0% found this document useful (0 votes)
39 views

By Khairi Hazim Bin Zainal Abidin 4 Epsilon

Phishing involves attempting to acquire sensitive information like usernames, passwords, and credit card details by masquerading as a trustworthy entity. It is typically done through email or instant messaging that direct users to fake websites. Techniques include link manipulation to disguise URLs and subdomains. To prevent phishing, users should install antivirus software, avoid unrecognized senders and websites from spam, not enter information in pop-ups, and never email financial info. Being aware of phishing techniques can help protect important information.

Uploaded by

Khairi Hazim
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

By Khairi Hazim Bin Zainal Abidin 4 Epsilon

Phishing involves attempting to acquire sensitive information like usernames, passwords, and credit card details by masquerading as a trustworthy entity. It is typically done through email or instant messaging that direct users to fake websites. Techniques include link manipulation to disguise URLs and subdomains. To prevent phishing, users should install antivirus software, avoid unrecognized senders and websites from spam, not enter information in pop-ups, and never email financial info. Being aware of phishing techniques can help protect important information.

Uploaded by

Khairi Hazim
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

By

Khairi Hazim Bin Zainal Abidin


4 Epsilon
Content
• What is Phishing
• Technique of Phishing
• Anti-Phishing
• Tips to prevent
• Conclusion
• Reference
What is Phishing?
• In the field of computer security, phishing is the criminally fraudulent process of
attempting to acquire sensitive information such as usernames, passwords and credit
card details by masquerading as a trustworthy entity in an electronic communication.
Communications purporting to be from popular social web sites, auction sites, online
payment processors or IT administrators are commonly used to lure the unsuspecting
public. Phishing is typically carried out bye-mail or instant messaging, and it often
directs users to enter details at a fake website whose look and feel are almost
identical to the legitimate one. Phishing is an example of social
engineering techniques used to fool users,  and exploits the poor usability of current
web security technologies. Attempts to deal with the growing number of reported
phishing incidents include legislation, user training, public awareness, and technical
security measures.
• A phishing technique was described in detail in 1987, and the first recorded use of
the term "phishing" was made in 1996. The term is a variant of fishing , probably
influenced by phreaking , and alludes to baits used to "catch" financial information
and passwords.
Technique of Phishing
There are many type of technique such as :

 Link manipulation
Most methods of phishing use some form of technical deception
designed to make a link in an e-mail.
  Misspelled URLs or the use of subdomains are common tricks used
by phishers too.
Anti-Phishing

There are several different techniques to combat phishing, including legislation and technology created specifically to
protect against phishing . Most new internet browsers come with anti-phishing software such as :

 Avira Premium Security Suite -


 Norton 360
 Norton Internet Security
 McAfee SiteAdvisor
 Reasonable Software's Anti-phishing Software
 GeoTrust TrustWatch
 Phishtank SiteChecker
 Gralicwrap free anti-phishing software tool
 Kaspersky Internet Security
 ESET Smart Security
 PineApp Mail-SeCure.
Tips to prevent from Phishing.

One of the easiest way is you should install an


anti-virus on your computer.
Never click on website that come from spam or
unrecognized sender.
Never enter personal information in a pop-up
screen. 
Never email personal or financial
information, even if you are close with the
recipient.
Conclusion

The conclusion is that we should beware of


phishing because it may stole our important
information like financial , password and
other…
Reference
 www.wikipedia.com
 http://
www.webopedia.com/TERM/P/phishing.htm
l
 http://searchsecurity.techtarget.com/sDefiniti
on/0,,sid14_gci916037,00.html

You might also like