How Safe Are We?. Submitted By: Daniel Trifan Samantha Hill Samantha Kanterjian Christina Vitale. How SAFE are WE?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Submitted By: Daniel Trifan Samantha Hill
Samantha Kanterjian Christina Vitale
Phishingis similar to what it sounds like. It is used by criminals to gain access to your information. They use a ‘fishing line’ – an e-mail, ‘bait’ – a business you trust or a seemingly sincere statement, and try to ‘reel’ you into giving out personal or financial information. They could use this information to open bank accounts or credit card accounts in your name and withdraw money or make expensive purchases.
∙ Phishing is achieved through e-mails that are sent out in mass amounts. They may seem legitimate because they take logos and information from actual businesses and create websites that appear to be safe.
∙They will try to get you to give out your personal information using techniques within the website and e-mail. It could even be through an actual business you may have an account or customer relationship with that they are posing as.