Page 24 - Security Threats new3
P. 24

▪  Instead, organizations must take a layered approach to reduce the number of

                     attacks and lessen their impact when they do occur.

                  ▪  Network security technologies that should be implemented include email and

                     web  security,  malware  protection,  user  behavior  monitoring,    and  access

                     control.





            Causes of Phishing



              ➢  Misleading e-mails
              ➢  No check of source address
              ➢  Limited use of digital signatures
              ➢  Vulnerability in browsers

              ➢  Lack of user awareness
              ➢  Vulnerability in applications
              ➢  No strong authentication at websites of  banks and financial institutions



            Effects of Phishing




              ➢  Internet fraud
              ➢  Identity theft
              ➢  Financial loss to the original institutions
              ➢  Difficulties in Law Enforcement Investigations
              ➢  Erosion of Public Trust in the Internet


            Conclusions



                ➢  No single technology will completely stop phishing.
                ➢  However, a combination of good organization and practice, proper application
                    of current technologies, and improvements in security technology has potential
                    to drastically reduce the prevalence of phishing and the losses suffered from it.
   19   20   21   22   23   24   25   26   27   28