SlideShare una empresa de Scribd logo
1 de 19
Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
What is Cybercrime? 	“Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . 	From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words  “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
Phishing Map
Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 :  Basil Y. Alothman 083153 :  SudadMuamarmuammar 071190 :  Mohammed SiddiqAlRais 061028 :  Khalid Abdulla alqaraibanalmuhairi 071002 :  Akram M. EleyanAkram 071337 :  Fatma Mohamed Bin Ghubash Al ma 061393 :  FatmaJassimAlbastaki 044011 :  Mohammed I. FarhoodAlboreesha 041036 :  ZiadAdnanAbdo
Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form .  Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name.  Good Luck & Regards,  Dr. Mathew Nicho 
How people get protected ?
Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
Never Trust TinyURL.com links !!
Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security  locker SSL Only shop with vendors you trust to  avoid to be an victim .
Use Internet VISA CARD.
References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL  Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman
Thanks You.. 

Más contenido relacionado

La actualidad más candente

Phishing
PhishingPhishing
Phishing
Syahida
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
Dawn Hicks
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 

La actualidad más candente (20)

What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Gone Phishing Infographic
Gone Phishing Infographic Gone Phishing Infographic
Gone Phishing Infographic
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phising
PhisingPhising
Phising
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Destacado

LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox
BlueHornet
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1
BlueHornet
 

Destacado (16)

BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar Series: Part 6 of...
 
LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox LCMC: Gmail tabbed inbox
LCMC: Gmail tabbed inbox
 
LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1LCMC: Email movers and shakers - Part 1
LCMC: Email movers and shakers - Part 1
 
Implementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical GuideImplementing Responsive Email Design - A Tactical Guide
Implementing Responsive Email Design - A Tactical Guide
 
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
Bare Escentuals’ Daily Deal Emails Increase Sales by 118% During Retail’s Bus...
 
Use Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive RevenueUse Email Marketing and Social Media Together to Drive Revenue
Use Email Marketing and Social Media Together to Drive Revenue
 
Preventing the "Oops!" Email
Preventing the "Oops!" EmailPreventing the "Oops!" Email
Preventing the "Oops!" Email
 
BlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMABlueHornet Presentation to San Diego AMA
BlueHornet Presentation to San Diego AMA
 
Using Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing EffectivenessUsing Social Email to Improve Enterprise Email Marketing Effectiveness
Using Social Email to Improve Enterprise Email Marketing Effectiveness
 
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
BlueHornet's 2014 Consumer Views of Email Marketing Webinar 4 of 6: Email & P...
 
Social media, technology and advocacy
Social media, technology and advocacySocial media, technology and advocacy
Social media, technology and advocacy
 
Presentacio desafio stem
Presentacio desafio stemPresentacio desafio stem
Presentacio desafio stem
 
Ransart Boot
Ransart  BootRansart  Boot
Ransart Boot
 
Cookston Portfolio
Cookston PortfolioCookston Portfolio
Cookston Portfolio
 
Five Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy DatabaseFive Keys to List Growth: Building a Healthy Database
Five Keys to List Growth: Building a Healthy Database
 
Solucion examen termodinamica
Solucion examen termodinamicaSolucion examen termodinamica
Solucion examen termodinamica
 

Similar a Phishing

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
esksaints
 

Similar a Phishing (20)

cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
123.pptx
123.pptx123.pptx
123.pptx
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh Presentation on cyber crimes. By Dr Sushma Singh
Presentation on cyber crimes. By Dr Sushma Singh
 
Facebook
FacebookFacebook
Facebook
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Digital dangers pp1
Digital dangers pp1Digital dangers pp1
Digital dangers pp1
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Phishing

  • 1. Basel ALOthman Phishing helping you gain the professional relationships, knowledge and expertise to support you throughout your career and advance the profession as a whole.
  • 2. What is Cybercrime? “Cybercrime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web” . From Oxford Dictionary Cyber “cyber - /sib r/   • combining form relating to information technology, the Internet, and virtual reality: cyberspace.   — ORIGIN from CYBERNETICS.
  • 3. What is Phishing ? Phishing is “an attempt to gain personal or financial information from an individual”. or in another words “is the act of sending an E-mail that falsely claims to be from a bank or other E-commerce enterprise”.
  • 4. What is Spear Phishing? That applies to any highly targeted phishing attack . In another words “a spear phisher sends a message that appears to be from an employer, a colleague, or other legitimate correspondent, to a small group, or even one specific person”.
  • 6. Phishing used almost for financial fraud ! 8th October 2009 “The Largest International Phishing Case Ever Conducted” The criminals used phishing to get access to hundreds of bank accounts, stealing $1.5 million. US and Egyptian authorities have charged 100 people ( 53 defendants from California, Nevada and North Carolina – 47 Authorities in Egypt charged.
  • 7.
  • 8.
  • 9.
  • 10. Dr. Mathew Nicho  Information Security ITGN345 Sec.01 044029 : Basil Y. Alothman 083153 : SudadMuamarmuammar 071190 : Mohammed SiddiqAlRais 061028 : Khalid Abdulla alqaraibanalmuhairi 071002 : Akram M. EleyanAkram 071337 : Fatma Mohamed Bin Ghubash Al ma 061393 : FatmaJassimAlbastaki 044011 : Mohammed I. FarhoodAlboreesha 041036 : ZiadAdnanAbdo
  • 11. Facebook Phishing ITGN345 Sec.01 Dear Info. Sec. Students, There are 4 students got zero (0/10) in the assignment mark because of plagiarism. Some students copied and pasted from each other. Others copied from the internet. For this reason some of you will find his/her mark is low. 10 marks were lost which affects your final grade. However, all of you passed except those students because they didn’t fill up this form . Please add me on my facebook and send me your details with full name and ID number mobiles phones that I can contact you Full name Date of Birth Drivers License Number Current and previous addresses & Employers Mothers Maiden Name. Good Luck & Regards, Dr. Mathew Nicho 
  • 12.
  • 13. How people get protected ?
  • 14. Your Organization / Bank / University WILL NEVER ASK YOU FOR YOUR PASSWORDS!! Don’t put your Sensitive DATA into your E-mail
  • 16. Never Enter your CREDIT CARD if the website doesn’t start with https:// or doesn’t have the security locker SSL Only shop with vendors you trust to avoid to be an victim .
  • 18. References http://www.issa.org http://www.AoIR.org http://www.UD.ac.ae http://www.FaceBook.com http://www.youtube.com http://www.TinyURL.com http://www.nytimes.com http://www.washingtonpost.com http://www.antiphishing.org/crimeware.html http://www.phishtank.com CYBERCRIME by DAVID S. WALL Hack In The Box Conference 2010 Oxford Dictionary Principles of Information Security Book Third Edition by Dr.Michael E. Whitman

Notas del editor

  1. Those Listing of my gathering information from university of Dubai class I gather this information from website as I know that from the website the E-mail must start with: s00000@ud.ac.ae