Preview

Phishing Attack

Powerful Essays
Open Document
Open Document
4826 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Phishing Attack
CHAPTER 1 INTRODUCTION

In the field of computer security, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is a fraudulent e-mail that attempts to get you to divulge personal data that can then be used for illegitimate purposes. There are many variations on this scheme. It is possible to Phish for other information in additions to usernames and passwords such as credit card numbers, bank account numbers, social security numbers and mothers’ maiden names. Phishing presents direct risks through the use of stolen credentials and indirect risk to institutions that conduct business on line through erosion of customer confidence. The damage caused by Phishing ranges from denial of access to e-mail to substantial financial loss.

[pic] Fig 1.1 the simplified flow of information in a Phishing attack
1. A deceptive message is sent from the Phishers to the user.
2. A user provides confidential information to a Phishing server (normally after some interaction with the server).
3. The Phishers obtains the confidential information from the server.
4. The confidential information is used to impersonate the user.
5. The Phishers obtains illicit monetary gain. Steps 3 and 5 are of interest primarily to law enforcement personnel to identify and prosecute Phishers. The discussion of technology countermeasures will center on ways to disrupt steps 1, 2 and 4, as well as related technologies outside the information flow proper.

CHAPTER 2 PHISHING TECHNIQUES

Phishers use a wide variety of techniques, with one common thread.

LINK MANIPULATION Most methods of Phishing use some form of technical deception designed to make a link in an e-mail appear to belong to the spoofed organization. Misspelled URLs or the use of sub



Bibliography: [1] http://en.wikipedia.org/ [2] http://webopedia.com/ [3] http://computerworld.com/ [4] http://www.anti-phishing.info/ [5] http://lorrie.cranor.org/ ----------------------- Not the real address bar Not the proper domain for peoples.com

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    intrusion was a result of spear phishing campaign, which typically involves sending a seemingly genuine…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    b. __Phishing____ occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit, communications, PR, marketing, the Web group, customer service and legal services.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in today’s Internet world?…

    • 1087 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Identity Theft Q&A

    • 402 Words
    • 2 Pages

    When an identity thief calls or emails you pretending to be someone else in order to get your personal information.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging, and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Deceptive Phishing Attacks

    • 1051 Words
    • 5 Pages

    “Phishing” is when cybercriminals try to get personal information like credit card numbers to steal money and passwords to important accounts. They can get this information from you and your computer. They can do it through emails, text messages, phone calls even. There are many techniques and styles attackers use to get this information out of people.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    DQ4: How might you explain to a friend who is not technically savvy what phishing is and how it can be avoided? What are five tips you would provide to help your friend avoid phishing?…

    • 385 Words
    • 2 Pages
    Good Essays