You are on page 1of 120

HTTP://COEIA.EDU.

SA
1
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪2‬‬
‫‪3‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﱐ‬

‫ﺍﻷﺳﺎﻟﻴﺐ ﻭﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﻀﺎﺩﺓ‬

‫ ‬
‫‬ ‫د‪"#$%&'K‬نא (‬
‫م‪"#K‬ن‪&01‬א‪-.-/‬א‪ *+,‬‬

‫‪ 2.&3‬‬
‫د‪K‬ز‪.‬د‪"1$%‬نא‪ 435‬‬
‫و 
אدونא  وא د ‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪4‬‬

‫ﺣﻘﻮﻕ ﺍﻟﻄﺒﻊ ﻭﺍﻟﻨﺴﺦ ﳏﻔﻮﻇﺔ ‪1429‬ﻫـ ‪2008 -‬ﻡ‬ ‫ﺡ‬

‫ﻓﻬﺭﺴﺔ ﻤﻜﺘﺒﺔ ﺍﻝﻤﻠﻙ ﻓﻬﺩ ﺍﻝﻭﻁﻨﻴﺔ ﺃﺜﻨﺎﺀ ﺍﻝﻨﺸﺭ‬


‫א‪   ،‬ن ‬
‫א‪ "#$‬دא)('و&‪W%‬א  ‪0‬وא)
‪/‬א‪.‬א‪-‬א‪ ,‬د‪ L+‬‬
‫   ن‪34‬א‪2‬א–א‪ 6/‬ض‪ 781429،‬‬
‫‪0002‬ص؛‪ <24C17‬‬ ‫‬
‫=د‪ 978-603-00-1453-8W‬‬ ‫‬
‫‪? J1‬א ‪? J2-‬א@א ‪ 0‬‬ ‫ ‬
‫?‪  K‬ن‪34‬א‪B6B‬א‪KHEE= FF C‬א‪I‬אن ‬ ‫ ‬
‫ ‬
‫‪ 1429L5884‬‬ ‫‬ ‫د‪  005,8J6‬‬ ‫‬

‫ ‬ ‫‬

‫=‪<L‬א)‪6‬אع‪ 1429L5884W‬‬
‫=د‪ 978-603-00-1453-8W‬‬ ‫‬

‫>;=‪83‬قא‪ *789:;0‬‬
‫א‪*/0‬אو? ‬
‫‪2009-@A1429‬م ‬
5
 

 ‫אوאאאאد‬W
‫אدא و‬

 ‫ ا ــ‬


 ‫     ن ا‬.‫*د‬

MN6=7O7P 8,4‫ אدو‬Q- ‫א‬B ‫א‬B //6ً  S 6


U774‫ ن‬77V‫א‬77776‫א‬ME= 77W77L‫و‬،77 X - 77‫وא‬077 @‫مא‬77477 
E= 7WK7# ‫( و‬S- Y
+= Z8‫و‬،+=‫ وאزא‬X‫\א( وא‬Z
K7]^‫א‬- 7YX‫א‬7‫د‬74M 7Y 4_‫א‬/7W)‫وא‬، 7Y `O‫و‬7 I‫א‬- 7‫אدא=א‬4aM
773O/d77‫د‬7777‫א‬77
77- 7 ‫<א‬77c&MN6= 7 (3‫א‬77
=‫د‬U774 77bS
- 76$‫א‬M7Z ‫_

=ج‬/‫א‬3O/df‫وא =א‬gZ
‫<א‬h،_/‫א‬
+77i‫א‬- 776$‫א‬77- 77‫א‬77?M‫'אع‬77 ‫א‬+.‫א‬/77U774 77bS،77 (6/‫א‬+77i‫א‬
+=‫دא‬a‫و‬- 77‫א‬77?‫ ل‬77kM77  4 77bbl-‫ دא‬Y77WU774 77bS 77 77 (6/‫א‬
M077O ‫و‬،- 77‫א‬77?M77bb^‫א‬77 ‫א‬- 77]‫א‬77776‫א‬m77Kd6= 77‫א‬
77?‫ ل‬77kM77 36=‫א‬-‫و=א‬77‫وא‬-‫א‬/77n o‫א‬77776‫ <א‬77`6‫و‬،6‫د‬77Z‫א‬Fi77b‫א‬
 K- ‫א‬

 ‫  ن ا ا‬.‫*د‬


7 &‫('و‬$‫א‬-p 7‫א‬q 7&/U7r7 (@‫ א‬7 (‫א‬+ 7IL‫وع‬//6ً  S 6
-$ 77bO$‫ ?א‬/77- 7‫א‬77 I`O‫ ع‬7"LM 77 (‫א‬77c&?g37 ً ` 777 (@‫א‬
7  7- ‫<א‬c&MgZ
‫سوא‬6= (3‫א‬t
=‫د‬U4 # SK?6‫د‬Z‫א‬
+‫ د‬Y7WU74ً 7,6? 7# SK‫ ض‬76/ ‫د‬7‫ א‬Q- ‫وא‬0 @‫مא‬4
vS 8‫و‬EProject Management ProfessionalFd6= ‫א‬+=‫دא‬aM  4 bbl
K‫ אد‬Q- ‫א‬B ‫א‬B /M‫ ون‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪6‬‬

‫ا  س‬
‫ﻣﻘﺪﻣﺔ ‪9.....................................................................................................‬‬
‫ﺍﻟﻔﺼﻞ ﺍﻷﻭﻝ‪ :‬ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ‪14...........................................................‬‬
‫‪1.1‬ﻣﻜﻮﻧﺎﺕ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ‪15.................................................................‬‬
‫‪1.1.1‬ﻋﻤﻴﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ )‪15 ................................... (E-Mail Client‬‬
‫‪2.1.1‬ﺧﺎﺩﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ )‪16 ..................................... (E-Mail Server‬‬
‫‪2.1‬ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺒﲏ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ ‪17.....................................................‬‬
‫‪3.1‬ﺑﺮﻭﺗﻮﻛﻮﻻﺕ ﺗﺮﺍﺳﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ‪18..........................................................‬‬
‫‪1.3.1‬ﺑﺮﻭﺗﻮﻛﻮﻝ ﻧﻘﻞ ﺍﻟﱪﻳﺪ ﺍﻟﺒﺴﻴﻂ ‪18 ...............................................‬‬
‫‪2.3.1‬ﺑﺮﺗﻮﻛﻮﻝ ﻣﻜﺘﺐ ﺍﻟﱪﻳﺪ ‪18 ......................................................‬‬
‫‪4.1‬ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﺎﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ‪19.....................................‬‬
‫‪5.1‬ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ‪21...........................................................................‬‬
‫‪6.1‬ﻫﻴﻜﻠﻴﺔ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ‪22..................................................................‬‬
‫ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﱐ‪ :‬ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ )‪24................................ (Spam‬‬
‫‪1.2‬ﻣﻘﺪﻣﺔ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ ‪26..............................................‬‬
‫‪2.2‬ﺃﺳﺎﻟﻴﺐ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪﻳﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ ‪31.............................................‬‬
‫‪1.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻷﻭﻝ‪ :‬ﺑﺮﻳﺪ ﺍﻧﺘﺤﺎﻝ ﺍﻟﺸﺨﺼﻴﺔ )‪31 ................... (E-Mail Spoofing‬‬
‫‪2.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺎﺩﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻔﺘﻮﺡ )‪31 ............ (Open Mail Rely‬‬
‫‪32‬‬ ‫ﺍﻟﺼﻮﺭ)‪(Image-based Spam‬‬ ‫‪3.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﺮﺳﺎﺋﻞ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ ﺍﳌﻌﺘﻤﺪﺓ ﻋﻠﻰ‬
‫‪4.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻫﺠﻤﺔ ﺍﻟﻘﺎﻣﻮﺱ )‪34 ........................ (Dictionary Attack‬‬
‫‪3.2‬ﺍﻻﺟﺮﺍﺀﺍﺕ ﺍﳌﻀﺎﺩﺓ ﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ ‪34...................................‬‬
‫‪1.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﺼﻔﻴﺔ )‪34 ................................... (Filtration‬‬
‫‪2.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀﺎﺀ ﻭﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺴﻮﺩﺍﺀ )‪35(Black lists / White lists‬‬
‫‪7‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‪3.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀﺎﺀ ﺍﻟﺘﺠﺎﺭﻳﺔ )‪37 ...... (Commercial Whitelists‬‬
‫‪4.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﺍﻟﺘﻜﺎﻣﻠﻴﺔ )‪37 ................ (Integrity Check‬‬
‫‪5.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ‪ :‬ﲢﻮﻳﺮ ﺍﻟﻌﻨﻮﺍﻥ‪38 ........................................‬‬
‫‪6.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺩﺱ‪ :‬ﻋﺪﻡ ﺍﻟﺮﺩ ﻋﻠﻰ ﺍﻟﺮﺳﺎﺋﻞ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‪38 ..................‬‬
‫‪7.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ‪ :‬ﺍﻹﺑﻼﻍ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ )‪39 . (Spam Reportin‬‬
‫‪8.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻣﻦ‪ :‬ﺍﻟﺘﻘﻴﺪ ﺑﻮﺛﻴﻘﺔ ﻃﻠﺐ ﺍﻟﺘﻌﻠﻴﻘﺎﺕ ﻟﱪﺗﻮﻛﻮﻝ ﻧﻘﻞ ﺍﻟﱪﻳﺪ ﺍﻟﺒﺴﻴﻂ‬
‫)‪41 ...................................................................(SMTP RFC‬‬
‫‪9.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ‪ :‬ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺰﻳﻔﺔ )‪41 .... (Fake MX Records‬‬
‫‪10.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﻌﺎﺷﺮ‪ :‬ﺗﺄﺧﲑ ﺍﻟﺘﺮﺣﻴﺐ )‪43 ..................... (Greeting delay‬‬
‫ﺍﻟﻔﺼﻞ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﱐ )‪45............................................... (Phishing‬‬
‫ﺍﻟﻔﺼﻞ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺃﺳﺎﻟﻴﺐ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﱐ )‪65...................... (Phishing Techniques‬‬
‫‪1.4‬ﺍﻷﺳﻠﻮﺏ ﺍﻷﻭﻝ‪ :‬ﺗﺴﻤﻴﻢ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ )‪67 ................. (DNS Poisoning‬‬
‫‪2.4‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ‪ :‬ﺗﺴﻤﻴﻢ ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ )‪70 ............ (Hosts File Poisoning‬‬
‫ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺑﻮﺍﺳﻄﺔ ﺣﻘﻦ ﺍﶈﺘﻮﻯ )‪71(Content Injection‬‬ ‫‪3.4‬‬

