Sie sind auf Seite 1von 9

ICT Project

Done By : Fatma Bader Al Khalili Grade 10 B

ICT Project Content

Phishing History And Current Status Phishing Techniques Explain Other Techniques Evil Twins

ICT Project Phishing

Phishing :
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

ICT Project History And Current Status


History A phishing technique was described in detail, in a paper and presentation delivered to the International HP Users Group, Interex.The first recorded mention of the term "phishing" is found in the hacking tool AOHell (according to its creator), which included a function for stealing the passwords of America Online users.

Current Status
A recent and popular case of phishing is the suspected Chinese phishing campaign targeting Gmail accounts of highly ranked officials of the United States and South Koreans Government, military, and Chinese political activists.[10] The Chinese government continues to deny accusations of taking part in cyber-attacks from within its borders, but evidence has been revealed that Chinas own Peoples Liberation Army has assisted in the coding of cyber-attack software.

ICT Project Phishing Techniques

Regular Phishing As I Explained In The Beginning.

1 - Phishing 2 - Spear Fishing 3 - Clone Phishing 4 - Whaling

ICT Project Photos

Spear Fishing

Clone Phishing

Whaling

Targeted versions of phishing have been termed spearphishing.

When an email is sent including a fake attachment.

Phishing within Business, or high profile targets.

ICT Project Other Techniques

Whaling

Phishing

Spear Phishing

Phishin g
Evil Twins Clone Phishing

ICT Project Evil Twins

Evil Twins
Evil twins is a phishing technique that is hard to detect. A phisher creates a fake wireless network that looks similar to a legitimate public network that may be found in public places such as airports, hotels or coffee shops. Whenever someone logs on to the bogus network, fraudsters try to capture their passwords and/or credit card information.

ICT Project The End

The End
Done By: Fatma Bader Al Khalili Grade: 10 / B Teacher: Duha Haider

Das könnte Ihnen auch gefallen