phishing

27
Phishing By: Esraa Yaseen Israa El- Jamal To: Eng. Abdel Nasser Abdelhadi Islamic University-Gaza Faculty of Engineering Computer Department

Upload: esraa-yaseen

Post on 12-May-2015

1.322 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Phishing

PhishingBy:Esraa Yaseen Israa El-JamalTo:Eng. Abdel Nasser Abdelhadi

Islamic University-GazaFaculty of EngineeringComputer Department

Page 2: Phishing

OutlineDefinitionComparison to SpamFacts about PhishingPhishing step by stepWhat phishers want ?Effects of phishingReal storiesHow to phish??Marks of phishing emailsHow to Avoid?I’ve been already phished

Page 3: Phishing

” phishing” Name and definition …

It is the act of tricking someone into giving confidential information (like

passwords and credit card information) on a fake web page or email form

pretending to come from a legitimate company (like their bank).

Page 4: Phishing

COMPARISON TO SPAM

The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient.

So it doesn’t contains any useful information and hence falls under the category of spam.

A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization.

Techniques applied to spam message cant be applied naively to phishing messages.

Page 5: Phishing

Facts about Phishing !6.1 Billion – Number of phishing e-mails sent world-wide each month.

$1,200 – Average loss to successfully phished person.

A new phishing scam is launched every two minutes.

Page 6: Phishing

What kinds of personal information do the thieves want?

◦Your name, address and date of birth◦Social Security number◦Driver’s License number◦Credit Card numbers◦ATM cards◦Telephone calling cards

Page 7: Phishing

Industries affected

Major industries affected are:

Financial Services ISPs Online retailers

Page 8: Phishing

The most websites

frequently attacked by phishers !

Page 9: Phishing

eBay Phishing Scam example

Page 10: Phishing

PayPal Phishing Scam example

Page 11: Phishing

Phishing step by step …

Page 12: Phishing

Effects of Phishing

Internet fraud Identity theft Financial loss to the original

institutions Erosion of Public Trust in the Internet.

Page 13: Phishing

Real stories

Page 14: Phishing

How to phish some web

site??

Page 15: Phishing
Page 16: Phishing
Page 17: Phishing

Be clever !

Page 18: Phishing

Be clever !

Page 19: Phishing

Be clever !

Page 20: Phishing

Be clever !

Page 21: Phishing

How to avoid phishing?

Think before you open, Never open suspicious emails.

Ensure that the web browser has the latest security patch applied.

Install latest anti-virus packages.

Verify the accounts and transactions regularlyNever submit credentials on forms embedded in emails.

Inspect the address bar and SSL certificate.

Page 22: Phishing

Good or Bad Site?

Page 23: Phishing

Good or Bad Site?

Page 24: Phishing

If I’ve been already phished ??

Take immediate action to protect your identity and

all of your online accounts.

Treat the situation like you lost your wallet or purse. Immediately contact all of your financial institutions, preferably by phone, and inform them of the situation. Go to every web site where you may have stored credit card and/or bank numbers and change the password at each web site

Choose a strong password that is significantly different from your old passwords.

Forward spam that is phishing for information to [email protected] and visit FTC’s

Page 25: Phishing

References

http://www.phishing.org/phishing-techniques/

http://en.wikipedia.org/wiki/Phishinghttp://www.youtube.comhttp://sarasota.ifas.ufl.edu/FCS/

phish_stories.pdf

Page 26: Phishing

Questions

Page 27: Phishing

Thanks for

attention