anti-phishing-software

anti-phishing-software - Anti-Phishing Software Presented...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Anti-Phishing Software Presented by: Aaron Smalls, Michelle Mature, Devin Biggers Overview 1. Background 2. Research 3. Motivation 4. Our Project Outline 5. Raw Data + Calculations 6. Analysis of our work 7. Conclusions 8. Future Work 9. Reference Background What is phishing? o Phishing is a form of online information or identity theft whose purpose is to acquire sensitive information such as online banking credentials or credit card information from individuals o Entices users to involuntarily and unknowingly provide sensitive information for the attackers personal gain Research Looked at an experiment from the article "Why Phishing Works" 22 participants 7 legit sites, 9 already known phishing, 3 newly phishing Purpose of experiment explained to everyone 90% of users fooled by well designed phishing Results: o Browser alerts = ineffective o Pop ups about fraud = inefficient o 25% not familiar with anti-phishing software o age, sex, experience, hours on comp, highest level of education = no advantages Motivation #1 misjudged phishing site was said to be legit "based on content of the page and detail in design." From Jan 1- June 30 2009 there were over 55,000 phishing attacks according to the Anti-Phishing Working Group We realize that we can't rely on users alone to distinguish...
View Full Document

Page1 / 14

anti-phishing-software - Anti-Phishing Software Presented...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online