‫‪73 .‬‬ ‫ﺍﻟﻮﺳﻂ)‪(Man-in-the-Middle Attack – MITM‬‬ ‫ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻫﺠﻤﺔ ﺍﻟﺮﺟﻞ ﰲ‬ ‫‪4.4‬‬

‫ﺍﻷﺳﻠﻮﺏ ﺍﳋﺎﻣﺲ‪ :‬ﺗﺸﻮﻳﺶ ﺍﻟﻌﻨﻮﺍﻥ)‪76 ..................... (Address Obfuscation‬‬ ‫‪5.4‬‬

‫‪6.4‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺴﺎﺩﺱ‪ :‬ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﱪﺍﻣﺞ ﺍﳋﺒﻴﺜﺔ)‪80(Malware Attack‬‬


‫‪(Search Engine‬‬ ‫‪7.4‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺴﺎﺑﻊ‪ :‬ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﳏﺮﻛﺎﺕ ﺍﻟﺒﺤـﺚ‬
‫)‪80 ....................................................................... Phishing‬‬
‫‪8.4‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻣﻦ‪ :‬ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﻨﻮﺍﻓﺬ ﺍﳌﻨﺒﺜﻘﺔ )‪81(The Popup Attack‬‬
‫‪9.4‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺘﺎﺳﻊ‪ :‬ﺷﺮﻳﻂ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺰﻳﻒ )‪83 ................... (Fake Address Bar‬‬
‫‪(Phishing‬‬ ‫ـﺮﻭﱐ‬
‫ـﻄﻴﺎﺩ ﺍﻹﻟﻜﺘـ‬
‫ـﺎﺩﺓ ﻟﻼﺻـ‬
‫ـﺮﺍﺀﺍﺕ ﺍﳌﻀـ‬
‫ـﺎﻣﺲ‪ :‬ﺍﻹﺟـ‬
‫ـﻞ ﺍﳋـ‬
‫ﺍﻟﻔﺼـ‬
‫)‪91................................................................................... Countermeasures‬‬
‫‪1.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻷﻭﻝ‪ :‬ﻣﻨﻊ ﻫﺠﻤﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻗﺒﻞ ﺣﺪﻭﺛﻬﺎ ‪92 ...........‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪8‬‬
‫‪1.1.5‬ﺇﻧﺸﺎﺀ ﺣﺴﺎﺏ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ ﻟﻠﺒﻼﻏﺎﺕ ‪92 ........................................‬‬
‫‪2.1.5‬ﻣﺮﺍﻗﺒﺔ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺗﺪﺓ )‪92 ...................... (Bounced E-Mails‬‬
‫‪3.1.5‬ﻣﺮﺍﻗﺒﺔ ﻣﺮﺍﻛﺰ ﺧﺪﻣﺔ ﺍﻟﻌﻤﻼﺀ ‪93 ..................................................‬‬
‫‪4.1.5‬ﻣﺮﺍﻗﺒﺔ ﺣﺴﺎﺑﺎﺕ ﺍﻟﻌﻤﻼﺀ ‪94 ......................................................‬‬
‫‪5.1.5‬ﻣﺮﺍﻗﺒﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺼﻮﺭ ﺍﶈﺘﻮﻳﺔ ﻟﺸﻌﺎﺭ ﺃﻭ ﺭﻣﺰ ﺍﳌﻨﻈﻤﺔ ‪94 ............................‬‬
‫‪2.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﺘﺼﻔﻴﺔ )‪98 ..................................... (Filteration‬‬
‫‪3.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻟﺚ‪ :‬ﺍﻟﺘﺤـﺪﻳﺜﺎﺕ ﺍﻷﻣﻨﻴﺔ )‪ (Security Patches‬ﻭ ﺟـﺪﺭﺍﻥ ﺍﳊﻤﺎﻳـﺔ‬
‫)‪99 ...................................................................... (Firewalls‬‬
‫‪4.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ‪ :‬ﺗﺼﻔﻴﺔ ﺍﻷﻛﻮﺍﺩ ﺍﻟﱪﳎﻴﺔ ﺍﳋﺒﻴﺜﺔ )‪100 ..(Cross-Site Script - XSS‬‬
‫‪5.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ‪ :‬ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ )‪101 ............... (Visual Keyboard‬‬
‫‪6.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺩﺱ‪ :‬ﺍﻟﺘﺼﺪﻳﻖ ﺍﻟﺜﻨﺎﺋﻲ )‪102 ......... (Two-Factor Authentication‬‬
‫‪7.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ‪ :‬ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ )‪104 .............. (Mutual Authentication‬‬
‫‪(Anti-Phishing‬‬‫‪8.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻣﻦ‪ :‬ﺃﺷﺮﻃﺔ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ‬
‫)‪105 ..................................................................... Toolbars‬‬
‫‪9.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ‪ :‬ﺑﺮﺍﻣﺞ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ )‪110(Anti-Phishing Software‬‬
‫ﻣﻌﺠﻢ ﺍﳌﻔﺮﺩﺍﺕ ‪111.....................................................................................‬‬
‫ﺍﳌﺮﺍﺟﻊ ‪117................................................................................................‬‬
‫‪9‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪10‬‬
‫‪?xI‬ن?‪/b4‬א)&'&‪/L 73Lw‬א‪7`47‬و&‪7F7b‬א‪ 7B‬نوא‪^7‬א ‪ YO‬‬
‫‪BO‬א‪/7" (76‬د‪?za،‬ن?‪y37#‬א‪^7‬אمא)&'&‪/7?w7‬אً‪- 7Zm7I7$‬‬
‫و(‪7g‬א‪/7r‬אد‪K‬و?‪ً 736/Ly37#‬א ‪7‬مא‪7(6Jx7‬ن‪m7 r‬א‪^7‬אمא)&'&‪ً 7Bw7‬‬
‫‪- Z‬وא‪/r‬אد‪7g7 x ]I‬א‪ 74‬ل‪K‬و ‪ 7  7‬ن‪d7O‬א‪M+= 7V‬א`‪/7‬ون‬
‫א ‪Bً 33 n‬א‪6‬א`‪/‬א‪ I#‬و‪ "L‬عא"‪/‬ق‪{r،‬ن‪BO‬א‪6‬א^אمא)&'&‪ً 33y3#?w‬‬
‫‪B‬א‪/L6‬א‪8?_p  YI#‬א‪<Yr‬و?  ‪،<Y3‬و ‪33Z6‬ن‪ K= " ?m‬‬
‫و‪x8‬אא( ‪ I6H‬ول?‪S‬א " =א@‪6‬و‪%78‬א‪ "7#$‬دא)('و&‪%7‬א‪Jx7‬‬
‫‪F M03Z6L‬א ‪-‬א^‪  b‬א=‪ L‬مא‪-  Zi6/Z‬א‪، (I3‬و ‬
‫‪7`r Y 40O'6‬אنא‪7‬אل‪7O7‬א@‪K-  7Z‬و‪/7Z6‬ض‪x78‬אא(‪7OH 7‬‬
‫א((  ‪7&?/Y7W?ً I 3،/Z‬אعא‪0  7‬א‪ 7Y36t7‬א‪ 7o‬ن‪ "7#p‬د‪،‬‬
‫و‪ً in‬א)
‪/‬א‪.‬א‪-‬א‪O6 L Z‬א‪K- VC‬و‪} L‬و ~‪r‬א] ن‪M‬א  ‪= 7‬‬
‫‪n‬عא( ‪ Km 8H‬‬
‫و‪a‬ذ?&‪/haU7743O 77(/(77 f77‬אƒ‪\77i 77Y‬א‪x778M%77/‬אא‚‪ 77‬ل‬
‫א@‪ 77Z‬س‪?U77I…?„&{77r،‬ن‪x778<Y77Z6‬אא(‪%^77Z77 4OMH 77‬א)&'&‪77w77‬‬
‫א " =و‪ K 8= h† `O‬‬

