1 / 11

Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu

Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu. Outline. Threats to Identity Theft Phishing Definition Methods Pharming Definition Methods Safeguards Project aims. Identify Theft. Two major Identity theft threats Aim at stealing personal sensitive data

Download Presentation

Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Phishing & Pharming Methods and SafeguardsBaber Aslam and Lei Wu

  2. Outline • Threats to Identity Theft • Phishing • Definition • Methods • Pharming • Definition • Methods • Safeguards • Project aims

  3. Identify Theft • Two major Identity theft threats • Aim at stealing personal sensitive data • ID & password • Passport information • SSN • Bank account numbers • Credit card numbers • etc

  4. Statistical Highlights for 2nd Half, 2008 Phishing Activity Trends Report, 2nd Half 2008

  5. Statistical Highlights for 2nd Half, 2008 Phishing Activity Trends Report, 2nd Half 2008

  6. Phishing

  7. Methods / Techniques • Misspelled URLs • (http://www.eccs.ucf.edu/account) • Spoofing URLs (http://www.google.com@members.hacker.com) • Javascript • International Domain Names

  8. Pharming

  9. Methods / Techniques • Email Viruses • Alters the computer’s host file • DNS Poisoning • Nothing on computer changes • The company’s website is “hijacked” • Web Cache Poisoning • Drive-by pharming

  10. Safeguards • Specialized “Anti-Phishing” Software • Spam filters • Multifactor authentication • Challenge Questions • Secure connections • DNS protection

  11. Proposal The project aims at studying the methods of Phishing and Pharming, and analyzing the effectiveness of the safeguards against these methods.

More Related