Page 393 - IT 402 v2.0 class 10
P. 393

mail S oofing
             -mail spoofing occurs when an attacker uses an e-mail message to trick a recipient into thinking that it came
            from a known and/or trusted source. These e-mails may include links to malicious websites or attachments
            infected with malware.

            Sender information is easy to spoof and can be done in one of two ways:
              Mimicking a trusted e-mail address or domain by using alternate letters or numbers to appear only slightly
              different than the original.

               isguising the  From  field to be the exact e-mail address of a known and or trusted source.

              at S oofing
             hen a computer system or a user of a computer mas uerades to be another identity while engaging in chat
            is known as chat spoofing.

            Other spoofing methods are I  address spoofing    S spoofing   NS spoofing  and     spoofing.
            Phishing

             hishing attacks are the social-engineering practice of sending fraudulent communications that appear to
            come from an authentic source. It is usually done through e-mail. The goal is to steal sensitive data like credit
            card and login credentials or to install malware on the victim’s machine.
























            Although some phishing e-mails are poorly written and clearly fake. But, some cyber miscreants send links in
            the e-mail that may install malware on the user’s device or direct the user to a wicked website for extracting
            personal and financial information.
            Some common types of phishing attacks are phone  spear and clone phishing.

            Detecting a Phishing E-mail
            Following can act as hints to detect  hishing  -mail:
              Spelling and Unusual Grammar: Cyber criminals generally make grammar and spelling mistakes because
              they use dictionary too often to convert in a specific language. If you notice such mistakes in an e-mail  it
              might be a scam.

              E-mail Links: Some links in the e-mail are usually with unknown    s.  o verify  take the mouse  but don t
              click  over the link to see if the address matches the link that was typed in the message. Some links may
              also forward to .exe  or  ip files.  hese are known to install malicious software.




                                                                       Web Security and Workplace Safety       391
   388   389   390   391   392   393   394   395   396   397   398