Académique Documents
Professionnel Documents
Culture Documents
Name
Class
Group
memb
er
4T1
CONTENT
Introduction
What is phishing?
How they attack?
How to detect?
Example
What should I do If I think Ive Received a
Phishing Email?
Conclusion
Source of References
INTRODUCTION
Phishing is popular with cybercriminals, as it is
far easier to trick someone into clicking a
malicious link in a seemingly legitimate email
than trying to break through a computers
defenses.
WHAT IS PHISHING?
Phishing is a form of fraud in which the attacker
tries to learn information such as a reputable
entity or person in email, IM or other
communication channels.
HOW TO DETECT?
It is actually very noticeable. You will see
misspelled URLs. One way seeing it is
discovering @ in the web addresses e.g.
http://www.hotmail.com@members.com.
Some web browsers such as Mozilla and
Internet Explorer has closed this off while Opera
gives a warning and an option to get off the
website. In another popular method of phishing,
an attacker uses a bank or other services
website scripts on the victim. These types of
attack known ad cross-site scripting.
EXAMPLE I
EXAMPLE II
EXAMPLE III
CONCLUSION
Phishing e-mails are only a small aspect of the
overall phishing economy and until now, the
only aspect seen by the most people.
The phishing economy is a decentralized and
self-organized social network of merchants and
consumers governed by laws of supply and
demand. This clearer picture of the landscape,
the players, and insight into phishing operations
will hopefully assist in the fight against online
fraud.
SOURCE OF REFERENCES
Website
https://en.wikipedia.org/wiki/phishing
www.webopedia.com/TERM/P/phishing.html
Searchsecurity.techtarget.com/definition/phishing
Book
Phishing and Countermeasures: Understanding
the Increasing Problem of Electronic Identity
Theft.
Edited by Markus Jakobsson.
End.. ^_^
Presented by :
Nurul
Ain
Natasy
a
4T1
ICT