‫د‪ .‬ز د   ن ا ‬


‫و 
אدونא  وא د ‬
‫‪11‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‬
‫?‪Ui77n‬א‪776‬א)('و&‪77(E-Mail)%77‬و‪ ƒ 77‬א‪ 77bO$‬لא@‪776‬وא‡ ‪+x77‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪12‬‬
‫ ‪= &$‬א"‪/‬د‪/d‬و=א‪ 6‬م‪،‬א‪\ZU4.‬א‪/r‬אد?وא‪<7c%]rK- cI‬‬
‫‪-$ k‬א‪ 4‬ل‪ S‬א‪6‬א)('و&‪ ‰%‬א‪Š EFaxFˆ I‬دא‪+‬א‪ bO‬ل?  ‪ K‬‬
‫א‪6‬א)('و&‪m]b%‬و ‪/O‬א‪J? 7m7 7‬و‪/O 7‬א‪،\/7 ? 7‬‬
‫א‪'(aw& .‬و& ?م‪‹Lm&{r،$‬א‪6/Œ4.%  ( Cp‬א‪^7‬א‪ Y‬‬
‫‪8‬א_‪g‬א‪8‬א_א  א‪ c& Y 4„}t‬مא‪6‬א)('و&‪ K%‬‬
‫‪x8L I6‬אא( ‪FŽH‬א  ‪0‬א‪M^Z‬א‪p‬لא‪6‬א)('و&‪%‬‬
‫(  ‪،.%‬وא)
‪/‬א‪.‬א‪-‬א‪ ,‬د‪ C+‬؛و‪< 7Z`O‹L‬א(‪7br7ZzaH 7‬ل‪K‬‬
‫א]‪ b‬אول‪ c&‘/6‬مא‪76‬א)('و&‪،%7‬وא]‪ 7b‬א‪ ƒ 7=L 7I6%& 7‬א‪76‬‬
‫א)('و&‪g77%77‬א‪،ESpamF77/‬و}‪77n77`77’6‬عא(‪H 77‬א‪N ƒ/77‬و‪778‬‬
‫א‪ "#$‬دא)('و&‪EPhishingF%7‬وא‪( 7Jx7‬ن‪7n‬عא]‪7b‬ل‪7‬א ‪zav7‬‬
‫א“ ‪ KN‬‬
‫‪3O‬و?‪x8 8‬אא( ‪ m& MH‬د‪ 64O+‬א‪%^7Z7Y
 /‬‬
‫א@ ‪0‬وא‪(3‬א  ‪EInternetF‬א‪ 76x‬א'א‪74 7‬א‪76‬א)('و&‪7S?%7‬‬
‫?&‪<Y"77‬א  ‪ 77•M77‬א‪”`I77‬א@‪ 77‬د‪\77i‬א‪ 77kM%77/‬ل‪<77Y‬و‪ 77ZS‬س‬
‫ ‪ V‬ل?א ‪ K-‬‬
‫ ‬
‫‪13‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪14‬‬

‫ا  اول‬
‫‪"#‬م ا  ا و‬
‫• ﻣﻜﻮﻧﺎﺕ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫• ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻌﺘﻤﺪ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ‬
‫• ﺑﺮﺗﻮﻛﻮﻻﺕ ﺗﺮﺍﺳﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫• ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﺎﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
‫• ﻫﻴﻜﻠﻴﺔ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬
15
 

 ‫אوאאאאد‬W
‫אدא و‬

7`6/Œ‫و‬،m7O &(v7 S7%&‫א)('و‬6‫ مא‬c& 8  b]‫אא‬x8‘/6


(37‫א‬74%7&‫א)('و‬76‫ א‬7‫א‬/O7 ] ً 7,6?‘/76‫و‬K–d Y, Y4
M- 7L "I‫א‬. ˜?‫ م‬c&=‫ودو‬، ‫א'א‬M’ ^Z— ‫א‬-$ O‫א‬v S  ‫א‬
76‫ א‬7=7 ( C‘/7W 7b]‫אא‬x78/7 †M‫و‬K%7&‫א)('و‬76‫א א‬/O 4
 K%&‫א)('و‬
 
‫ﻣﻜﻮﻧﺎﺕ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬ 1.1
EData NetworkF- 7& 3‫(א‬37WU74 I3‫א‬EApplicationsF- ` 3"‫(نא‬O
U74„377 3"O%7&‫א)('و‬76‫ ?نא‬7™‫و‬KEserverF‫ دم‬7 ‫ و‬،EclientF 7 4
‫ دم‬77 ‫و‬EE-Mail ClientF%77&‫א)('و‬776‫ א‬77 477‫ن‬77(677Yr- 77& 3‫(א‬377W

 KEE-Mail ServerF%&‫א)('و‬6‫א‬
(E-Mail Client) ‫ ﻋﻤﻴﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬1.1.1
m7Y
‫אא‬78‫و‬،EMail User Agent-MUA)‫^م‬7Z‫א‬76/ 7 ‫ ًو‬7,6?UZ6
 KEE-Mail ServerF %&‫א)('و‬6‫و دمא‬،‫^م‬Z‫ א‬I 3‫א‬
 W%8%&‫א)('و‬6‫ א‬4Fƒ •‫و‬
‫^אم‬7 EE-Mail ServerF‫ دم‬7“‫א‬M76‫א‬H 7ZS776‫'
عא‬7‫•א‬
 KEPOP3F6‫א‬0(‫ ل‬O‫و‬/
 K‫›= ل‬+‫א‬-  `‫א‬zaً‫ دא‬I‫ ƒ א‬/‫šא‬3n•
76‫ ل&` א‬O/‫ ^אم‬EE-Mail ServerF‫א“ دم‬za ƒ /‫ <א‬ZO•
KESMTPFš Z3‫א‬
K%&‫א)('و‬6‫ مא‬c&M%&‫א)('و‬6‫ א‬4dLE1-1F (‫א‬yn6
 

 ‫אوאאאאد‬W
‫אدא و‬ 16
Microsoft ?q 777&/%777&‫א)('و‬7776‫ א‬777 4q‫א‬/777U7774777‫א‬777
.?wr‫و‬/(6 ? /WE1F?Outlook

(E-Mail Server) ‫ ﺧﺎﺩﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬2.1.1


Jx7‫א‬78‫ و‬KEMail Transfer Agent–MTAF76‫ א‬7`& 7 ‫ ًو‬7,6?U7Z6‫و‬

%7&‫א)('و‬76‫אدمא‬7 za‫و‬7%&‫א)('و‬6‫ لوא= لא‬3`‫`م א‬6


 KEInternetF  ‫(א‬3‫א‬U4\/ ‫א‬
Microsoft Exchange ?q &/%&‫א)('و‬6‫אدمא‬ q‫א‬/U4‫א‬
 K?wr‫و‬/(6 ? /WE2F?Server
776‫ مא‬77c&M%77&‫א)('و‬776‫ دمא‬77 d77LE1 J1F (77‫ ًא‬7 ,6?y77n6
 K%&‫א)('و‬

 ‫( ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬1-1 )‫ﺍﺷﻜﻞ‬

 Ewww.microsoft.com/outlook/F  ‫(א‬3‫א‬U4q &‫א‬dLE1F


 Ewww.microsoft.com/exchange/default.mspxF  ‫(א‬3‫א‬U4q &‫א‬dLE2F
‫‪17‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺒﲏ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ ‬ ‫‪2.1‬‬


‫)‪(Web-based E-Mail – webmail‬‬
‫‪'(a6/ %8‬و&‪ 7bOp+7%7‬ل‪p7 7‬ل‪y]7b‬א‪(37‬א  ‪7‬‬
‫‪y]b Y r œ6}،EInternetF‬א‪(3‬א  دو=‪ 4‬א‪6‬א)('و&‪ K%‬‬
‫א‪U4‬א‪6‬א)('و&‪%‬א‪U4‬א‪(3‬א  ‪?Gmail?7 7‬‬
‫‪Egoogle.comF? 77

