7/04/2008

Phishing

1 The phishers needs to do the phishing such as passwords and credit cards details, by masquerading as a trustworthy person or business in an electronic comunication.

2 cross site scripting scripting is an attacker uses a bank or service’s own scripts against the victim, these types of attacks are particularly problematic

3 the methods of phishing use some form of tecnical deceptiondesigned to make a link in an email appear to belong to the spoofed organization

4 the damage of phishing are ranges from loss of access to email to substantial financial loss

5 the first recorded mention of phishing is on the alt.online-service.american-online usenet newsgroup on january 2,1996

6 some information can be used in doing phishing are personal information such as credit card numbers, social security numbers, and mother’s maiden names

7 yes,because the phisher can direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct

8 phishing work by masquerading as a trustworthy person or business in an alectronic comunication and the phishing use some from of technicaldeception designed to make a link in email appear to belong to the spoofed organization

9 phishing is a lot of criminals caused many damage, becaused the phisher can direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct

10 the target of phishing is the users