Free Essay

Phising and Hacking

In:

Submitted By abhra123
Words 1233
Pages 5
Content
1. Hacking & Phishing 2. What is hacking? 3. How hackers discover your PC’s address? 4. How does a firewall work? 5. What is Phishing? 5.1 Introduction 5.2 Types of Phishing 5.2.1 Clone Phishing 5.2.2 Spear Phishing 5.2.3 Phone Phishing

1. Hacking & Phishing
No, we're not talking about baiting the hook while you have a bad cold. Hacking and Phishing are two very different types of computer security threats. Hacking is an extremely y high tech attack which requires you to take certain precautions to protect your computer and al l of the data which is stored in it. Phishing, on the other hand, i s decidedly low tech and just requires a dose of common sense to ward off the dangers.

2. What is hacking?
Because the Internet is simply a network of computers that are al l tied together, every one of them (including yours) has the capability to "talk" to any other one. That means that a determined criminal can gain unauthorized zed entry to your PC once he knows your computer's "address". These criminal s are called "hackers".

3. How hackers discover your PC’s address?
Your computer l eaves its address al l over the Internet whenever it visits a web site. The addresses can be found in the log files which are automatically generated by every web server among other pl aces. Some hackers use what is known as "port scanning" software which simply goes out on the Internet and el electronically knocks" on the door of every connected computer it can find to see if any will them hi m in. Once a hacker gains access to your computer he can read anything that's stored on your hard drive. He can install programs which will monitor 9/15/13 Phishing & Hacking Attacks www.londonancestor.com/security /secure-pc.htm 2/5your key strokes and send sensitive passwords and user names back to hi s l air, and he can even get copies of your credit card and bank account numbers. Once a hacker gets this information he will proceed to steal you blind. How to protect yourself against hackers the best method is to use what i s known as a "firewall ". This is a piece of hardware, or software, or both which is designed to make your computer "invisible" on the Internet.

4. How does a firewall work?
A firewall works by blocking the "ports", or doors, which hackers commonly use to gain entrance. Once those ports are blocked the hacker can no longer "see" your computer and, thus, is unable to attack it. The new version of Windows XP comes with a built-in firewall program which may be al l that you need to keep your computer safe. Some cable modem and DSL providers al so configure your Internet modem to act as a firewall . In addition there are commercial firewalls available which run from simple to very sophisticated.

5. What is Phishing?
Phishing is a term that's applied to the l attest identify theft scam where potential thieves and con men use fake e-mail messages, which look very real sometimes, to con you into giving up credit card, bank and other sensitive financial and personal information. Once you give it up they proceed to clean you out and/or steal your identity and run up thousands of dollars worth of debt in your name. Al though some phishing excursions take pl ace over the telephone, where people cal l up and pretend to be someone that they are not, most of the attacks come in the way of e-mail messages. These messages look very official and purport to come form your bank, charge card company, brokerage house and even government agencies. These con men go to the website of the company or agency that they are impersonating, steal the graphics and logos and then proceed to put together an email which looks like it actually came from a valid source. The email may say that your account is about to be suspended unless you "verify" your personal information, or they may contain some other important or urgent-sounding request. What they al l have in common is that they require you to click on a link that's embedded in the email and then fill

out some form that asks for your PIN code, credit card number, bank account number, social security or tax ID and anything el se that they think that they can get away with asking you. Once they have that information - you're toast.

5.1 Introduction
Phishing is a form of social engineering in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users' condential or sensitive credentials by mimicking electronic communications from a trustworthy or public organization in an automated fashion. The word phishing" appeared around 1995, when Internet scammers were using email lures to \sh" for passwords and nancial information from the sea of Internet users; \ph" is a common hacker replacement of \f ", which comes from the original form of hacking, phreaking" on telephone switches during 1960s [16]. Early phishers copied the code from the AOL website and crafted pages that looked like they were a part of AOL, and sent spoofed emails or instant messages with a link to this fake web page, asking potential victims to reveal their passwords.

5.2 Types of Phishing
Phishing has spread beyond email to include VOIP, SMS, instant messaging, social networking sites, and even multiplayer games. Below are some major categories of phishing.

5.2.1 Clone Phishing
In this type phisher creates a cloned email. He does this by getting information such as content and recipient addresses from a legitimate email which was livered previously, then he sends the same email with links replaced by vicious ones. He also employs address sponge so that the email appears to be from the original sender. The email can claim to be a re-send of the original or an updated version as a trapping strategy .

