Page 24 - Security Threats new3
P. 24
▪ Instead, organizations must take a layered approach to reduce the number of
attacks and lessen their impact when they do occur.
▪ Network security technologies that should be implemented include email and
web security, malware protection, user behavior monitoring, and access
control.
Causes of Phishing
➢ Misleading e-mails
➢ No check of source address
➢ Limited use of digital signatures
➢ Vulnerability in browsers
➢ Lack of user awareness
➢ Vulnerability in applications
➢ No strong authentication at websites of banks and financial institutions
Effects of Phishing
➢ Internet fraud
➢ Identity theft
➢ Financial loss to the original institutions
➢ Difficulties in Law Enforcement Investigations
➢ Erosion of Public Trust in the Internet
Conclusions
➢ No single technology will completely stop phishing.
➢ However, a combination of good organization and practice, proper application
of current technologies, and improvements in security technology has potential
to drastically reduce the prevalence of phishing and the losses suffered from it.