Page 452 - Using MIS
P. 452

Guide






            PhIShInG for CredIt CardS, IdentIfyInG

            nuMberS, bank aCCountS



            A phisher is an individual or organization that spoofs   phishers copy the entire look and feel of a legitimate com-
            legitimate companies in an attempt to illegally capture per-  pany’s Web site.
            sonal  data  such as  credit  card  numbers,  email accounts,   In this exercise, you and a group of your fellow students
            and driver’s license numbers. Some phishers install mali-  will be asked to investigate phishing attacks. If you search
            cious program code on users’ computers as well.      the Web for phishing, be aware that your search may bring
               Phishing is usually initiated via email. Phishers steal   the attention of an active phisher. Therefore, do not give any
            legitimate logos and trademarks and use official-sounding   data to any site that you visit as part of this exercise!
            words in an attempt to fool users
            into revealing personal data or
            clicking a  link.  Phishers do  not
            bother with laws about trade-
            mark use. They place names
            and logos like Visa, MasterCard,
            Discover, and American Express
            on their Web pages and use
            them as bait. In some cases,

















                                                                                                Source: Carlos_bcn/Fotolia





















        420
   447   448   449   450   451   452   453   454   455   456   457