A walm welcome to you!!!

Let us share something worth that will help all of us to increase our knowledge orientation in the huge and ever expanding world of Networking!

I have created this blog to help each and everyone who visits this blog to get himself acquainted with new technologies, recent developments in the world of technology....

I hope you will help me share my knowledge with you....!!!!

Saturday, March 3, 2012

World of Internet Security (Phishing)

In these early months of my blog, I will be kick starting with the new aspects of networking and technology.
Gradually, I will be going into the depths of every aspect. I am always commencing my post with these
 lines because the field of networking and technology is so vast and beyond imagination that it is
not  possible to discuss every issue in one and the same post itself.

A couple of days ago, one of friends told me to write something on 'phishing'. Hmmmm, I was about to
draft a post on internet security, and co-incidentally it has happened quite early! Before turning directly
 to phishing, I would like to give you an overview of Internet security and why it is essential in this highly exposed connected world wide web. Actually, Internet security is itself one of the branches of networking. Similar to the wireless technology which I have discussed in my last article, there are many certifications
that are related to security such as Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), Red Hat Certified Security Specialist (RHCSS) and much more, the details of which you can Google out.

Why do we need Security on the Internet? There's a long answer to this question. As I said earlier, every device connected to the Internet is highly exposed to risks. And these risks may be termed as hackers, penetrators, intruders, middlemen, viruses, malwares, spywares, phishing attacks and many more....
Above all, there are risks related to loss of crucial data, denial of service attacks etc.
How many people (except those from the IT background) in this connected planet know about Internet security and the measures that are available to keep your PCs and systems protected from intrusions and
potential risks? Today, it is really necessary to make yourself educated about this issue.

Now, let's turn to these risks one-by-one. First of all, let me start with phishing because my friend is really awaiting to read an article on it.

Phishing sounds like fishing, isn't it? That's why on most of the websites today that provide related information on phishing put a fish as a 'logo' to denote phishing. Phishing is an illegal activity.
In this process of phishing a perpetrator (one who intends to phish), sends an email which looks out to be
legitimate, but actually isn't. This email is sent with an intention to collect financial information such as credit card numbers.
To put all this in fewer words, phishing is a technique used to gain personal information for the purposes
of theft using sources like emails that appear to come from a legitimate source. Phishing may have alternate names such as carding or brand spoofing.
In the process of phishing, the victim may be asked to provide his confidential information such as passwords or bank account number.

Phishers use a variety of techniques while sending emails-legitimate logos, official signs, polished website designs and styles and all such things that make the victim think that all this has come from a legitimate sender which he believes to be true.

Now, when the user clicks a link that is inside the email, he is redirected to the fake website, where they
are persuaded to enter their personal and financial information. At the phisher's end, the phisher uses a
 set  of  special software to decode the information (such as passwords) entered by the victim. And soon
enough the phishers drain out your resources.

Let us now discuss the various measures that you can take to protect yourself from being a victim of phishing.
The world of Internet security follows one great principle-Prevention is better than cure!!

 Firstly, beware of any website demanding your personal & financial information. Generally, banks and financial institutions do not ask you to provide such information on their websites.

 Secondly, think before you act. Think before clicking on any link that might redirect you to a fake website
that may ask you personal and financial information.

 Thirdly, it is your duty to report any suspicious activity to your bank or financial information.

 Fourthly, make sure that you are using HTTPS (Hyper Text Transfer Protocol Secure) instead of
 HTTP while browsing your bank's website or any other website that requires security.

 Fifthly, always update your browser and make sure that you are running the most latest version of your browser since it may contain critical and really critical security patches.

 Always keep a watch on your banking transactions and confirm whether they are correct and do not involve any suspicious activity.

In the next article, I will be writing about viruses, malwares, spywares & worms that affect your system.
Till then, keep in touch with my blog.




1 comment:

  1. hey ya thanks....the post is really informative

    ReplyDelete