Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI...

14
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL

Transcript of Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI...

Page 1: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

Presented by :

PhishingIdentity Theft

Supervised by :

Mr M. ABDELLAOUIAfaf DAHMANIAmal ATMANIImane ALLAL

Page 2: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

PlanWhat’s «  Identity Theft» ?What’s « Phishing »?Identity Theft FormsHow to protect yourself from phishing?

Conclusion

Page 3: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

What’s «  Identity Theft»?

Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

More than 9 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name. You may not find out about the theft until you review your credit report or a credit card statement and notice charges you didn’t make—or until you’re contacted by a debt collector.

Page 4: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

What’s «  Identity Theft» ?

Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.

Page 5: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

What’s « Phishing » ?

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Page 6: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

Identity Theft Forms

Credit / Financial Driver’s LicenceSocial SecurityCharacter / CriminalMedicalSynthetic

Page 7: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

How to protect yourself from phishing?

What does a phishing scam look like?What does a phishing Web site or link

look like?How can I protect myself from

phishing scams?

Page 8: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

How to protect yourself from phishing?

Page 9: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

How to protect yourself from phishing?

The phrases to look for in the phishing e-mail message

"Verify your account." "You have won the lottery." "If you don't respond within 48 hours,

your account will be closed."  

Page 10: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

How to protect yourself from phishing?

The kind of phrase you might see in an e-mail message

"Click the link below to gain access to your account.“

Example of a masked Web address

Page 11: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

How to protect yourself from phishing?

The address "www.microsoft.com" could appear instead as:www.micosoft.com www.mircosoft.com www.verify-microsoft.com

Page 12: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

How to protect yourself from phishing?

How can I protect myself from phishing scams?

Keep your operating system up to date, and install up-to-date antivirus and antispyware software.

Internet Explorer 7 and the Microsoft Phishing Filter

Page 13: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

Conclusion

Page 14: Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.

Thank you for your

attention