Page 393 - IT 402 v2.0 class 10
P. 393
mail S oofing
-mail spoofing occurs when an attacker uses an e-mail message to trick a recipient into thinking that it came
from a known and/or trusted source. These e-mails may include links to malicious websites or attachments
infected with malware.
Sender information is easy to spoof and can be done in one of two ways:
Mimicking a trusted e-mail address or domain by using alternate letters or numbers to appear only slightly
different than the original.
isguising the From field to be the exact e-mail address of a known and or trusted source.
at S oofing
hen a computer system or a user of a computer mas uerades to be another identity while engaging in chat
is known as chat spoofing.
Other spoofing methods are I address spoofing S spoofing NS spoofing and spoofing.
Phishing
hishing attacks are the social-engineering practice of sending fraudulent communications that appear to
come from an authentic source. It is usually done through e-mail. The goal is to steal sensitive data like credit
card and login credentials or to install malware on the victim’s machine.
Although some phishing e-mails are poorly written and clearly fake. But, some cyber miscreants send links in
the e-mail that may install malware on the user’s device or direct the user to a wicked website for extracting
personal and financial information.
Some common types of phishing attacks are phone spear and clone phishing.
Detecting a Phishing E-mail
Following can act as hints to detect hishing -mail:
Spelling and Unusual Grammar: Cyber criminals generally make grammar and spelling mistakes because
they use dictionary too often to convert in a specific language. If you notice such mistakes in an e-mail it
might be a scam.
E-mail Links: Some links in the e-mail are usually with unknown s. o verify take the mouse but don t
click over the link to see if the address matches the link that was typed in the message. Some links may
also forward to .exe or ip files. hese are known to install malicious software.
Web Security and Workplace Safety 391

