Lecture7_Email_And_Web

Lecture7_Email_And_Web - ITP 125 Email & Web nastiness...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
ITP 125 Email & Web nastiness
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
• E-mail • Phishing Motivation • Identity Theft • Web Threats Overview
Background image of page 2
• Arguably one of the most popular and prolific communication mediums today • First e-mail sent in 1972 • Estimated 55 billion emails sent in 2006 Estimation today is over 100 billion 95% is SPAM! Email
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
• Computer Viruses Self-replicating computer programs Originally spread via floppy disks Email is a much easier way to propagate viruses Term coined by Fred Cohen, a USC PhD student! • Trojan Any program that is hidden within another Nastiness in e-mail
Background image of page 4
• Worm Self-propagating worm Examples: Blaster, SQL Slammer • SPAM = unsolicited commercial e-mail Monty Python Other nastiness
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
• S/MIME Encrypting e-mail Nobody uses it anymore • PGP Public Key Infrastructure You have a private and a public key Publish the public key Sign with your private key, encrypt with someone else‟s public key Encryption and Signatures
Background image of page 6
• The act of luring a victim to divulge his/her financial and/or personal information • Part of Social Engineering Collection of techniques used to manipulate people into performing certain actions • Normally done through fraudulent e-mails E-mail will appear to be from a trusted source, when really it is sent from a malicious attacker Phishing
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
• Money Millions of victims every year Losses are reaching the billions • Easy to set up Hacking software can set up a phishing website in a few minutes Washington Mutual is a default template in the tool
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/21/2011 for the course ITP 125 taught by Professor Greenfield during the Spring '11 term at USC.

Page1 / 22

Lecture7_Email_And_Web - ITP 125 Email & Web nastiness...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online