? /77W77Egmail.comF‬؛ ‪My777777n778 77‬א‪ (777777‬‬
‫‪ KE2-1F‬‬
‫ ‬

‫ﺷﻜﻞ ‪ 2-1‬ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺒﲏ ﻋﻠﻰ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ‬


 

 ‫אوאאאאد‬W
‫אدא و‬ 18

‫ﺑﺮﻭﺗﻮﻛﻮﻻﺕ ﺗﺮﺍﺳﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬ 3.1


 77 L-p 77O‫و‬/‫د‬77
‫مو‬B776،%77&‫א)('و‬776‫ مא‬77c&M776‫ א‬77‫'א‬
7 7 r‫ دم?و‬7“‫ وא‬7 ‫א‬.‫א‬، ‫א‬/O 4M_/Œ (UIZ6،+œ }
%7 &‫א)('و‬776‫ لא‬3`77‫א‬777 (~ O}+‫د‬77‰-‫א‬77" ‫ ع‬773O‫ א‬77Cp 7 ‫אدم‬77“‫א‬
Km =a‫و‬
‫ ﺑﺮﻭﺗﻮﻛﻮﻝ ﻧﻘﻞ ﺍﻟﱪﻳﺪ ﺍﻟﺒﺴﻴﻂ‬1.3.1
(Simple Mail Transfer Protocol - SMTP)
(377‫א‬U774%77&‫א)('و‬776‫ א‬77‫'א‬7 ’ — ‫א‬%77 `‫لא‬77 O‫אو‬778
7`i‫א‬7` h‫وא‬1 821 <7L=ERFCF- 7` ‫א‬07Œ` hm]6/O‹‫و‬،  ‫א‬
 K2 1123<L=
U74š Z3‫א‬6‫ ل&` א‬O‫و‬/-$ bO‫א‬%&‫א)('و‬6‫  אدمא‬3`ZO
<L=g O(‫وא‬KE3-1F (‫א‬Myn8  ،EPort 25F25<L=x]I‫א‬
K‫א“ دم‬/6 3Lx]I‫א‬
‫ ﺑﺮﺗﻮﻛﻮﻝ ﻣﻜﺘﺐ ﺍﻟﱪﻳﺪ‬2.3.1
 (POP3 – Post Office Protocol)
776‫'
عא‬77$%77&‫א)('و‬776‫ א‬77 4m^77Z6Jx77‫لא‬77 O‫א‬778
<77L=- 77` ‫א‬077Œ77` h‫ل‬77 O‫אא‬x778F776/O‹K‫ دم‬77“‫א‬77%77&‫א)('و‬

 KEhttp://tools.ietf.org/html/rfc821F` h‫^א)('و& א‬ZI‫א‬E1F


 KEhttp://tools.ietf.org/html/rfc1123F` h‫^א)('و& א‬ZI‫א‬E2F
‫‪19‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‪ K1 1939‬‬


‫‪Šً 4‬نא‪3<L/‬א<א‪ O‬ل‪zag6‬א‪^7ZI‬א@  ‪7‬א‪7^7Z‬‬
‫‪x8‬אא‪ O‬ل‪،‬و‪%8‬א‪^ZI‬א ‪ K‬‬
‫‪77  3`77ZO‬אدمא‪776‬א)('و&‪%77‬א‪/-$ 77bO‬و‪77 O‬ل(‪077‬א‪U774776‬‬
‫‪My7n78 7 ،EPort‬א‪KE3-1F (7‬و(‪?7‬ن‪g776‬‬ ‫א‪110F110<7L=x7]I‬‬

‫‪/6‬א“ دم=‪<L‬א‪ Kx]I‬‬

‫‪POP3‬‬ ‫ﺷﻜﻞ )‪ (3-1‬ﻣﻨﺎﻓﺬ ‪ SMTP‬ﻭ‬

‫‪ 4.1‬ﺍﺳﺘﺨﺪﺍﻡ ﻧﻈﺎﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﻧﻈﺎﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ‬


‫א<א‪ "I‬ق‪8‬א‪.BX‬א‪I4M?@?p4%OŠ6Jx‬אنא‪76‬א)('و&‪K%7‬‬

‫‪E3F‬א‪^ZI‬א)('و& א‪. Ehttp://tools.ietf.org/html/rfc1939F` h‬‬


 

 ‫אوאאאאد‬W
‫אدא و‬ 20
 K?abc.com?8?xyz@abc.com?J6‫אنא‬I‫" ق‬I‫ًא<א‬pr
- 7&(‫א‬7S?78EDomain Name System - DNSF- 7L "I‫א‬. 7˜?‫ م‬7c&

K 7YI  7 r 7 ( (7 7O‫ אدم‬+4‫(ن‬6‫و‬،  ‫(א‬3  ‫א‬


v7 S،6/7‫ א‬7YI6‫ و‬I4‫و‬- 7L "I‫א‬. 7˜?7š/7‫א‬78‫ م‬cI‫אא‬x8-  <8?
f= 734‫א‬7(m7&aJ?،m707Œ ^‫אدא‬/7‫ دمא‬7^J/‫אنא‬I‫א‬r/$
‫د‬77‫א‬7
‫אن‬7I4‫ ل‬7‫ א‬37U7rK7  ‫(א‬3737ZI FO C‫د א‬
- & ‫و‬،E213.230.10.197F C VZ‫א‬J/‫אنא‬I‫א‬Ewww.ksu.edu.saF
 7 ،- 7L "I‫א‬. 7˜?‫אدم‬7 7S?M‫م‬ppS ‫و‬+‫(ن
د‬Ofx8š/‫א‬
 KE4-1F (‫א‬Myn8
 

 
‫( ﺍﻻﺳﺘﻌﻼﻡ ﻣﻦ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ‬4-1) ‫ﺷﻜﻞ‬
 
‫م‬p7$‫א‬%78- 7L "I‫א‬. 7˜?‫ م‬7c& Y7`6t7‫\א‬/ ‫א‬- “‫\א‬Sa
/7 ?E 7I8‫ن‬7(67`rK‫" <&" ق‬3O/‫א‬%&‫א)('و‬6‫ אدمא‬. ˜?4
21
 

 ‫אوאאאאد‬W
‫אدא و‬

gr7 7a7‫ذ‬.‫و=א‬037Z‫دא‬76‫و‬،7S‫ قوא‬7"&<7)%7&‫('و‬a76/‫ دم‬7 


‫אدم‬7“‫א‬7‫ ق‬7"I‫<א‬7‫א‬U74+g7(‫א‬- 3"‫ א‬d6‫ز‬O‫ض‬/+4 Z‫אدم‬
 KE Failover‫?و‬،Backup F Œ S‫ אدمא‬gr‫?و‬،ELoad BalancingF
. 77˜?‫ دم‬77 ‫{ن‬77r،%77&‫א)('و‬776‫אدمא‬77“377ZI ‫م‬p77$‫א‬77 SM
Mail exchange Records F? ƒ /‫ دلא‬3O-pV?77_/O-pVZ‫د‬/6- L "I‫א‬

 .E– MX records
 
‫ ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ‬5.1
(Mail exchange records – MX records)
<œ ’7Z— ‫א‬76‫و‬B7‫وذ‬، 7/‫ لא‬7b6a7 ]  ƒ /‫ دلא‬3O-pV‫žد‬
preference F‫ دم‬7  (% ,]O<L=d œ3œ`Z}%&‫א)('و‬6‫ אدمא‬. ˜Š
 KEnumber
 
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪22‬‬

‫ ‬

‫ﺷﻜﻞ )‪ (5-1‬ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ‬


‫א‪/‬ضא‪<L/7‬א]‪07 O/O78% 7,‬א“‪7‬אدم‪ 7  7(rK‬ن=‪<7L‬א]‪ 7,‬‬
‫‪ 7‬‬
‫?‪w77& /77#‬א‪77  S‬א‪ 77#OM77 ?‘ 77VI‬א‪، 77/‬و‪x77C‬א‪{77r‬نא“‪ 77‬دمא —‪œ /‬‬
‫Ÿ ولא‪ bO$‬ل?و‪dً$‬א“ دمذ‪J‬א‪<L/‬אد&‪{r،U‬ن‪yVI6 ‬א‪ bO$‬ل‪037Zm7‬‬
‫ ‪ Ÿm&{r‬ول‪d‬א“ دمא‪Myn8  ،m 6Jx‬א( ‪ KE5-1F‬‬

‫‪ 6.1‬ﻫﻴﻜﻠﻴﺔ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ‬


‫‪(6‬نא‪6‬א)('و&‪B
?+4%‬א‪ W%8،.‬‬
‫• ﺗﺮﻭﻳﺴﺔ ﺭﺃﺱ ﺍﻟﺮﺳﺎﻟﺔ )‪(Header‬‬
‫وž‪U4J‬א‪- & 3‬א   ‬
‫‪، 7‬و‪7(6‬ن‪U74‬א‪W 7b‬‬
‫ ‪ WEFromF‬א‪I‬אنא‪œ /} J76‬‬
‫‪ J‬א —‪œ /‬‬
‫‪Kxsender]@[source domain namez‬‬
23
 

