Phishing Technology And Its Effect To The Frauds

Read Complete Research Material



Phishing technology and its effect to the frauds

by

ACKNOWLEDGEMENT

I would like to thank Stillianos Vidalis for the support and guidance given throughout this project and the entirety of my study. I would also like to thank Andrew Bellamy for his support, advice, encouragement and humour during the last few years- thank you for continuously making me smile! Finally, many thanks to the rest of the academic staff who have also supported me throughout my course, your help and advice will always be appreciated.

Signature: _______________________________

Date: __________________________

DECLARATION

I, [name of the author], hereby declare the best of my knowledge, the entire contents of this thesis represent my real job, and that such a thesis was submitted prior to any academic research or other qualifications. In addition, he represents his own personal opinions and do not have anything to do with them at university.

Signed: __________________. Date: _________________.

Abstract

Phishing attack is the criminally fraudulent procedure of attempting to acquire sensitive information such as usernames, credit card details and passwords by masquerading as a truthful entity in the online activity. Phishing is a deceitful email that attempts to get you to disclose personal information that is able to be used for criminal purposes. There are various differences on this method. It is probably to Phish for other sensitive data in additions to user names and passwords such as national insurance numbers, credit card numbers, bank account numbers and mother's maiden names. Phishing attack presents direct risks throughout the make use of the stolen credentials and indirect risk to institutions that carry out business on line throughout reducing of customer confidence. The destruction caused by the Phishing attack ranges from denial of accessing to email to extensive financial loss. In this report I will also concerned with anti Phishing techniques. There are some different techniques to fighting Phishing attack, plus legislation and technology created specially to defend against Phishing. Anti Phishing software and computer programs are planned to avoid the amount of Phishing and trespass on user's confidential information. Anti Phishing software is considered to follow web sites and monitor actions any mistrustful behaviour can be mechanically reported, includes how discovering Phishing attacks, how to avoid and keep away from being scammed, how to counter when you expect or disclose a Phishing attack and what you can do to help stopping this attack.

TABLE OF CONTENTS

ACKNOWLEDGEMENT1

DECLARATION2

ABSTRACT3

CHAPTER 01: INTRODUCTION1

1.1 Aim2

1.2 Delimitations2

1.3 Research Question3

1.4 Refined Set of Research Questions3

1.5 hypotheses Outline and Writing Conventions4

CHAPTER 02: WHAT IS PHISHING?5

2. What is phishing5

2.2Why phishing work7

2.3 Phishing process7

2.3.1 The Phish”lure”8

2.3.2 The Bite9

2.3.3 The Catch9

2.4 Spear phishing10

2.4.1 How do Spear Phishing Attacks Work?10

2.4.2 How to Prevent Spear Phishing Attacks11

CHAPTER 03: LITERATURE REVIEW12

Figure 1 APWG Report13

Table1 shows decrease has occurred despite a continuing rise in phishing attacks, up to 21% from 200914

2-Anatomy to Email Spam14

3-Examination of a phishing message15

Figure 2 shows phishing email structure16

4-Email Headers16

5-Email Content:17

5-1- Contents cover is designed17

Figure 3 shows phishing Email example18

6-Examination of Phishing Website19

Figure 4 shows paypal FAKE website20

Figure 5 shows MSN Credential phishing via a SCAM20

7-Anti phishing goals and Techniques solutions21

This approaches used ...
Related Ads
  • Phishing
    www.researchomatic.com...

    Phishing Phishing Introduction Digital technologies ...

  • Effect Of Phishing On Ind...
    www.researchomatic.com...

    The main focus of the research is on "Identity Theft ...

  • Technology: New Crimes
    www.researchomatic.com...

    Technology : New Crimes, Technology : Ne ...

  • Phishing
    www.researchomatic.com...

    Phishing Phishing Introduction Internet fraud includ ...

  • Human Computer Interaction
    www.researchomatic.com...

    It's provided people a chance for busines ...