GES106 Lecture Notes - Lecture 2: Voice Phishing, Security Certificate, Infor
Document Summary
Phishing is theft of personal or financial information of the user, through the falsification of a trusted entity. In this way, the user believes entering the data into a trusted site when, in reality, these are s ent directly to the attacker. Phishing is one of the techniques and types of password harvesting, for m in which are called attacks that collected user passwords. In its classic form, the attack begins wit h the sendingof an email, simulating the identity of an organization of trust, such as a bank or a reco gnized company. The characteristics of a phishing mail are as follows: The email from the sender pretends to be from the company in question. The body of the email, features the logo of the company or organization that signsthe message. The message urges the user to re-enter any information that, in reality, the so-called sender alr eady has. The link is an important component of the attack.