Page 394 - IT 402 v2.0 class 10
P. 394
Acknowledgment: enerally the cyber criminals don t know the names of targets except the e-mail
addresses so they use ust a part of the targeted e-mail address in the salutation or a uses general
salutation.
i erence et een S oofing and P is ing
Following are the differences between spoofing and phishing:
S oofing Phishing
Hacker tries to steal the identity to act as Hacker tries to steal the sensitive information of
another individual. the user.
It doesn t re uire fraud. It is operated in a fraudulent manner.
Information is not theft. Information is theft.
Spoofing can be part of phishing. hishing can t be part of the spoofing.
Hacker needs to download some malicious
No such malicious software is needed.
software in victim computer.
Spoofing is basically done to get a new identity. hishing is done to get secret information.
ypes: I Spoofing -mail Spoofing ypes: hone hishing lone hishing etc.
Spoofing etc.
BEST PRACTICES FOR WEB SECURITY
Let us discuss some of the best practices that we need to follow while working on the Internet.
Identity Protection
Students ould you like to reveal your personal information to a person who can make fun of your personality
or has a bad habit of mocking Surely not So while browsing Internet be alert so that your personal identity
is not revealed to such people.
Identity rotection refers to safety practices to prevent the theft of personal information such as social media
profiles bank details address credit card passports driving licenses etc. by other person.
Protect Username and Password
One needs to ensure that his/her user name, password, credit card or online banking information are secure
as they are prone to be tracked by unauthorised users.
A user should never save username or password on the computers which are used in a shared environment
such as at Internet cafes. The web browsers may save the personal data on the local computer that can be
accessed by another user using the same computer.
Do not share Personal Information
e cautious while filling up the forms responding to calls pretending to be legitimate that ask your name
O bank details etc. anks never ask your ser I pin or password over the phone or via e-mail.
Secure Online Transactions
uring certain transactions some information such as credit card details or personal information is sent over
the network. Therefore, it is always recommended to use only secure websites for doing such transactions.
Always verify whether the website you are using, keeps transactions secure or not.
392 Touchpad Information Technology-X

