Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Phishing

No description
by

Darian .

on 3 December 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Phishing

Kantianism
Universal law of nature
Stealing illogical
No privacy illogical
Principle of the end in itself
Those phished
Companies impersonated
Phishing
design by Dóri Sirály for Prezi
Start
By Darian Barvecho, Chris Childs, Travis Helton, Megan Whited
Step 1
What Is Phishing?
Step 2
1. Real Life Story of Phishing
2. How Phishing Works
3. How to Avoid Phishing
Goal
Phishing
Works Cited
Aaron, Greg and Rod Rasmussen. "Global Phishing Survey"
APWG Industry Advisory
. Anti-Phishing Work Group, Inc. 18 Sep. 2013. Web. 26 Nov. 2013
"Phishing."
Norton
. Symantec Corporation. n.d. Web. 24 Nov. 2013
"U.S Colleges and Universities Become a Favored Target for Phishing."
RSA Blogs
. EMC Corporation. 24 Feb. 2010. Web. 20 Nov. 2013
"What is Phishing."
PhishTank
. OpenDNS, Inc. n.d. Web. 20 Nov. 2013
Brandt, Andrew. "THE 10 BIGGEST SECURITY RISKS You Don't Know About. (Cover Story)." PC World 24.8 (2006): 76-88. Academic Search Complete. Web. 25 Nov. 2013.
Nadhe, Shivani. "India Fourth Most Targeted Company by Phishing Attacks."
Business Standard Technology
. Business Standard Ltd. 02 Dec. 2013. Web. 02 Dec. 2013.
"Phisiest Countries."
Netcraft
. Netcraft Ltd. 13 Dec. 2012. Web. 02 Dec. 201
Warren, Steven. "12 Steps to Avoid Phishing Scams." TechRepublic. CBS Interactive, n.d. Web. 02 Dec. 2013.3
How Does
Phishing Work?
The scammer or phisher sends their message in one of these common forms:
Phishing is an illicit attempt at gaining important, secured information using computing technology.
What Kind of Information Could Be Compromised?
Phishing scams always ask for private, personal information like:
Account names and passwords
Bank account information
Credit card information
Social Security number
PIN numbers
Addresses
Other sensitive information
How Common Is Phishing?
An organization called Anti-Phishing Work Group, whose mission is to fight cyber crime, gave these statistics for phishing in the first half of 2013:
(PhishTank)
Emails
Fraudulent Web Sites
Fraudulent Links
Instant Messages
Other Insecure Mediums
Phishing messages usually contain one or more of these traits:
(Norton)

Pretending to be a legitimate company
Asking for sensitive information through insecure mediums
Using scare tactics or emotional appeal
Other unprofessional dialect
(Aaron, RSA)
(Norton, PhishTank)
Computer security company RSA's statistics show colleges have become popular targets since 2010.
At least 72,758 phishing attacks occurred
720 different businesses or institutions were targeted, Paypal being the most common
Info Invasion
Step 3
Phishing Ethical Analysis
Act Utilitarianism
Unhappiness
Those phished
Companies involved
Technology users
PHISHING =
UNETHICAL
Happiness
The phisher/scammer
Cultural Relativism
(Netcraft, Nadhe)
Our goal is to inform college students of the hazardous possibilities phishing can cause and ways to stay aware, while avoiding threats because this is becoming common, even at Miami.
Currently
"2 Nigerians suspected to be part of online phishing racket arrested." The Times Of India. Times Of India, 13 Sept. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-09-13/coimbatore/42039846_1_phishing-racket-city-police-nre-account>.
Kaviraj, Sharat. "Jeweller duped of Rs 7.5 lakh in phishing." The Times Of India. Times Of India, 21 Oct. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-10-21/jaipur/43249721_1_debit-card-cyber-police-station-7-50-lakh>.
Madann, Neha. "Apple phishing attacks up, warns Kaspersky Lab." The Times Of India. Times Of India, 7 July 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-07-07/security/40420556_1_kaspersky-lab-phishing-sites>.
PTI. "'India faced over 40 phishing attacks daily in Jan-Jun'." The Times Of India. Times Of India, 22 Aug. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-08-22/security/41436888_1_phishing-rsa-emc>.
Madann, Neha. "67% of all emails in August were unsolicited: Kaspersky." The Times Of India. Times Of India, 29 Sept. 2013. Web. 20 Nov. 2013. <http://articles.timesofindia.indiatimes.com/2013-09-29/internet/42501267_1_messages-kaspersky-lab-phishing>.
"What is PhishMe?." PhishMe. N.p., n.d. Web. 20 Nov. 2013. <http://phishme.com/product-services/what-is-phishme/>.
"Report Phishing Sites." Incident Reporting System. N.p., n.d. Web. 20 Nov. 2013. <http://www.us-cert.gov/report-phishing>.
Works Cited
Full transcript