 ‫אوאאאאد‬W
‫אدא و‬


œ /} %&‫א)('و‬6‫א‬H ZS<‫א‬Wsender
 . /‫א‬mI-=#Jx‫" ق^ دمא‬I‫א<א‬Wsource domain name
ً 7&‫א‬I4J7Ÿ‫?ن‬7(‫و‬K 3œ`7Z} J76‫אنא‬7I‫ א‬:EToF 3œ`Z— ‫ א‬J
 777b‫א‬U7774 3œ`777Z— ‫אنא‬777I4‫ن‬777(6K3œ`777Z} 7774k‫?و‬،ً‫א‬777 S‫ًو‬p3œ`777Z}
K[receiver]@ [destination domain name]
  3œ`Z} %&‫א)('و‬6‫א‬H ZS<‫א‬Wreceiver
 .m a /‫} ’=دא‬Jx‫" ق^ دمא‬I‫א<א‬Wdestination domain name
%7&‫א)('و‬76‫ دمא‬7 7 7/‫ =א‬Z% b]O‫ ن‬WERouteF= Z‫ א‬J
،\/77 ‫ "א‬77‫ “אدمא‬77ً‫و=א‬/77، 3œ`77Z— ‫א‬%77&‫א)('و‬776‫ دمא‬77 za 7
œ /— ‫א‬
 7 4q‫א‬/7‫ض‬/7O$+‫ د‬74.U74‫א‬za ]7‫„א‬B‫ א‬ZZ‫א‬0ZS3O/
 Y7n/4‫^œم‬7Z— ‫ نא‬7({7(،76‫א‬d7ً+/W 3= Z‫א‬- & %&‫א)('و‬6‫א‬
= 77Y•a?= 77 ^ ،%7 &‫א)('و‬776‫ א‬77 4q‫א‬/77M+/r77-‫ =א‬77 776/Œ774
ً$ 77‫ض‬/776E7-1F (77‫وא‬K? 77

?%77&‫א)('و‬776‫ א‬77 4M? 77#‫א‬
 K= Z
 K /‫عא‬n :(Subject) ‫• ﺍﳌﻮﺿﻮﻉ‬
 K /‫ &”א‬:(Body) ‫ﺺ‬‫• ﺍﻟﻨ‬
 %&‫('و‬a6/ =E6-1F (W
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪24‬‬

‫ ‬
‫ﺷﻜﻞ ) ‪ (7-1‬ﻣﺴﺎﺭ ﺭﺳﺎﻟﺔ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ‬

‫ ‬
‫ﺍﻟﺸﻜﻞ )‪ .(7-1‬ﺑﻴﺎﻧﺎﺕ ﺍﳌﺴﺎﺭ ﰲ ﺭﺳﺎﻟﺔ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ ‪.‬‬

‫ا"! ا ‬
‫ر ) ا ا('&و  ‪  $‬ا ‪#$‬‬
‫)‪(Spam‬‬
‫ ‬
‫‪25‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫• ﻣﻘﺪﻣﺔ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬


‫• ﺃﺳﺎﻟﻴﺐ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬
‫• ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﻀﺎﺩﺓ ﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 26
 7Y]6/Ov7 S77/‫א‬g7%&‫א)('و‬6‫ = ƒ א‬b]‫אא‬x8L I6
 K- cI‫אدوא‬/r‫\א‬ZU4=‫א‬/n?m33ZO ‫و‬، Yr‫א‬8?‫و‬
7776‫ لא‬777=aM^777Z‫א‬0  777‫ א‬777b]‫אא‬x7778L 777I6777‫ذ‬777‫و‬
 K C+‫ د‬,‫א‬-‫א‬.‫א‬/
)‫وא‬،H/‫א‬g%&‫א)('و‬
 
‫ ﻣﻘﺪﻣﺔ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬1.2
(Spam)
‫ م‬77c&‫^אم‬77‫א‬+. 77a 77Y&Š77/‫א‬g77%77&‫א)('و‬7 6‫ ƒ א‬77=_/77O
7EBulkF 7ƒ 8<7 ‫ ل‬7={EElectronic Messaging SystemF7 &‫ ƒ א)('و‬/‫א‬
fx77C3œ`77Z— ‫ א‬773L7777/‫?وא‬77L‫?وא‬77"‫א‬g77‫אƒ و‬77‫ ƒ א‬77/‫א‬
Electronic F%77&‫א)('و‬776‫ مא‬77cIESpamF77 ‫ ط‬773O=‫ عא‬77W77`‫و‬K ƒ 77/‫א‬
 ƒ 777/š 777‫و‬J?U7774ً 7 7,6?7773"IO 777Y&a$a،EE-MailFً‫ =א‬777b ‫?وא‬،EMail
W  &‫א)('و‬
KEBlogsF- &‫•אو‬
KESMSF+gb`‫ א‬bI‫ ƒ א‬/‫•א‬
KEForumsF- 6I‫•א‬
KEWeb Search EnginesFvi3‫א‬- /‰•
 KEInstant MessagingF/W 3‫א'א א‬L%&‡‫•א'א א‬
 7Cp 7‫و‬،J= 7V‫نא‬p74)‫א‬8 ƒ /‫א‬fx8‫ض‬/‫(نא‬6 ً 3 
F  7(‫אمא‬7&$ً‫א‬/7c&،+7 8‫ز‬7](O‫و‬/7Z }‫ون‬76/6 74‫ن‬p74›‫ن‬7I‫Šא‬V6
7 &p4)‫א‬+‫ د‬7‫א‬B7 Y¤\7œ — ‫א‬U4 rK- &p4)‫א‬fxY+‫ د‬4"3O/‫א  א‬
27
 

 ‫אوאאאאد‬W
‫אدא و‬

 K\/ ‫نא‬p4)‫ ` =&ً ƒ א‬Pn]( ƒ =‫ م‬c&J?4 8/&‫و‬


 7Ofx8‫و‬،‫ ل‬S$  ƒ /‫א‬fx8 Y r ’ ZO}\/ ?‫אض‬/?ً ,6?E I8
7`6/"‫א‬fx787,O$v7 S ESocial EngineeringF7 4 
$‫א‬7IC‫א‬H wž
 3œ`7Z} 7I4J/73‫א‬%4 7
$‫א‬07& X‫ א‬7ZO =7`7 I`‫א‬-‫א‬/7ً$p‫א‬
‫ ن‬7 t7‫ ?א‬76gV &M7 ‫'و‬3‫א‬-‫ =א‬7$‫ ƒ ?א‬7=‫ع‬7I‫אא‬x8U4ً$ K /‫א‬
M%78-‫ =א‬7‫ א‬7
?77  ¥ 73 76i 7/‫ א‬3œ`Z} ‫ ع‬ILa YI_C‫א‬
d77r/F7y7] 7/‫ א‬3œ`7Z} ‫ ع‬7ILa7‫‰ و‬78/ †ً$ ‫و‬K 8‫א@` `و‬
M 77I ،67 rd7"`‫?و‬،+=77#‫?و‬،%7b&F7F77‫אא‬x778‫Šن‬7m77 Y6{ 7/‫א‬
 >KK‫وس‬gr8 ` `@‫א‬
 ƒ 777/‫א‬777ir (J‫د‬777Z‫Œ„א‬777‫א‬q 777&‫ א‬8=777#?1  ƒ 777bSaM
377Z&‫?ن‬377O،ENational Saudi Anti-Spam ProgramFE77/‫א‬g77F77  iL$‫א‬

 J‫ود‬B Y§‹t‫א‬- ‫א‬U4ً‫א‬. IH/‫א‬g%&‫א)('و‬6‫א‬


K `67ZO ƒ 7= 7Yc‫ ن‬7 ‫و‬،‫م‬2007‫ م‬7٪54w7EISPF  ‫(א‬3‫א‬
SMS F77/‫א‬g77+g77b`‫ א‬77bI‫ ƒ א‬77/‫א‬377Z&‫ ً?ن‬7,6? ƒ 77bS)‫א‬-/77Y•?‫و‬
w7 J6‫د‬Z‫א‬M‫`© ل‬I‫א‬FO C‫א‬%+‫אא=د‬- ‫א‬U4ً‫א‬. IESpam
٪5، I6‫د‬٪3،  ٪2،P6x٪20،6= ¤ YI٪65،‫م‬2007‫ م‬٪1.7
 .\/ ?‫אض‬/?-‫ذא‬٪5‫و‬،<Y‫Šאقא‬O
 

