1 / 9

PHISING

PHISING. Krit Chandrema. Members. 1.Krit Chandrema M.2/1 No.1 2.Supakan Chirathitipong M.2/1 No.10 3.Jirasak Akkawatthanakul M.2/1 No.18 4.Parit Prompantjai M.2/1 No.27. Krit Chandrema. What is the meaning of Phishing.

jules
Download Presentation

PHISING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PHISING KritChandrema

  2. Members • 1.Krit Chandrema M.2/1 No.1 • 2.Supakan Chirathitipong M.2/1 No.10 • 3.Jirasak AkkawatthanakulM.2/1 No.18 • 4.Parit Prompantjai M.2/1 No.27 KritChandrema

  3. What is the meaning of Phishing • Phishing is a way of attempting to acquire sensitive information such as usernames,passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. This is similar to Fishing, where the fisherman puts a bait at the hook, thus, pretending to be a genuine food for fish. But the hook inside it takes the complete fish out of the lake. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mailspoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. ParitPrompantjai

  4. What is the purpose of Phishing • the purpose of phishing is to get information from Inspect all commercial email messages carefully before responding. Identity theft is a common and expensive form of crime.you that can be used for identity theft. JirasakAkkawatthanakul

  5. KritChandrema

  6. Step to Phishing • 1.The thief will send you a email but its look real • 2.The thief will ask you important information • 3.And the thief will has your account KritChandrema

  7. Disadvantages of Phishing phishing has only disadvantage • Disadvantage is a Learning to detect phishing emails As reported in most toolbars are lucky to get 85% accuracy identifying phishing websites.Accuracy aside, there are both ad- vantages disadvantages to toolbars when compared to emailfiltering. The first disadvantage toolbars face when compared to email filtering. SupakanChirathitipong

  8. Conclusion • I think that phishing is a bad way to do because phishing is the way to get another info such as email and password or another word for phishing is hacking and use another info to do bad things. KritChandrema

  9. Thank you for your concentration !!!

More Related