SlideShare uma empresa Scribd logo
1 de 19
Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
What is Cybercrime? 	“Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . 	From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words  “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
Phishing Map
Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 :  Basil Y. Alothman 083153 :  SudadMuamarmuammar 071190 :  Mohammed SiddiqAlRais 061028 :  Khalid Abdulla alqaraibanalmuhairi 071002 :  Akram M. EleyanAkram 071337 :  Fatma Mohamed Bin Ghubash Al ma 061393 :  FatmaJassimAlbastaki 044011 :  Mohammed I. FarhoodAlboreesha 041036 :  ZiadAdnanAbdo
Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form .  Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name.  Good Luck & Regards,  Dr. Mathew Nicho 
How people get protected ?
Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
Never Trust TinyURL.com links !!
Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security  locker SSL Only shop with vendors you trust to  avoid to be an victim .
Use Internet VISA CARD.
References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL  Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman
Thanks You.. 

Mais conteúdo relacionado

Mais procurados

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Phishing
PhishingPhishing
PhishingSyahida
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic The TNS Group
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 

Mais procurados (20)

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phising
PhisingPhising
Phising
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Destaque

BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet
 
LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox BlueHornet
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1BlueHornet
 
Implementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideImplementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideBlueHornet
 
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...BlueHornet
 
Use Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueUse Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueBlueHornet
 
Preventing the "Oops!" Email
Preventing the "Oops!" EmailPreventing the "Oops!" Email
Preventing the "Oops!" EmailBlueHornet
 
BlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet
 
Using Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessUsing Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessBlueHornet
 
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet
 
Social media, technology and advocacy
Social media, technology and advocacySocial media, technology and advocacy
Social media, technology and advocacyDana Bacon
 
Presentacio desafio stem
Presentacio desafio stemPresentacio desafio stem
Presentacio desafio stemjosglods
 
Five Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseFive Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseBlueHornet
 
Solucion examen termodinamica
Solucion examen termodinamicaSolucion examen termodinamica
Solucion examen termodinamicajosglods
 

Destaque (16)

BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
 
LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1
 
Implementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideImplementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical Guide
 
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
 
Use Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueUse Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive Revenue
 
Preventing the "Oops!" Email
Preventing the "Oops!" EmailPreventing the "Oops!" Email
Preventing the "Oops!" Email
 
BlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMA
 
Using Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessUsing Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing Effectiveness
 
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
 
Social media, technology and advocacy
Social media, technology and advocacySocial media, technology and advocacy
Social media, technology and advocacy
 
Presentacio desafio stem
Presentacio desafio stemPresentacio desafio stem
Presentacio desafio stem
 
Ransart Boot
Ransart  BootRansart  Boot
Ransart Boot
 
Cookston Portfolio
Cookston PortfolioCookston Portfolio
Cookston Portfolio
 
Five Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseFive Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy Database
 
Solucion examen termodinamica
Solucion examen termodinamicaSolucion examen termodinamica
Solucion examen termodinamica
 

Semelhante a Phishing

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesOluwatobi Olowu
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1YanelysRuiz1
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 

Semelhante a Phishing (20)

cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
123.pptx
123.pptx123.pptx
123.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh
 
Facebook
FacebookFacebook
Facebook
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 

Último

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Último (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Phishing

  • 1. Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
  • 2. What is Cybercrime? “Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
  • 3. What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
  • 4. What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
  • 6. Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
  • 7.
  • 8.
  • 9.
  • 10. Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 : Basil Y. Alothman 083153 : SudadMuamarmuammar 071190 : Mohammed SiddiqAlRais 061028 : Khalid Abdulla alqaraibanalmuhairi 071002 : Akram M. EleyanAkram 071337 : Fatma Mohamed Bin Ghubash Al ma 061393 : FatmaJassimAlbastaki 044011 : Mohammed I. FarhoodAlboreesha 041036 : ZiadAdnanAbdo
  • 11. Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form . Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name. Good Luck & Regards, Dr. Mathew Nicho 
  • 12.
  • 13. How people get protected ?
  • 14. Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
  • 16. Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security locker SSL Only shop with vendors you trust to avoid to be an victim .
  • 18. References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman

Notas do Editor

  1. Those Listing of my gathering information from university of Dubai class I gather this information from website as I know that from the website the E-mail must start with: s00000@ud.ac.ae