Cyber Security Tutorial

Cyber Security Overview Cyber Security Introduction Cyber Crime Cyber Space Cyber Criminals Cyber Law Cyber Attackers Types of Hackers Functions of Cyber Security Method to Improve Data Security Cyber security frameworks Importance of Cyber Security Types of Cyber Security Cyber Security Fundamentals Applications of cyber security Cyber security in education sector Cyber security in health care industry Cyber security tools Cyber security policies Types of security policies Characteristics of cyber security policies Digital signature Cyber Security Standards NIST- National Institute of Standard and technology Information Technology Act ISO - International Standard for Organization ISO certification PCI DSS Standard FINRA Difference between Information Security and Cyber Security Cyber Security Vulnerability Elements of vulnerability management Social Engineering Vulnerability Assessment Vulnerability management Types of cyber security vulnerabilities Identification of security vulnerability Types of social engineering attacks Penetration Testing Penetration Testing Tools Types of penetration testing Process of Penetration Testing What is Phishing Elements of cyber security Difference between Spoofing and Phishing Difference between Network Security and Cyber Security Difference between Ethical Hacking & Cyber Security Role of artificial engineering in cyber security Cyber Forensics Definition Cyber Security job qualifications Cyber Security Prerequisites Cyber Security Identity and Access Management What is Cyber Forensics Different Types of Cybercrime Different types of cybercrime Tunneling Techniques in Cyber Security

Difference between Spoofing and Phishing

Spoofing – A cyber-attack in which the attacker tries to steal the identity of a legitimate user and act as another person. Spoofing is a type of identity theft used to steal the information of a user by breaching the security of individuals or big systems. In this, attackers wear the mask of a legitimate user and communicate with the end user for its personal and sensitive information.

Phishing is a type of social engineering technique used by attackers to steal the user's personal information, including login credentials, credit or debit card details, etc. This is done by sending a forged email which looks like it came from a legitimate sender, but it's a trick to make the user click on a malicious link & downloading an attachment potentially laced with malware.

        Spoofing           Phishing
  
Types of spoofing are:
- Email spoofing
- Website spoofing
- Caller ID spoofing
- IP spoofing
- DNS Server spoofing
- URL spoofing
- GPS spoofing
Types of phishing are:
- Spear phishing
- Whaling
- Smishing
- Vishing
- Deceptive phishing
- Session hijacking
- Pharming
- Clone phishing
- Snowshoeing
Spoofing can be a part of a phishing attackPhishing is individually not a part of a spoofing
Spoofing is designed to attain a new identityPhishing chooses a particular target to get confidential information
Spoofing doesn’t require fraudIt is a fraud as it is operated without user knowledge
When it is operating, information is not theft by the userIt follows a fraudulent manner to theft the information
Malicious software is needed to download on the victim’s computerNo need to download any malicious software in the system
Spoofing is by doing these:
- Hacking the whole website by modifying its IP address
- Copy of a banking website seems to the legitimate, and one used to gather sensitive information from the victim and many more
Phishing emails have these types of terms:
- Tax refunds
- Payment failed
- Click here
- Click the link & download it
- Verify your details
- Offer!Phone call
- Via SMS (text message)

Method to deal with phishing ad spoofing

  • Spell check the website, URL and emails
  • Regularly checking the bank account and credit card statements
  • Keep updated about the account transaction
  • Use of original website mainly having “http” prefix before URL
  • Never click the popups and link in the emails
  • Never download or install unwanted or malicious software
  • When an email looks suspicious, hover your mouse on the email link to be sure
  • Installation of anti-malware, antivirus program and firewall to protect the system
  • Personal data couldn't be divulged, whether online or on the phone
  • Without double check surety no need to click any attachment or link
  • If the user gets a suspicious call, it must check it back with the caller or, in the case of the email, must check the email's sender.
  • Unfamiliar email addresses should be avoided.
  • Pay attention to a grammatical errors within the content of the communication.
  • Users must read the email content (sentence structure or odd sentence phrasing) and not react to words like "HURRY UP" or "MUST", etc.