Showing posts with label week 4. Show all posts
Showing posts with label week 4. Show all posts

phishing:examples n its prevention methods

Phishing is a type of internet frauds that aim to steal the valuable information of the users such as credit cards, security number and password. It is a fake website that created similar to the original organizations such as bank. An email will send and request the user to access the fake website, and require the user to fill up their personal details and also the security number or password. Once the user fill up their personal details, fake website creator will use the information to steal the user’s money in the bank, ID of the games and so on.

Here are the links that teach you how to prevent the phishing.

http://www.wordspy.com/words/phishing.asp
http://kb.iu.edu/data/arsf.html

Here are the links to teach u how to spot a phishing scam
http://www.webopedia.com/DidYouKnow/Internet/2005/phishing.asp

Example of phishing website:



Bank Phishing Example


Ebay Phishing Example






Let’s all work together to prevent phishing scams. If you receive a suspicious e-mail, please report it. You can send it to the US Federal Trade Commission at spam@uce.gov or you can just click the ‘report as junk’ button on your e-mail program. This will help to reduce the phishing scams and provide a more safety environment for users of internet.
Labels: 3 comments | edit post

The Application of 3rd Party Certification Programme in Malaysia


I'm here to share my post again. It is about the application of 3rd party certification programme in Malaysia..

3rd party certification

What is that? According to British Standards Institution (2009), it is an assessment carried out to ensure compliance with a publicly available technical specification.
More detailed information can be found at http://www.bsigroup.com/en/ProductServices/Fire/Fire-alarm-installations/About-the-scheme/Third-party-certification/m/en/ProductServices/Fire/Fire-alarm-installations/About-the-scheme/Third-party-certification/

Where Certificate Authority (CA) is a trusted third-party organization or company that issues digital certificates used to create digital signatures and public-private key pairs. If you still doubt about what is CA, you can go to this link as below
http://webopedia.com/TERM/C/certification_authority.htmla.com/TERM/C/certification_authority.html

MSCTrustgate.com Sdn Bhd
The most famous application of 3rd party certification programme in Malaysia. It is a licensed CA in Malaysia operating within the Multimedia Super Corridor which incorporated in 1999. The company offer SSL Certificate, Managed PKI, Personal ID, My TRUST, MyKAD ID, SSL VPN, Managed Security Services, VeriSign Certified Training and Application Development.
http://msctrustgate.com/about_us.htm.com/about_us.htm




Trustgate
It is a licensed CA in Malaysia which provided by MSCTrustgate.com Sdn Bhd. The diagram below shows the product and services which provide by Trustgate.



I'll be sharing few of the products and services which provided by Trustgate.
Verisign Secure Sockets Layer (
SSL) Certificate
It is a technology that developed by Netscape. It is a technology that used to enhance the server security and allows users transmit document or having online transaction safely via the Internet.

More detailed information can be found at
http://www.verisign.com/ssl/ssl-information-center/how-ssl-security-works/
http://www.windowsecurity.com/articles/Secure_Socket_Layer.htmlrity.com/articles/Secure_Socket_Layer.html



Managed PKI (MPKI) for Enterprise Trust Services is designed to secure intranet, extranet and the internet. The diagram below shows how MPKI work.Digital ID is which is basically design for secure the online transactions, documents, and e-mails. MyTRUST gives user more convenient on mobile banking and other financial services which is using the users' SIM card in Mobile digital signature. MyTRUST provides 3 areas of services for government, banks and enterprise. Everyone knows about MyKAD which allow users to make online transaction with government and public sectors. For other products and services, kindly go to these few links:
http://www.msctrustgate.com/product/ssl_vpn.htm
http://www.msctrustgate.com/product/mss.htm
http://www.msctrustgate.com/product/training.htm
http://www.msctrustgate.com/product/app_dev.htm


Thanks for reading my post....please feel free to leave any comment. Have a nice day. =)
Labels: 6 comments | edit post

How to safeguard our personal and financial data?

Safeguarding have been an important issue in nowadays. There have been more threats in the IT world compare to the history. Basically, the threats can be categorized to 3 category, which are hacker, malicious code(e.g. virus and worms) and vulnerability(errors when programming, attackers take advantage on these errors). Therefore, safeguarding our data is important these days.

Ways to safeguard our data
Firewall and Anti-Virus
The easiest way and common way to protect your data is through the use of firewall and anti-virus. This will enable the users to protect themselves from worms and trojans. It will be important for the users to update their virus definition file.

Scanning
Always scan the computer regularly with an anti-spyware program, to detect the spyware or adware hidden in the software program, as they will slow down the performance of the computer or give chances to the attackers to attack the computer's data.

Update your patches
Update patches of the program regularly, to patch the "hole" inside the program, to prevent attackers taking advantage on it.

Encryption

Encrypt your data to prevent hackers to steal your data. Encryption of data will ensure that unauthrozied people will not be able to gain access to the data, to prevent any loss of data.

Backup
Backup your data always, to prevent any loss of data and could not claim back the data.

http://www.us-cert.gov/cas/tips/ST06-008.html
Labels: 3 comments | edit post

The Threat of Internet Security : More than 1 million computer viruses in circulation now

The Symantec bi-annual Internet Security Threat Report shows that there are more than a million of computer viruses, worms and Trojans in circulation for past 12 months.

Malware is software designed to break into or damage a computer system without the owner's knowledge and consent. Malware can be divided into several categories which are viruses, worms, adware, spyware, hijackers, toolbars, and dialers. It can hijack computer browser, redirect search attempts, and serve up nasty pop-up advertisement, track web sites and screw things up. In short, malware programs usually can slow down the computer. For my opinion, to prevent significant increase of malwares, every computer’s user is strongly recommended that he/she take the necessary ways to prevent malware infection.

1. Be alert for the computer. User should be aware if anything unusual has happened because this may be a sign of malware problem.

2. Install a reliable anti-virus program to minimize the percentage of malware problem. Furthermore, make sure the anti-virus program installed is up to date and run computer’s scans within a period of time.

3. Filtering unusual emails that received. It is encouraged to scan the email before read it because some of the malwares like Trojans and viruses are being spread over the internet by attached to email.

4. Never download and install any unknown program. Some of the programs and files could be attached by malwares; therefore, it is advisable that do not to do so.

For further information related to tips to prevent malware, please visit
http://jbwebdev.com/blog/super-tips-to-prevent-malware-infection/

To prevent malwares, users are encouraged to keep computer up to date, install a reliable anti-malware program, and avoid questionable emails and websites.
Labels: 3 comments | edit post