Advertisement
Guest User

Untitled

a guest
Sep 27th, 2018
247
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 4.66 KB | None | 0 0
  1. <!DOCTYPE html>
  2. <html lang = "en-NZ">
  3. <head>
  4.  
  5.      
  6.     <title>
  7.     P H I S H I N G
  8.     </title>
  9.    
  10.     <meta charset = "utf-8" />
  11.    
  12.     <link href="https://fonts.googleapis.com/css?family=Arimo|Muli:900" rel="stylesheet">
  13.     <link href="styles.css" rel = "stylesheet">
  14.    
  15. </head>
  16.  
  17.  
  18. <body>
  19.  
  20.     <header>
  21.            
  22.             <img id ="banner" src = "images/banner3.png" alt = "3D banner of the word PHISHING">
  23.     </header>
  24.        
  25.     <nav>
  26.             <ul class = "navlist">
  27.                 <li class = "navitem"><a href= "index.html">What is Phishing?</a></li>
  28.                 <li class = "navitem"><a class = "active" href= "how.html">How does it work?</a></li>
  29.                 <li class = "navitem"><a href= "identifyprotect.html">How do I identify and protect myself from it?</a></li>
  30.             </ul>
  31.     </nav>
  32.  
  33.  
  34.     <section>
  35.             <img  id = "img2" src="work/login2.png" alt = "username and password on computer">
  36.             <h1>How does phishing work?</h1>
  37.            
  38.         <p>Phishing attempts often look or sound genuine because the scammer is impersonating a trusted organisation or person. They could be pretending to be from your phone or internet company, a law firm, your bank or even the government. The scammer asks you to update your details, provide details, complete a survey, make a payment or another request that gives them access to your personal information.</p>
  39.            
  40.         <p>Sometimes there can be an enticing story about why the scammer is contacting you. For example, that you have a wealthy relative who has passed away and you’re the closest known living family member who will inherit their fortune. At other times, the scammer will try to intimidate you. For example, they might say they’re from Inland Revenue and that if you don’t make a payment for an overdue tax bill immediately, you’ll face legal action.</p>
  41.            
  42.         <p>If the scammer gets personal information, they’ll likely use it to impersonate or defraud that person. This could include anything from opening credit cards or bank accounts in your name, to accessing your online accounts like email, or even taking money from your bank account.</p>
  43.  
  44.        
  45.     </section>
  46.        
  47.        
  48.     <section>
  49.        
  50.             <h1>How does phishing work?</h1>
  51.            
  52.         <p>Phishing attempts often look or sound genuine because the scammer is impersonating a trusted organisation or person. They could be pretending to be from your phone or internet company, a law firm, your bank or even the government. The scammer asks you to update your details, provide details, complete a survey, make a payment or another request that gives them access to your personal information.</p>
  53.            
  54.         <p>Sometimes there can be an enticing story about why the scammer is contacting you. For example, that you have a wealthy relative who has passed away and you’re the closest known living family member who will inherit their fortune. At other times, the scammer will try to intimidate you. For example, they might say they’re from Inland Revenue and that if you don’t make a payment for an overdue tax bill immediately, you’ll face legal action.</p>
  55.            
  56.         <p>If the scammer gets personal information, they’ll likely use it to impersonate or defraud that person. This could include anything from opening credit cards or bank accounts in your name, to accessing your online accounts like email, or even taking money from your bank account.</p>
  57.  
  58.        
  59.     </section>
  60.        
  61.     <section>
  62.        
  63.             <h1>How does phishing work?</h1>
  64.            
  65.         <p>Phishing attempts often look or sound genuine because the scammer is impersonating a trusted organisation or person. They could be pretending to be from your phone or internet company, a law firm, your bank or even the government. The scammer asks you to update your details, provide details, complete a survey, make a payment or another request that gives them access to your personal information.</p>
  66.            
  67.         <p>Sometimes there can be an enticing story about why the scammer is contacting you. For example, that you have a wealthy relative who has passed away and you’re the closest known living family member who will inherit their fortune. At other times, the scammer will try to intimidate you. For example, they might say they’re from Inland Revenue and that if you don’t make a payment for an overdue tax bill immediately, you’ll face legal action.</p>
  68.            
  69.         <p>If the scammer gets personal information, they’ll likely use it to impersonate or defraud that person. This could include anything from opening credit cards or bank accounts in your name, to accessing your online accounts like email, or even taking money from your bank account.</p>
  70.  
  71.        
  72.     </section>
  73.        
  74.     <footer>
  75.        
  76.        
  77.         <h3>Mark Jenkins - Content from <a  style = "color:#000F0D" href = "https://www.netsafe.org.nz/">Netsafe NZ</a></h3>
  78.        
  79.     </footer>
  80.        
  81.  
  82. </body>
  83.  
  84.  
  85.  
  86.  
  87. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement