Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Phishing

No description
by

Noah Richards

on 16 February 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Phishing

Phishing What is Phishing? Phishing is when someone sends an E-mail claiming to be a false enterprise. It is an attempt to scam the person who opened the E-mail to get personal information. Examples: passwords, social security, etc. What harm phishing can cause It directs them to a false website where they are asked to update their personal information such as passwords, credit card numbers, social security, and bank account numbers. Criminals use websites that they send by email to make you believe it is a trusted site. The criminals will try to steal your identity. How the Malware works Criminals use the web to scam you out of your passwords and other information through false websites that make you think it can be trusted. When you get to the website you click a button claiming to be downloading a false file, but really it takes your personal information and other goods without you knowing. Most of the time, your computer will process slower because of the malware. Why would people utilize this Malware? People often believe information sent by E-mail. The thing is that it is really easy for criminals to disguise their email or websites. A lot of times it is done through hijacked browsers. Three top threats for phishing Amazon, Facebook, and EBay are the top phishing threats. How to prevent or remove the Malware You can go to certain websites and go through a filter to remove the malware from your computer. The website will filter bad websites and clean URL lists. Life lock is a program you could join to protect your personal files and identity. Works Cited
Carey, Dachary. http://www.life123.com/career-money/credit-debt/internet-scams/what-is-phishing.shtml. ND ND ND. 7 February 2013.
http://en.wikipedia.org/wiki/Phishing. ND ND ND. 7 February 2013.
http://www.oit.umn.edu/safe-computing/topics/phishing-scams/index.htm. ND ND ND. 7 February 2013.
http://www.webopedia.com/TERM/P/phishing.html. ND ND ND. 7 February 2013. Quiz 1.) Sending an email claiming to be a legitimate establishment through directing you to a website that asks for personal information such as bank account numbers, social security, passwords, and credit card numbers.
A.) Phishing
B.) Trojan Horse
C.) Computer Worm
2.)Why would someone want to use phishing?
A.)To be mean
B.)To download a virus
C.)To gain personal information
D.)To shut down your computer
3.)What one is one of the top threats of phishing?
A.)Facebook
B.)Google
C.)Bing
4.)What program can you join to protect your identity.
A.)LifeSaver
B.)LifeLock
C.)Keep-it-Safe
5.)True/False
___ Anyone can use phishing? Video Answers 1. A
2. C
3. A
4. B
5. True Quiz
Full transcript