1. TittlE :
PhishinG
Group name:
Shom wei yong(captain)
Yun youliang
Kavi
Toh jun hou
2. Contents !!
* How they Attack ??
* What Is Phishing ??
* How To Detect ??
* Example
* Damage Caused By Phishing.
* Conclusion.
*Sources Of References.
3. What Is Phishing
* Phishing is defines as the
fraudulent acquisition of personal
information by tricking an
individual into believing the
attacker is a trustworty entity this
is normally done throught email
and an instant message.
4. How they attack…
•Most attacks of phishing use some form of
technical deception designed to make a link
in an email appear to belong to the spoofed
organization . Misspelled URLs or the use of
subdomains are common trick used by
phishers,
hhttp://www.maybank.home.com/
* One method of spoofing links used web
addresses containing the @ symbol, which
were used include username and password
in a web URL
5. How To DETecT
* Is is actually very noticeable. You will see misspelled
URLs .One way seeing discovering @ in the web adresses
e.g.
http:/www.hotmail.com@members.com
* Some web browers such as Mozilla and internet
Explorer has closed this off while Opera gives a warning
and an optain to get off the website. In another popular
method of phishing, an attacker uses a bank or other
services website scripts on the victim. These types of
atack known as crosssite scripting.
6. DAMAGE CAUSED BY pHISHING
•The damage caused by phishing ranges from
loss of access to email to substantail
financial loss. This style of identity thefy is
becoming more popular,because of the ease
with which unsuspecting people often
divulge personal information to
phishers,including credit card number,sosial
security number anf miothers maiden names.
*There are also fears that identify theives
can obtain some such information they need
and want the phishers will use that person’s
detail to create fake account using the
victims name, using up a persons credit or
even the victim from accesssing their own
acounts.
7. Conclusion !!
* Phishing e-mails are only a small aspet of the
overall phishing economy and until now, the only
aspet seen by the most people. The phishing
economy is a decentralized and self-organized
sosial network of merchants and consumers
governed by laws of supply and demand. This
clearer picture of the landscape, the players, and
insight into phishing operations will hopefully assist
in the fight against online fraud.