Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Transcript of Phishing
Universal law of nature
No privacy illogical
Principle of the end in itself
design by Dóri Sirály for Prezi
By Darian Barvecho, Chris Childs, Travis Helton, Megan Whited
What Is Phishing?
1. Real Life Story of Phishing
2. How Phishing Works
3. How to Avoid Phishing
Aaron, Greg and Rod Rasmussen. "Global Phishing Survey"
APWG Industry Advisory
. Anti-Phishing Work Group, Inc. 18 Sep. 2013. Web. 26 Nov. 2013
. Symantec Corporation. n.d. Web. 24 Nov. 2013
"U.S Colleges and Universities Become a Favored Target for Phishing."
. EMC Corporation. 24 Feb. 2010. Web. 20 Nov. 2013
"What is Phishing."
. OpenDNS, Inc. n.d. Web. 20 Nov. 2013
Brandt, Andrew. "THE 10 BIGGEST SECURITY RISKS You Don't Know About. (Cover Story)." PC World 24.8 (2006): 76-88. Academic Search Complete. Web. 25 Nov. 2013.
Nadhe, Shivani. "India Fourth Most Targeted Company by Phishing Attacks."
Business Standard Technology
. Business Standard Ltd. 02 Dec. 2013. Web. 02 Dec. 2013.
. Netcraft Ltd. 13 Dec. 2012. Web. 02 Dec. 201
Warren, Steven. "12 Steps to Avoid Phishing Scams." TechRepublic. CBS Interactive, n.d. Web. 02 Dec. 2013.3
The scammer or phisher sends their message in one of these common forms:
Phishing is an illicit attempt at gaining important, secured information using computing technology.
What Kind of Information Could Be Compromised?
Phishing scams always ask for private, personal information like:
Account names and passwords
Bank account information
Credit card information
Social Security number
Other sensitive information
How Common Is Phishing?
An organization called Anti-Phishing Work Group, whose mission is to fight cyber crime, gave these statistics for phishing in the first half of 2013:
Fraudulent Web Sites
Other Insecure Mediums
Phishing messages usually contain one or more of these traits:
Pretending to be a legitimate company
Asking for sensitive information through insecure mediums
Using scare tactics or emotional appeal
Other unprofessional dialect
Computer security company RSA's statistics show colleges have become popular targets since 2010.
At least 72,758 phishing attacks occurred
720 different businesses or institutions were targeted, Paypal being the most common
Phishing Ethical Analysis
Our goal is to inform college students of the hazardous possibilities phishing can cause and ways to stay aware, while avoiding threats because this is becoming common, even at Miami.
"2 Nigerians suspected to be part of online phishing racket arrested." The Times Of India. Times Of India, 13 Sept. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-09-13/coimbatore/42039846_1_phishing-racket-city-police-nre-account>.
Kaviraj, Sharat. "Jeweller duped of Rs 7.5 lakh in phishing." The Times Of India. Times Of India, 21 Oct. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-10-21/jaipur/43249721_1_debit-card-cyber-police-station-7-50-lakh>.
Madann, Neha. "Apple phishing attacks up, warns Kaspersky Lab." The Times Of India. Times Of India, 7 July 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-07-07/security/40420556_1_kaspersky-lab-phishing-sites>.
PTI. "'India faced over 40 phishing attacks daily in Jan-Jun'." The Times Of India. Times Of India, 22 Aug. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-08-22/security/41436888_1_phishing-rsa-emc>.
Madann, Neha. "67% of all emails in August were unsolicited: Kaspersky." The Times Of India. Times Of India, 29 Sept. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-09-29/internet/42501267_1_messages-kaspersky-lab-phishing>.
"What is PhishMe?." PhishMe. N.p., n.d. Web. 20 Nov. 2013. <http://phishme.com/product-services/what-is-phishme/>.
"Report Phishing Sites." Incident Reporting System. N.p., n.d. Web. 20 Nov. 2013. <http://www.us-cert.gov/report-phishing>.