5.2.2 Spear Phishing
Spear phishing targets at a specific group. So instead of casting out thousands of emails randomly, spear phishers target selected groups of people with something in common, for example people from the same organization. Spear phishing is also being used against high-level targets, in a type of attack called \whaling". For example, in 2008, several CEOs in the U.S. were sent a fake subpoena along with an attachment that would install malware when viewed. Victims of spear phishing attacks in late 2010 and early 2011 include the Australian Prime Minister's once, the Canadian government, the Epsilon mailing list service, HBGary Federal, and Oak Ridge National Laboratory .

5.2.3 Phone Phishing
This type of phishing refers to messages that claim to be from a bank asking users to dial a phone number regarding problems with their bank accounts. Traditional phone equipment has dedicated lines, so Voice over IP, being easy to manipulate, becomes a good choice for the phisher. Once the phone number, owned by the phisher and provided by a VoIP service, is dialed, voice prompts tell the caller to enter her account numbers and PIN. Caller ID spoon, which is not prohibited by law, can be used along with this so that the call appears to be from a trusted source .

Similar Documents

Premium Essay

Social Media and Business

...Social Media and Business Social media has always been a threat to not only security but also reputation of a business. Employees today have access to all kinds of social network sites to include Facebook, Myspace, Twitter, Instagram, online blogs, and many more. These sites are easily accessible to the user from their computer, tablets, and cellphones through various types of applications. Through my research I was able to find a trend in users using these media outputs to accidently leak information unintentionally and even intentionally. I found that any business can be susceptible to having data leaked and reputations tarnished from employees not handling social media correctly. I will cover this area of expertise, technology involved, future trends, security issues, some businesses involved, regulatory issues that arise, what business can do to handle social media, and global implications. When you consider what technology is being used most users will think of physical equipment. While this is the case that is the access medium that is used when thinking of social networking. Social media can be accessed in various ways to include your home computer, office computer if they allow you to view such sites, tablets, and your phone that could not be regulated depending on if it is a company phone. These access mediums must be regulated and users educated on the proper use of these devices. There are different types of online technologies that can be used to access social...

Words: 3437 - Pages: 14

Free Essay

Paul

...COMPUTER CRIMES A Case Study submitted in partial fulfilment of the requirements for the completion of the course in CIS401M: IT ETHICS AND LEADERSHIP Term 3, Academic Year 2014-2015 by LORETO V. SIBAYAN PAUL MATTHEW G. AVILA Master of Science in Information Technology College of Computer Studies April 2014 TABLE OF CONTENTS ABSTRACT 5 CHAPTER 1 1.0 INTRODUCTION 6 CHAPTER 2 2.0 OVERVIEW OF LITERATURE 8 2.1 CYBERCRIME 9 2.2 THEORIES OF CRIME 2.2.1 CRIMINOLOGICAL THEORIES 10 2.2.2 PSYCHOLOGICAL THEORIES 12 2.3 TYPES OF CRIME 14 2.3 CAUSES CYBERCRIME 19 2.4 CYBERCRIME PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime...

Words: 7997 - Pages: 32

Premium Essay

Soft Life Cycle

...Internship Report Excellence in Innovation MARKETING STRATEGY OF WEBSITE DESIGN & DEVELOPMENT FOR ASHIYAN GROUP Submitted to: Ms. Sohana Wadud Ahmad Submitted by: Internship Supervisor BBS Department Md. Ashif Minhaj BRAC University ID: 08104032 BBS Department BRAC University To Sohana Wadud Ahmad Lecturer (Internship Supervisor) BRAC Business School BRAC University Subject: Submission of Internship Report Dear Madam, It gives me enormous pleasure to submit the internship report on Marketing Strategy for Website Design & Development of Ashiyan Group as per your instruction. I expect this report to be informative as well as comprehensive. Working in Bengal Solutions Limited was an inspiring experience for me. I feel the immense knowledge and experience will facilitate me a lot in my future career life. With my limited knowledge, I have tried my level best to prepare the report worthwhile. Your acceptance and appreciation would surely inspire me. For any further explanations about the report, I will be gladly available to clarify the ins and outs. Sincerely Yours Md. Ashif Minhaj ID – 08104032 BBS Department BRAC University Marketing Strategy of Website Design & Development for Ashiyan Group Page 1 ACKNOWLEDGEMENT I have completed my internship in Bengal Solutions Limited at Mohakhali...

Words: 8739 - Pages: 35

Premium Essay

Real-Time Fraud Detection

...Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time...

Words: 56858 - Pages: 228

Premium Essay

Real-Time Fraud Detection: How Stream Computing Can Help the Retail Banking Industry

...Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time...

Words: 56858 - Pages: 228