Page 394 - IT 402 v2.0 class 10
P. 394

  Acknowledgment:   enerally   the  cyber  criminals  don t  know  the  names  of  targets  except  the  e-mail
           addresses   so  they  use   ust  a  part  of  the  targeted  e-mail  address   in  the  salutation  or  a  uses  general
           salutation.


         i erence  et een S oofing and P is ing
        Following are the differences between spoofing and phishing:
                                S oofing                                        Phishing

             Hacker tries to steal the identity to act as     Hacker tries to steal the sensitive information of
             another individual.                              the user.
             It doesn t re uire fraud.                        It is operated in a fraudulent manner.

             Information is not theft.                        Information is theft.

             Spoofing can be part of  phishing.                hishing can t be part of the spoofing.
             Hacker needs to download some malicious
                                                              No such malicious software is needed.
             software in victim computer.

             Spoofing is basically done to get a new identity.   hishing is done to get secret information.
              ypes: I  Spoofing   -mail Spoofing               ypes:  hone  hishing   lone  hishing  etc.
             Spoofing  etc.


            BEST PRACTICES FOR WEB SECURITY

        Let us discuss some of the best practices that we need to follow while working on the Internet.
        Identity Protection
        Students   ould you like to reveal your personal information to a person who can make fun of your personality
        or has a bad habit of mocking  Surely not   So  while browsing Internet  be alert so that your personal identity
        is not revealed to such people.

         Identity  rotection  refers to safety practices to prevent the theft of personal information such as social media
        profiles  bank details  address  credit card  passports  driving licenses  etc.  by other person.

        Protect Username and Password
        One needs to ensure that his/her user name, password, credit card or online banking information are secure
        as they are prone to be tracked by unauthorised users.

        A user should never save username or password on the computers which are used in a shared environment
        such as at Internet cafes. The web browsers may save the personal data on the local computer that can be
        accessed by another user using the same computer.

        Do not share Personal Information
         e cautious while filling up the forms  responding to calls  pretending to be legitimate  that ask your name
         O   bank details  etc.  anks never ask your  ser I   pin or password over the phone or via e-mail.
        Secure Online Transactions

         uring certain transactions  some information such as credit card details or personal information is sent over
        the network. Therefore, it is always recommended to use only secure websites for doing such transactions.
        Always verify whether the website you are using, keeps transactions secure or not.



         392       Touchpad Information Technology-X
   389   390   391   392   393   394   395   396   397   398   399