Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu

Preview:

DESCRIPTION

Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu. Outline. Threats to Identity Theft Phishing Definition Methods Pharming Definition Methods Safeguards Project aims. Identify Theft. Two major Identity theft threats Aim at stealing personal sensitive data - PowerPoint PPT Presentation

Citation preview

Phishing & Pharming Methods and Safeguards

Baber Aslam and Lei Wu

Page 2

Outline

Threats to Identity Theft Phishing

– Definition

– Methods Pharming

– Definition

– Methods Safeguards Project aims

Page 3

Identify Theft

Two major Identity theft threats Aim at stealing personal sensitive data

– ID & password

–Passport information

–SSN

–Bank account numbers

–Credit card numbers

–etc

Page 4

Statistical Highlights for 2nd Half, 2008

Phishing Activity Trends Report, 2nd Half 2008

Page 5

Statistical Highlights for 2nd Half, 2008

Phishing Activity Trends Report, 2nd Half 2008

Page 6

Phishing

Page 7

Methods / Techniques

Misspelled URLs – (http://www.eccs.ucf.edu/account)

Spoofing URLs (http://www.google.com@members.hacker.com)

Javascript International Domain Names

Page 8

Pharming

Page 9

Methods / Techniques

Email Viruses–Alters the computer’s host file

DNS Poisoning–Nothing on computer changes

–The company’s website is “hijacked” Web Cache Poisoning Drive-by pharming

Page 10

Safeguards

Specialized “Anti-Phishing” Software Spam filters Multifactor authentication Challenge Questions Secure connections DNS protection

Page 11

The project aims at studying the methods of Phishing and Pharming, and analyzing the effectiveness of the safeguards against these methods.

Proposal