentation transcript:

Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30

What is Phishing? The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Dangers of Phishing: In 2003 there was a phishing scam in which users received s supposedly from eBay claiming that the user’s account was about to be suspended unless they clicked on the provided link and updated the credit card information that the genuine eBay already had.

What is Pharming? Pharming is the exploitation of a vulnerability in Domain Name Service (DNS) server software that allows a hacker to redirect that website's traffic to another web site. DNS servers are the machines responsible for resolving Internet names into their real addresses

What is Spam? Spam is the act of flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, or get-rich- quick schemes. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

Dangers They Present In the past the incidence of a virus traveling through would be fairly predictable. That has changed with viruses now working together with Spam. An example is the “SoBig” virus whose purpose was to create a broad spamming infrastructure by planting code on unwilling participants PCs creating a mass threat to security.

How to Protect Yourself.. It's time to get serious about spam blocker software - as a first line of defense! Note: Spam filters typically do not provide users with protection against pharming, as pharming is not perpetrated through the spreading of spam s. Authentication software such as Green Armor Solutions

Authorities Response? In March of 2005, United States Senator Patrick Leahy introduced the Anti-Phishing Act of The anti- phishing / anti-pharming bill proposes that criminals who utilize phishing and related hacker techniques such as pharming in order to defraud consumers be fined up to $250,000 and receive jail terms of up to five years