 I`O‫و‬-$ bO$‫א‬P 8،?6‫د‬Z‫ א‬/‫א(א‬M  iL$‫ ƒ א‬/8‫א‬/‫א‬dn‫` <א‬O? E1F


(http://www.spam.gov.sa/Statistics-Arabic.doc) ،‫م‬2008 J781429،- ‫א‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 28
7742 ESymantecF?&  77?W /77WmO=77#?1 J/Y77W/776/`O/77Y•?
76‫א‬37Z&‫?ن‬2007‫ م‬747/76‫א‬r/Y77/‫א‬g%&‫א)('و‬6‫= ƒ א‬
M‫و‬K%7 &‫א)('و‬776‫ ƒ א‬77=% 77§a77٪69 77H77/‫א‬g77%77&‫א)('و‬
377ZI‫א‬fx778‫?ن‬/77Y•?4 ECommtouchF?77O‫م‬77 ? /77WmO=77#?/77 †3 /776/`O
7 7== 7 140J? ٪87w72006‫ م‬74M‫و‬٪67w72005‫ م‬
 K2005‫ م‬44٪30 8=L+‫ د‬6B، == 160% §a
3777ZI 3rK- 777cI‫אدوא‬/777rª‫ ج‬7774‫ز‬a=777b777  ‫א‬3777ZI‫א‬fx7778 (777O
07& X‫א‬U7rK ƒ 7/‫א‬fx78 Yhœ7iO}‫?ن‬7(7 I?‫و‬7  = " ?E I8- cI
 W% ‫א‬
K]•‫ א‬3L Y ]bO‫ ƒ و‬/‫אא‬x8+.‫א‬/`ƒ ,‫א א‬- 4 •
 773L77 77YO.‫א‬/L77@ ƒ 77/‫אא‬x778«77]@ƒ 77,‫א‬77 I6B^‫א‬S 77Z‫•א‬
KEF•‫א‬F 3œ`Z— ‫א‬
E-Mail F%7&‫א)('و‬76‫ دمא‬7 U74J=‫و‬/7,‫א‬gETrafficFr‫•א‬
KcIEServer
Data Network F‫ ل‬777bO$‫א‬+ 777IL777ZJ=‫و‬/777,‫א‬g777EpY777$‫•א‬

(1) The State of Spam, A Monthly Report – February 2007, Generated by Symantec
Messaging and Web Security
(http://www.symantec.com/avcenter/reference/Symantec_Spam_
Report_-_February_2007.pdf)
 ESymantec.comF- ‫?א‬- ` 3"O‫ ل‬kMbb^ /W%8 E2F
(3) 2006 Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch® Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_
Trends_Year_of_the_Zombies.pdf)
 %&‫א)('و‬6- ‫?א‬- k/Mbb^ /W%8E4F
Ehttp://www.commtouch.comF
29
 

 ‫אوאאאאد‬W
‫אدא و‬

77L‫و‬KEInternetF77  ‫(א‬377‫א‬774‫ ل‬77bO$‫א‬77Zً 7,6?‫و‬،7cIEBandwidth


?7O‫م‬7 ? /7W74=‫ د‬7b‫א‬،2006‫ م‬71 /‫א‬g ƒ /‫א‬/6/`O/Y•?
F4 w77776 3 ‫א‬g7777O1700w(Y7777‫ ƒ א‬7777/‫א‬fx77778‫?ن‬2 ECommtouchF
MEImagesF=77b‫^אمא‬77‫و?نא‬2006‫ م‬774MEw776 5 77( 1,700,000,000
- 76 3‫א‬7g37 ‫د‬747=7b‫א‬m73"O 7EpY7$‫א‬37Z&dr=L ƒ /‫א‬fx8
KETextF‫ص‬bI &= `، Y …‫ و‬Yc]@EBytesF
+77i‫א‬- 776$  77 &=]  776$ 6/77‫א‬77P C‫ א‬77YO/
?6 77‫د=א‬M
 87S‫و‬7 (6/‫א‬- 7cI‫א‬w7]  ƒ 7/‫א‬77 4I‫א‬fx78‫?ن‬-/Y•? (6/‫א‬
F  (O‫ ƒو‬,‫א(]א)&
א‬fx8 O‫و‬،2007‫ م‬4Mً‫ =א‬13/ ?
 K ƒ /‫א‬fxCJb‫ز‬p‫وא`\א א‬،- k‫وא‬-‫אא‬
 W„‫א‬0& X‫א‬U4‫و‬
 76t7‫(א‬37‫ ًא‬7,6?‫و‬، 3œ`Z— ‫ زא‬Y
‫ض‬/O‫ ƒ ?ن‬/‫א‬fxC(•
 7/‫א‬d77`r/‫א‬- 7]‫א‬76/Œ4- ‫و‬g]‫א‬- V8 ‫ ز‬YX‫אא‬x8 Y 4

(1) 2006 Spam Trends Report: Year of the Zombies, December 27, 2006, Commtouch®
Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_Year_of_
the_Zombies.pdf)
 %&‫א)('و‬6- ‫?א‬- k/Mbb^ /W%8E2F
KEhttp://www.commtouch.comF
. ‫ ن‬1000„Oƒ‫  د‬E3F
 m?w?7‫א‬KEbitFw8‫(ن‬O‫و‬H @‫א‬M- ‫א‬6Bl‫ س‬L+S‫و‬%8EbyteF w6 E4F
K?0?‫??و‬1? a‫  ن‬L
. ‫ ن‬1„Oƒ‫  د‬E5F
. Ehttp://www.spamlaws.com/state/ca.shtmlF- bb^‫ لوא‬4ª &=]  =‫د‬E6F
 

 ‫אوאאאאد‬W
‫אدא و‬ 30
J‫د‬7O7Lt7‫وא‬، 7/ I,‫(א  א‬3‫=وאšא‬6/Œ4‫?و‬، &‫א)('و‬
+‫دود‬777`6/"‫א‬fx7778U7774ً$ 777‫و‬Km777 ž‫وس?و‬g777rF777x777 ]IOza 8=‫و‬777
y77r776/Œ74+‫ود‬77‫א‬fx778-/7&‫א‬K2004/6 77I6Mw]77 ‫א‬t7‫א‬،?MyDoom?
F7‫Šنא‬7 7/‫œ א‬3`7Z—‫ مא‬7Y6{7‫وذ‬،%7&‫('و‬a76/ 7=d77r/‫א‬F7‫א‬
‫א‬x7C 3`7Z‫א‬y7r7I4‫و‬،?MyDoom?+‫دود‬8` `@‫א‬M‫و‬/]%b&Fr/‫א‬
‫ ل‬7={ 7#)‫א‬/7h?7‫م‬7` r،+‫ود‬7‫א‬fx7Yً  by3b6f‫ ز‬Y
‫{ن‬rr/‫א‬F‫א‬
K1  i,‫ زא‬Y
M•]‰\/ ? &‫('و‬a6/6‫ و‬I4za /‫^א‬Z&
‫ س‬77I /76/‫ א‬77
?7 7Y r77/‫א‬g7 ƒ 7/‫^אمא‬77‫<א‬76<ƒ‫א‬/7

? 76gV &M7 ‫'و‬3‫א‬-‫ =א‬7$‫ ?א‬7/ ‫ ل‬7 S$‫ ƒ א‬7=%8‫و‬،]Ž_‫א‬8
K 7 `6/r?H7I
76=Y§M%& 7& ‫א‬J/7‫ א‬7`ً 7,6?‫وא‬K 8/ ‫ ذ‬Z‫א‬
¬7œ O’766‫א‬6‫ و‬7I‫א‬7 7ƒ 8<7( 7=‫ن‬7/‚‫ א‬7=? I4b`‫א‬fx8?3O
7876‫אא‬x7C ƒ‫א‬7‫א‬3œ`7Z— ‫א‬7‫ ن‬7 ‫و‬،2 7&‫א‬/‫א‬7_$‡‫א‬- P„Q
78‫و‬،76 m7IH7"‫א‬x7]&‫و‬x(‫א‬m 4w"&‫א‬Jx‫وא‬،6 & ‫א‬. 6/h‫א‬S?
‫ م‬7Lm7#‫و‬7I4‫و‬، 7 `6/r?H7I
6=Y§_ 6=?SŠ‫אن‰د‬I4za08x6‫?ن‬
76]‫אא‬7Z6  7‫و‬،mS‫א‬/7‫ق‬p7Œ)m78?76]‫א‬3 Œ‫و‬mr " ‫ن‬/‚‫א‬
 K3 H/‫א‬g6‫אא‬xC،m in‫( ن‬r،fL

