Page 453 - Using MIS
P. 453

Your Order ID: “17152492”
             Order Date: “09/07/12”
             Product Purchased: “Two First Class Tickets to Cozumel”
             Your card type: “CREDIT”
             Total Price: “$349.00”
             Hello, when you purchased your tickets you provided an
               incorrect mailing address.
             See more details here
             Please follow the link and modify your mailing address
             or cancel your order. If you have questions, feel free to
              contact us account@usefulbill.com

            Figure 1
            Fake Phishing Email                                    Figure 2
                                                                   Fake Phishing Screen












                        DisCussion Questions



            1.  To learn the fundamentals of phishing, visit the following   phishing symptom that you find in these two figures and
              site:  www.microsoft.com/protect/fraud/phishing/symp-  explain why it is a symptom.
              toms.aspx. To see recent examples of phishing attacks,   3.  Suppose you work for an organization that is being
              visit www.fraudwatchinternational.com/phishing/.     phished.
              a.  Using examples from these Web sites, describe how   a.  How would you learn that your organization is being
                 phishing works.                                      attacked?
              b.  Explain why a link that appears to be legitimate, such   b.  What steps should your organization take in response
                 as www.microsoft.mysite.com may, in fact, be a link to   to the attack?
                 a phisher’s site.                                 c.  What liability, if any, do you think your organiza-
              c.  List five indicators of a phishing attack.          tion has for damages to customers that result
              d.  Write an email that you could send to a friend or rela-  from a phishing attack that carries your brand and
                 tive who is not well versed in technical matters that   trademarks?
                 explains what phishing is and how that person can   4.  Summarize why phishing is a serious problem to com-
                 avoid it.                                         merce today.
            2.  Suppose you received the email in Figure 1 and mistak-  5.  Describe actions that industry organizations, compa-
              enly clicked See more details here. When you did so, you   nies, governments, or individuals can take to help re-
              were taken to the Web page shown in Figure 2. List every   duce phishing.



                                                                                                                 421
   448   449   450   451   452   453   454   455   456   457   458