0% found this document useful (0 votes)
78 views8 pages

Understanding Phishing Threats

Phishing involves masquerading as a trustworthy entity to steal sensitive information like usernames, passwords, and credit card details. It is typically done through email or instant messaging. The damage from phishing can range from lost access to accounts to substantial financial loss if a victim's details are used illegally. Phishing methods evolve and may involve misleading emails appearing to come from banks or other organizations asking for personal data to be entered on fake websites. An example email aims to trick the recipient into revealing information by requesting confirmation on the phisher's website rather than the actual organization's site.

Uploaded by

Fakhrul Danial
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views8 pages

Understanding Phishing Threats

Phishing involves masquerading as a trustworthy entity to steal sensitive information like usernames, passwords, and credit card details. It is typically done through email or instant messaging. The damage from phishing can range from lost access to accounts to substantial financial loss if a victim's details are used illegally. Phishing methods evolve and may involve misleading emails appearing to come from banks or other organizations asking for personal data to be entered on fake websites. An example email aims to trick the recipient into revealing information by requesting confirmation on the phisher's website rather than the actual organization's site.

Uploaded by

Fakhrul Danial
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

IMPACT OF ICT SOCIETY

“PHISHING”
NAME : taufiq hidayat b. sa’ari

Class:4 bestari
WHAT IS PHISHING ?
Phishing is a way of attempting to acquire
sensitive information such as usernames,
passwords and credit card details by
masquerading as a trustworthy entity in
an electronic communication.
Communications purporting to be from
popular social web sites, auction sites,
online payment processors or IT
administrators are commonly used to lure
the unsuspecting public. Phishing is
typically carried out by e-mail or
instant messaging
DAMAGE CAUSE BY
PHISHING ..
The damage caused by phishing ranges
from loss of access to email to substantial
financial loss. the phishers may use a
person's details to create fake accounts in
a victim's name, ruin a victim's credit, or
even prevent victims from accessing their
own accounts
METHOD OF PHISHING ..
Varying methods of phishing attempts
are detected and the methods are
constantly evolving. Email purportedly
from Internal Revenue Services, well
known banks, credit card companies,
social networking websites,
= etc. asking the user to provide sensitive
data (login name, password, email id, etc.)
of the receiver was one such method.
Yet another method was use of a
computer worm that take over the website
pages and visitors to that web pages are
misdirected to other pages with the intent
of stealing personal data.
EXAMPLE OF PHISHING ..
An example of a phishing e-mail, disguised
as an official e-mail from a (fictional) bank.
The sender is attempting to trick the
recipient into revealing confidential
information by "confirming" it at the
phisher's website. Note the misspelling of
the words received and discrepancy. Such
mistakes are common in most phishing
emails. Also note that although the URL of
the bank's webpage appears to be
legitimate, it actually links to the phisher's
webpage.
CONCLUSION ..
 I was very graceful because I can finish
my presentation
I was very happy because I can know
more about phishing.
SOURCE
 http
://en.wikipedia.org/wiki
/phishing

You might also like