 ?F-Secure?- ‫ ?א‬/W- ‫و‬g]‫א‬F#‫ و‬E1F


 KEhttp://www.f-secure.com/v-descs/novarg.shtmlF
 K `6/r?HI
6=YX6`I‫אא‬%8ERandF&‫א‬/‫ א‬E2F
“SA cops, Interpol ?‫אن‬I2004\ Z6‫\د‬31­6=  `6/r?HIX‫"א‬24= 3 ??+6/
E3F
http://www.news24.com/News24/South_Africa/News/0,,2-7-Fprobe murder
. E1442_1641875,00.html
‫‪31‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‪ 2.2‬ﺃﺳﺎﻟﻴﺐ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪﻳﺔ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬


‫‪x778L 77I6‬אא‪F77Ž.B77X‬א‪0  77‬א‪ 77=aM^77Z‬ل=‪ ƒ 77‬א‪776‬‬
‫א)('و&‪g%‬א‪K/‬‬

‫‪ 1.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻷﻭﻝ‪ :‬ﺑﺮﻳﺪ ﺍﻧﺘﺤﺎﻝ ﺍﻟﺸﺨﺼﻴﺔ )‪(E-Mail Spoofing‬‬


‫‪7777 O/7777`]6‬ل&`‪ 7777‬א‪77776‬א‪ 7777# zaESMTPFš 7777Z3‬א‪67777b‬‬
‫ ‪ 77() m77&a\?، 7‬ن‪ 77=a‬ل=‪77I4JŠ77 77‬אن‪776/‬‬
‫‪U774EAuthenticationF‬א —‪œ /‬‬
‫‪'(a‬و&‪6/Œ4%‬א‪'04p‬و‪?=Z6‬سא‪،EHeaderF /‬وž‪6‬א @` ??‬
‫‪EFromF‬א‪77I4 77Jx77‬אنא —‪œ /‬‬
‫‪ 77/ rK 77‬א` د‪77I47777‬אن‪'(a776/‬و&‪%77‬‬
‫‪K 77‬و‪x778‬אא‪‹077& X‬א‪ 77=aMmp77‬ل‬
‫‪/77, N77(O$‬و=‪ 77b^W77` `S+‬א —‪œ /‬‬
‫א‪g6‬א‪6/Œ4 H/‬א‪ S$‬ل‪،EspoofingF‬و‪fx8œ/}6‬א‪za ƒ 7/‬‬
‫א  =‪ I4‬و‪/6‬א‪L‬و‪?_/7b<7 ƒ 7W‬و‪/ /7W‬و‪،7r‬وذ‪ 7Y6a 7
7‬م‬
‫א —‪6Q 3œ`Z‬א‪ /‬و?&‪ L Y‬د‪h=b‬ق‪K‬‬
‫و‪ 77 Sp‬ط‪x77877‬אא‪77I‬ع‪77‬א‪77y77bI6 ƒ 77/‬م‪y77r‬א]‪- 77‬א‪77`r/‬‬
‫‪?،EAttachmentsF‬وא‪/‬وאš‪ELinksF‬א
د‪M+‬א‪a /‬ذא‪(O ‬א‪K7L /‬‬
‫‪- ] r‬א‪7(OL`r/‬ن‪gr‬و‪،- 7‬وא‪/7‬وאš‪7O7L‬د‪gr 7 žzaJ‬و‪?،- 7‬و‬
‫‪za `IO‬א‪ K bdL‬‬
‫ ‬
‫‪ 2.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ‪ :‬ﺧﺎﺩﻡ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻔﺘﻮﺡ )‪(Open Mail Rely‬‬
‫– אدمא‪6‬א)('و&‪ ƒ = 3`O%‬א‪6‬א)('و&‪=7bJ?%‬‬
‫ ن‪ za 8/6/‬אدم? ‪،\/‬و‪fx8‬א"‪M7Yw& `6/‬א‪ 76‬مאو‪(37z‬‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 32
O  ‫(א‬3‫א‬6‫ د‬4‫אً`א‬/c&%&‫א)('و‬6‫ ل= א‬b6a‫ ن‬,  ‫א‬
‫ دم‬7®‫ ل‬7bO$‫א‬U74=‫ د‬7Lg7 7/‫א‬m7I-=7#Jx7‫ دمא‬7“‫ نא‬7 ‫{ذא‬r،‫ م‬6‫א‬
‫ دم‬77 770776/L‘77]/77 †‫ دم‬77 za C 77b6am77& ({ 77L‫א‬U774m77&{r œ3œ`77Z— ‫א‬
K/7 †w7L‫و‬M /‫ لא‬b6aM‘]‫ ^ دمא‬,r?#/rE I8‫ (ن‬r، œ3œ`Z— ‫א‬
g7 ƒ 7/‫א‬%7
œ /}  73L7 Cp7‫ ‹א‬I?+/hw(W ‫א'א‬M ‡‫א‬fx8
7S]‫אدم‬7 ‫ن‬7(O76@‫אدمא‬7“‫א‬7ًp 7Lً‫دא‬74‫{ن‬7rx7ً‫א‬/c&‫؛و‬/‫א‬
E 7I8‫ن‬7S]‫אدمא‬7“‫א‬77‫ ƒ א` د‬7/‫ א‬3`6$6@‫א“אدمא‬6‫وא‬
./g ƒ /‫א‬fx8‫(ن‬O‫ ًŠن‬6Lً$ S‫א‬

‫ ﺍﻟﺮﺳﺎﺋﻞ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ ﺍﳌﻌﺘﻤﺪﺓ ﻋﻠﻰ ﺍﻟﺼﻮﺭ‬:‫ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻟﺚ‬ 3.2.2


(Image-based Spam)
J‫ ] د‬/‫&”א‬M=b‫א^אمא‬za/‫א‬g ƒ /‫א‬
œ /} ŠV6
7P 8U74”I7‫א‬7,O<76 7Y r‫و‬،%7bI‫\א‬7o‫א‬U74+7‫] א‬7b‫ א‬4
 K /‫&’”א‬M+=#
‫م‬77 ?W /77WmO=77#?2006‫ م‬771 7 /‫א‬g77 ƒ 77/‫א‬/776/`O/77Y•?
w7=7b‫א‬U74+‫א‬،/‫א‬g ƒ /‫א‬3Z&‫?ن‬2 ECommtouchF?O
7% §a٪70w(Y‫ א‬Y&?‫و‬/‫א‬g ƒ /‫دא‬4% §a٪35
7/‫א‬g7 ƒ 7/‫א‬7Y7Z‫א‬EData Traffic BandwidthF- 7& 3‫א‬r7O+ 7IL
(1) 2006 Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch® Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_
Year_of_the_Zombies.pdf)
%&‫א)('و‬6- ‫?א‬- k/Mbb^ /W%8E2F
Ehttp://www.commtouch.comF
33
 

 ‫אوאאאאد‬W
‫אدא و‬

 KEw6  V  1,700,000,000Fw6 ‫א‬gO1700W7+=`‫א‬


‫ ق‬7"&7EpY7‫א‬37Z&d7r= ƒ /‫א‬fx8M=b‫?نא^אمא‬3OL‫و‬
، Y7 …‫ و‬7Yc]@EBytesF- 76 3‫א‬7g3 ‫د‬4=b‫א‬m3"O - & 3‫א‬rO
  KETextF‫ص‬bI &= `
Optical Character Recognition – F ƒ7n_‫و‬/7@‫א‬U74_/7‫א‬4 7Z67L

EpatternsF/8 77c‫א‬U774_/77Eheuristic methodsF77 36/V‫قא‬/77"‫وא‬ EOCR


 ƒ 7/‫א‬7‫ع‬7I‫אא‬x78 7J7b‫א‬M‫ ƒ ( ‰ود‬/‫] א‬bOM^Z‫א‬
K=7#7P 8U74‫ص‬7bI‫… א‬M+`ً$ (W?x ? Yc‫ ن‬،/‫א‬g
 W‫ א ل‬3Ur
K = (<V@‫”وא‬I‫( א‬W‫אنو‬g O•
K_‫و‬/@‫ א‬br•
K/ = (FŽ‫ن‬+=b‫א‬U4&d`dn‫•و‬
 K /i‫=א‬b‫•א^אمא‬
7 ?‫^אم‬7 r،/‫א‬g ƒ /Jb r wZ  8S‫] و‬b‫א‬
M77 r77V &%" 7،77/‫א‬g7 ƒ 77/+‫ د‬7,‫א‬-‫א‬.‫א‬/77
)‫א‬777(¯=7L
 K(¯=L L?za/‫א‬g ƒ /‫א` א‬
 7،š7`r=7b ”I7‫جא‬B77I47/‫א‬g7 ƒ 7/‫א‬%œ/}FL6$
ƒ 7h‫א‬- 7]M”I7‫א‬7, ،\/7 ?- ]- P 8¥ #‫א^אم‬za\6
Microsoft F?wr7‫و‬/(6 ?70(‫א‬q‫א‬/- ]¥ #za‫?و‬،EPDFFo‫א‬
 KEXLSF‫و‬EDOCF EOffice
 
