Page 452 - Using MIS
P. 452
Guide
PhIShInG for CredIt CardS, IdentIfyInG
nuMberS, bank aCCountS
A phisher is an individual or organization that spoofs phishers copy the entire look and feel of a legitimate com-
legitimate companies in an attempt to illegally capture per- pany’s Web site.
sonal data such as credit card numbers, email accounts, In this exercise, you and a group of your fellow students
and driver’s license numbers. Some phishers install mali- will be asked to investigate phishing attacks. If you search
cious program code on users’ computers as well. the Web for phishing, be aware that your search may bring
Phishing is usually initiated via email. Phishers steal the attention of an active phisher. Therefore, do not give any
legitimate logos and trademarks and use official-sounding data to any site that you visit as part of this exercise!
words in an attempt to fool users
into revealing personal data or
clicking a link. Phishers do not
bother with laws about trade-
mark use. They place names
and logos like Visa, MasterCard,
Discover, and American Express
on their Web pages and use
them as bait. In some cases,
Source: Carlos_bcn/Fotolia
420