SlideShare uma empresa Scribd logo
1 de 19
Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
What is Cybercrime? 	“Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . 	From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words  “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
Phishing Map
Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 :  Basil Y. Alothman 083153 :  SudadMuamarmuammar 071190 :  Mohammed SiddiqAlRais 061028 :  Khalid Abdulla alqaraibanalmuhairi 071002 :  Akram M. EleyanAkram 071337 :  Fatma Mohamed Bin Ghubash Al ma 061393 :  FatmaJassimAlbastaki 044011 :  Mohammed I. FarhoodAlboreesha 041036 :  ZiadAdnanAbdo
Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form .  Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name.  Good Luck & Regards,  Dr. Mathew Nicho 
How people get protected ?
Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
Never Trust TinyURL.com links !!
Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security  locker SSL Only shop with vendors you trust to  avoid to be an victim .
Use Internet VISA CARD.
References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL  Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman
Thanks You.. 

Mais conteúdo relacionado

Mais procurados

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Phishing
PhishingPhishing
PhishingSyahida
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic The TNS Group
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 

Mais procurados (20)

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phising
PhisingPhising
Phising
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Destaque

BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet
 
LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox BlueHornet
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1BlueHornet
 
Implementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideImplementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideBlueHornet
 
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...BlueHornet
 
Use Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueUse Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueBlueHornet
 
Preventing the "Oops!" Email
Preventing the "Oops!" EmailPreventing the "Oops!" Email
Preventing the "Oops!" EmailBlueHornet
 
BlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet
 
Using Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessUsing Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessBlueHornet
 
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet
 
Social media, technology and advocacy
Social media, technology and advocacySocial media, technology and advocacy
Social media, technology and advocacyDana Bacon
 
Presentacio desafio stem
Presentacio desafio stemPresentacio desafio stem
Presentacio desafio stemjosglods
 
Five Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseFive Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseBlueHornet
 
Solucion examen termodinamica
Solucion examen termodinamicaSolucion examen termodinamica
Solucion examen termodinamicajosglods
 

Destaque (16)

BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
 
LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1
 
Implementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideImplementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical Guide
 
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
 
Use Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueUse Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive Revenue
 
Preventing the "Oops!" Email
Preventing the "Oops!" EmailPreventing the "Oops!" Email
Preventing the "Oops!" Email
 
BlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMA
 
Using Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessUsing Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing Effectiveness
 
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
 
Social media, technology and advocacy
Social media, technology and advocacySocial media, technology and advocacy
Social media, technology and advocacy
 
Presentacio desafio stem
Presentacio desafio stemPresentacio desafio stem
Presentacio desafio stem
 
Ransart Boot
Ransart  BootRansart  Boot
Ransart Boot
 
Cookston Portfolio
Cookston PortfolioCookston Portfolio
Cookston Portfolio
 
Five Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseFive Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy Database
 
Solucion examen termodinamica
Solucion examen termodinamicaSolucion examen termodinamica
Solucion examen termodinamica
 

Semelhante a Phishing

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesOluwatobi Olowu
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1YanelysRuiz1
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 

Semelhante a Phishing (20)

cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
123.pptx
123.pptx123.pptx
123.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh
 
Facebook
FacebookFacebook
Facebook
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 

Último

Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 

Último (20)

Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 

Phishing

  • 1. Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
  • 2. What is Cybercrime? “Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
  • 3. What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
  • 4. What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
  • 6. Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
  • 7.
  • 8.
  • 9.
  • 10. Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 : Basil Y. Alothman 083153 : SudadMuamarmuammar 071190 : Mohammed SiddiqAlRais 061028 : Khalid Abdulla alqaraibanalmuhairi 071002 : Akram M. EleyanAkram 071337 : Fatma Mohamed Bin Ghubash Al ma 061393 : FatmaJassimAlbastaki 044011 : Mohammed I. FarhoodAlboreesha 041036 : ZiadAdnanAbdo
  • 11. Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form . Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name. Good Luck & Regards, Dr. Mathew Nicho 
  • 12.
  • 13. How people get protected ?
  • 14. Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
  • 16. Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security locker SSL Only shop with vendors you trust to avoid to be an victim .
  • 18. References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman

Notas do Editor

  1. Those Listing of my gathering information from university of Dubai class I gather this information from website as I know that from the website the E-mail must start with: s00000@ud.ac.ae