ipl-logo

Assignment On Phishing

946 Words4 Pages

CS 507 (Assignment No 2)

Part I
(PHISHING)

1. Phishing. Phishing is an attempt to acquire sensitive information such as usernames, passwords and credit card details for malicious reason by masquerading as a trustworthy entity in an electronic communication.
2. How it Affect / Attack.
a. Emails may contain links to Websites that are infected with Malware.
b. It is typically carried out by Email sporting or instant messaging.
c. It directs users to fake Website, whose looks and feelings are almost identical to the legitimate one.
d. It is social engineering techniques used to deceive users.
e. Risk is large in social media i.e Facebook, Twitter & Google+.
f. Phishing can also be done through telephone by sending fake message from bank …show more content…

Scareware. It is a form of malicious software that uses social engineering to cause shock, anxiety or the perception of a threat in order to manipulate users into buying unwanted software. It is a part of a class of malicious software that includes rogue security software. Some forms of Spyware and Adware also use Scareware tactics. A frequent tactics used by criminals involves convincing users that a virus has infected their computer, than suggesting that they download (and pay for) fake antivirus software to remove it. Usually the virus is entirely fictional and the software is non fictional or Malware …show more content…

Cloud. It is basically the collection of computers on the internet that companies are using to offer their services, it is revolutionary storage method for your data. It is convenient and cost effective. It works by storing your files on a server and in the internet somewhere rather than on your local hard drive. This allows you to back up, sync and access your data across multiple devices as long as they have internet capability.
8. How Cloud can be helpful in keeping online data Devices
a. Encrypt the Data Before Putting it on the Cloud. Download a cloud protection application password and generate secret key sequences to your files before you actually upload them to the cloud.
b. Backup Data. Besides having data in the cloud, we should also have manual backup data in an external physical storage drive / device.
c. Avoid Storing Sensitive Information. Avoid storing sensitive data / top secret files in the cloud, as a real privacy on internet is doubtful.
d. Local Encryption of Data. Whenever choosing cloud storage services always look for one that offers local encryption for your data. This provides an additional layer of security.
e. Cloud Service Provider. Read their term and conditions thoroughly.
f. Password. Following should be kept in mind while selecting passwords:-
i. Good password be selected. ii. Don’t reuse

More about Assignment On Phishing

Open Document