Welcome to YLOAN.COM
yloan.com » Marketing » Strathclyde Anti-phishing Scam Solutions
Marketing Advertising Branding Careers-Employment Change-Management Customer Service Entrepreneurialism Ethics Marketing-Direct Negotiation Outsourcing PR Presentation Resumes-Cover-Letters Sales Sales-Management Sales-Teleselling Sales-Training Strategic-Planning Team-Building Top7-or-Top10-Tips Workplace-Communication aarkstore corporate advantages development collection global purchasing rapidshare grinding wildfire shipping trading economy wholesale agency florida attorney strategy county consumer bills niche elliptical

Strathclyde Anti-phishing Scam Solutions

Strathclyde University Associates - Of the following solutions

, the first two are corporate while the following two are end-user in nature. Christopher Cranston, Department of Computer and Information Sciences, University of Strathclyde, Glasgow.

1. Digitally Signed Email

Digitally signed emails allow the recipient to verify that the sender information is genuine. This also lets the

recipient know that the message has not been modified in transit. These guarantees are extremely useful in


the context of phishing, as they prevent individuals from impersonating established organizations in phishing

emails. Popular digital signature standards include OpenPGP and S/MIME, although they are incompatible

with each other. These facilities can be used with mail clients such as Outlook, Navigator and Eudora.

At first glance, digitally signed emails appear well suited to combating the phishing problem. However, to

date very few organizations with on-line banking or e-commerce facilities use this technology. Companies

frequently targeted by phishing attacks such as Citibank, eBay and US Bank do not use digital signatures at

all. This has been attributed to the difficulty end-users have in using digital signature technology (Tally, G.,

et al, 2004).

2. Online Brand Monitoring

Companies such as Cyveillance, NameProtect and Netcraft offer on-line brand monitoring services. This

entails monitoring domain name registrations, web pages, spam emails and other on-line content for illegal

use of clients' brand names. If illegal use of a client's brand name is detected, for example on a phishing web

site, then the client is notified and can take remedial to close the website.

In the context of phishing attacks, some components of this service are more useful than others. The

monitoring of domain name registrations is perhaps the most useful component, as organizations can be

alerted in advance to possible phishing websites. For example, the organization with the domain bank.com

could be informed that bank-security.com was recently registered by another party. The organization

controlling bank.com may then conclude that this newly registered domain is likely to be used for phishing

attacks, so could give prior warning to customers.

The web page and spam email monitoring components are less useful. These features may alert

organizations to new phishing attacks, but they still have to go through the appropriate channels to close

down the phishing website. Closing down phishing websites can take as long as 15 days. During this period

end-users are still vulnerable to the phishing attack.

3. Spam Filters

Phishing emails are transmitted using normal spam mechanisms and often contain similar characteristics to

commercial spam emails. Consequently, current spam filters can be used to defend end-users against

phishing attacks.

Spam filters classify incoming mail as either spam or non-spam. Where the classification takes place

depends on the type of spam filter employed. Gateway spam filtering is normally used by large organizations

and ISPs. This type of filter adjudges email messages arriving at the mail gateway. Desktop spam filters are

also available and may be integrated or run in combination with a user's mail program. Filters of this type

judge email once it has been download from the mail server.

Spam emails are often removed by filters, and no spam may be present when the end-user views or

downloads their mail. Alternatively, spam filters may simply mark suspect emails as spam. Some systems

have the ability to quarantine spam emails, and permit users to browse spam emails that have been removed.

Current spam filters aim to catch as much spam as possible whilst minimizing the degree of falsepositives.

To achieve this, most spam filters use Bayesian filtering techniques. Bayesian filtering allows the

filter to learn and adapt over time, taking into account the latest spam emails and the user's personal

preferences. Most of today's popular email filters employ Bayesian filtering capabilities

Although spam filters are often very effective, they are not infallible. Even the best filtering technology

still lets some spam through (Graham, 2003). Consequently, end-users cannot fully rely on spam filters to

remove all phishing emails from their mailbox. In addition, for a variety of reasons, many users do not use

spam filters at all. They may not currently receive enough spam to warrant the use of a spam filter. Some

users may not have the technical ability to install or configure a spam filter, or may believe that they are

prohibitively expensive. Many users may not even be aware that spam filters exist. For such reasons, spam

filters cannot be considered a complete solution to phishing emails.

4. Web browser extensions

Since phishing relies largely on deceptive Web sites, Web browsers are a natural focus for anti-phishng

measures. An early means of adding anti-phishing capabilities to Internet Explorer was the Earthlink Toolbar.

Whenever the user browses to a known phishing web site, the tool alerts them to this fact and the user is

redirected to a warning page hosted by Earthlink (Earthlink, 2006). Similar strategies for user alerting are

now appearing within mainstream Web browsers. Mozilla Firefox has a facility enabled by default that also

works by checking visited Web sites against a list of known phishing sites. In this case, the phishing site list

is automatically downloaded and regularly updated within Firefox. Since new phishing attacks may arise at

any time, an additional option allows users to check sites against an online service for more up-to-date

protection. Users may also report Web Forgery in cases where a suspect site is not detected by the anti6

phishing system. In similar vein, Microsoft have added comparable anti-phishing features to version 7 of

Internet Explorer.

Such anti-phishing extensions to Web browsers help by alerting users to known phishing sites. This relies on


a current database of phishing website information. A system designed in this way cannot protect against all

phishing attacks, since there will always be a delay between a phishing attack going live and the database

being updated. During this delay users are not protected from the new phishing attack.

by: davidgani
Aarkstore Enterprise Global Dental Devices & Consumables Market (2010-2015 Affiliate Marketing: A Job Opportunity for the Unemployed Chevy Malibu Aftermarket Accessories for Sale - Customize Your Chevy Malibu Article Marketing Tips: Writing Article Conclusions That Make Readers Want More Strathclyde The Anti-phishing Scam Web Service 5 Simple Steps To Article Marketing Success To Promote Your Website! List Marketing - Respond to Your Prospect's Emails to Build a Relationship and Create Raving Fans Benefits Of Multi Level Marketing Software Products are cut to small profit margins of Zhejiang Textile enterprises experience and advanced technology to help break deadlock - small profits, Money With Article Marketing Mobile Phones With Free Fifts : The Biggest Demand Of Mobile Market Learn Article Marketing In Six Easy Steps! Best Benefits Of Article Marketing
print
www.yloan.com guest:  register | login | search IP(216.73.216.35) California / Anaheim Processed in 0.019010 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 132 , 6895, 66,
Strathclyde Anti-phishing Scam Solutions Anaheim