Beruflich Dokumente
Kultur Dokumente
Phishing: Web Forgery (also known as “Phishing”) is a form of identity theft that
occurs when a malicious Web site impersonates a legitimate one in order to trick you
into giving up sensitive information such as passwords, account details, or credit card
numbers. Phishing attacks usually come from email messages that attempt to lure
the recipient into updating their personal information on fake, but very real looking,
Web sites. In the field of computer security, phishing is the criminally fraudulent
process of attempting to acquire sensitive information such as usernames, passwords
and credit card details by masquerading as a trustworthy entity in an electronic
communication. Communications purporting to be from popular social web sites,
auction sites, online payment processors or IT administrators are commonly used to
lure the unsuspecting public. Phishing is typically carried out by e-mail or instant
messaging,[1] and it often directs users to enter details at a fake website whose look
and feel are almost identical to the legitimate one. Phishing is a technique used to
gain personal information for purposes of identity theft, using fraudulent e-mail
messages that appear to come from legitimate businesses. These authentic-looking
messages are designed to fool recipients into divulging personal data such as
account numbers and passwords, credit card numbers and Social Security numbers.
4. VISHING: Vishing is the criminal practice of using social engineering over the
telephone system, most often using features facilitated by Voice over IP (VoIP), to
gain access to private personal and financial information from the public for the
purpose of financial reward. The term is a combination of "voice" and phishing.
Vishing exploits the public's trust in landline telephone services, which have
traditionally terminated in physical locations known to the telephone company, and
associated with a bill-payer. The victim is often unaware that VoIP makes formerly
difficult-to-abuse tools/features of caller ID spoofing, complex automated systems
(IVR), low cost, and anonymity for the bill-payer widely available. Vishing is typically
used to steal credit card numbers or other information used in identity theft schemes
from individuals.The typical vishing scam makes use of Voice over Internet protocol
(VoIP), which allows people to talk over their computer lines, and can allow for
multiple dialings of numbers at the same time. Scammers may work from a list of
regional phone numbers or even from a phone book, but what they mainly do is call
everyone they can and leave an automated message saying the person’s credit card
or bank account has been compromised, depleted or closed. When this process is
done by email it’s called phishing, instead of vishing
5. TRAPPING
6. MALWAR
7. FARMING
8. SMITING
9. DUMPSTER DIVING
10. SPOOFING
11. CLICK JACKING
12. TAB NAPPING
14. Synonyms: - are different words with almost identical or similar meanings.
Words that are synonyms are said to be synonymous, and the state of being a
synonym is called synonymy. For e.g. Student & Pupil are synonyms.
01-12-2010