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪34‬‬
‫‪ 4.2.2‬ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ‪ :‬ﻫﺠﻤﺔﺍﻟﻘﺎﻣﻮﺱ )‪(Dictionary Attack‬‬
‫ ‪7‬א‪g77776‬א‪H77/‬א`‪ 77‬س‪ 77I477lM‬و‪776/6‬‬
‫‪^77Z677L‬م }‪œ /‬‬
‫‪'(a‬و& ‪،‬وذ‪. 7˜?r 7na76/Œ747‬ذא‪+=Y7- 7L "&. 7˜U7I-‬؛‬
‫و‪fxY‬א"‪(6`6/‬ن‪ I4‬و‪'(a6/6‬و& ‪ K‬‬
‫א˜ ‪.‬א‪ 4VI‬د‪(O +‬ن‪ L‬س˜‪. 7‬و?`‪K+=Y7H 7‬و‪U7S‬‬
‫‪a‬ن &‪<cw‬א˜ ‪.‬א‪
gVI‬د‪M+‬אא‪?$adL‬نא‚‪Y‬د‪iZ6‬א‪x3‬ل‪M‬‬
‫‪l‬و‪4‬د‪ L‬א‪ I‬و‪6‬א‪Œ 7Zza/cI 7i ib‬א"‪ 7°aM7`6/‬د‪fx78‬‬
‫א‪ I‬و‪ K6‬‬
‫و )( نא‪U74_/7‬א‪ 7I‬و‪6‬א‪74k7" 7I‬א‪ 7I‬و‪6‬א‪77VI‬‬
‫א` س‪ ،‬نא‪/7‬د‪U74‬א‪?، 7/‬و‪d73O‬א‪/7‬אšא‪”7’&M7,‬א‪%7"6 7/‬‬
‫‪ 7=a7I4m^7Z6 7‬ل‬
‫ ‪?U4‬ن‪6/‬א —‪ 7° ،š 7& 3œ`Z‬א —‪œ /‬‬
‫د‪œ /} $‬‬
‫א‪6B‬א‪ K/g ƒ /‬‬

‫ﺍﻹﺟﺮﺍﺀﺍﺕ ﺍﳌﻀﺎﺩﺓ ﻟﺮﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬ ‫‪3.2‬‬


‫‪x8L I6‬אא‪FŽ.BX‬א)
‪/7‬א‪.‬א‪-‬א‪ 7,‬د‪ ƒ 7/+‬א‪76‬א)('و&‪g7%7‬‬
‫א‪K/‬‬
‫ ‬
‫‪ 1.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻷﻭﻝ‪ :‬ﺍﻟﺘﺼﻔﻴﺔ)‪ (Filtration‬‬
‫‪77(O‬ن‪ ]77bO‬א‪ ƒ 77/‬א‪776‬א)('و&‪ 77?U774%77‬س?‪B77
?77S‬א‪.‬א‪ 77/‬‬
‫א  ‪ W‬‬
‫•?‪/O- 77&(77S‬و‪?=77Z6‬سא‪،EHeaderF 77/‬و‪77I4 77YI‬אنא —‪ 77œ/‬‬
‫‪ KEFromF‬‬
35
 

 ‫אوאאאאد‬W
‫אدא و‬

 KESubjectF /‫عא‬n•
 KEBodyF /‫•&’”א‬
7 7r² /± — ‫ <א‬7`‫\א‬7Sad7‫ دم‬7`‫א‬76‫ ƒ”א‬7b \7Saw` "O‫{ذא‬r
‫=?س‬77Z6‫'و‬377ZI +‫د‬77‰< 77L‫?و‬،7 &‫('و‬a776/6‫ و‬77I  77Y&?U774 ]77b‫א‬
‫{ن‬77r”’I7‫ع?وא‬77n377ZI Eregular expressionsF77rŠ-‫א‬g377O‫ ?و‬77/‫א‬

 K‫אא=د‬6‫אא‬x8‫א=אًŠن‬/Lx^6‫א“ دم‬
 7YI(،7/‫א‬g7 ƒ 7/J7b7`3"‫א‬-‫א‬.‫א‬/
)‫א‬/ ?%8 ]b‫א‬
77# ، ]7b‫א‬7 4 7Y 4+7‫א&א‬7`-‫ وزא‬7V‫א‬6n/4
&‫א‬77LM6g377 ‫ `و‬77L‫(&ند‬6 77+‫ د‬7746x77‫א‬77/‫א‬g77 ƒ 77/‫א‬%77/
K1  ]b‫א‬
 
Black lists ) ‫ ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀﺎﺀ ﻭﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺴﻮﺩﺍﺀ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ‬2.3.2
(/ White lists
- 77L "&. 77˜?‫?و‬،7 &‫('و‬a776/6‫ و‬77I4U774.‫دא‬77Z‫א‬77ƒ `‫א‬J77ž
7776/‫אدم‬77“EIP addressesFw777&'&$‫لא‬777 O‫و‬/6‫ و‬777I4‫?و‬EDomain NamesF

‫ل‬p7 7=‫و‬/ 6‫ و‬I‫א‬O‫ ƒ א)('و& א` د‬/y’ Z6}$، &‫('و‬a


77S?d77‫ دم‬77`‫א‬%77&‫א)('و‬776‫ ƒ”א‬77b \77Saw77` "O‫{ذא‬77rK œ3œ`77Z— ‫ دمא‬77“‫א‬
za=‫و‬/ 7m7y’ 7Z6}$‫و‬،.‫دא‬7Z‫א‬7ƒ `‫א‬7‫(ن‬6m&{r L‫א‬U4ƒ `‫א‬/# I4
 K œ3œ`Z— ‫א‬6/

(1) M. Gupta, C. Shue, "Spoofing and Countermeasures", Book chapter in "Phishing and
Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft",
edited by Jakobsson and Myers, 2006, Wiley.
 

 ‫אوאאאאد‬W
‫אدא و‬ 36
 ƒ 7/‫] א‬7b 3œ`7Z}37ZI %7&‫א)('و‬76‫ دمא‬7 ‫אد‬4a‫ )( ن‬
]I7b‫ ƒ א‬7/‫–א‬r/f‫אد‬4a(ً ,6?‫و‬،.‫دא‬Z‫א`אƒ<א‬U4‫ د‬4$ ‫א` د‬
Junk F77+‫ د‬74_/6 œ3œ`Z— ‫א‬H ZSM‫ ص‬ kz‫ א‬Y`&‫?و‬.‫دא‬Z‫א` ƒא‬
 /‫א‬. `{ a œ3œ`Z} @‫א‬fx8M=‫א‬/`‫א‬E/O‫و‬ESpamF‫?و‬EBulkF‫?و‬EE-Mail
 K YrxS‫?و‬
776 rK.‫دא‬77Z‫אƒ<א‬77`‫א‬77ً 7  …N77(‫א‬U774%77Yr. 77, 3‫אƒ<א‬77`‫ א‬77?
\77Saw77` "O‫ذא‬a=‫و‬/ 77m77y’ 7 Z6}،.‫دא‬77Z‫א‬77ƒ `‫ א‬77Œ‫ن‬a‫و‬U77S،‫ دم‬77`‫א‬
77 Š‫ نא‬7,7‫وذ‬، 7L‫א‬U74. 7, 3‫א‬7ƒ `‫א‬/7# I47S?dmbƒ b
m] IbO‹‫ن‬a‫و‬US، œ3œ`Z— ‫א‬6/H ZSzaY_‫א‬/Œ?‫א` دم‬6‫لא‬#‫و‬
%78. 7, 3‫אƒ<א‬7`‫^אمא‬77$\/7 ?7`6/ŒE 7I8‫و‬K.‫دא‬77Z‫א‬7ƒ `‫א‬7n7
M+‫د‬7o‫אدمא‬7“‫?وא‬- 7L "I‫?وא‬6‫ و‬7I‫א‬77‫א` د‬76‫ ƒ א‬7/š`r‘ Z‫א‬
. 7, 3‫א‬7ƒ `‫א‬7n7FI7bO t7‫ ƒ א‬7/‫ذא‬g‫و‬،. , 3‫א` ƒא‬
7`6/ŒM 7 ،‫^œم‬7Z— ‫א‬H 7ZSM‫ ص‬7“‫א‬7‚‫א‬za C 7b6a‫ ?و‬Y7,r=<76m&{r
 K.‫دא‬Z‫]  ^אمא`אƒ<א‬b‫א‬
]Ib‫ ƒ א‬/‫_א‬xS J‫`^ دم‬-‫אدא‬4{‫ و‬J‫א“ دم‬/6‫{( ن‬
U774ً‫א‬. 7I œ3œ`77Z— ‫א‬H 7ZSM‫ ص‬7 77kza Y7`&‫?و‬.‫دא‬7Z‫א‬77ƒ `‫א‬7ً 7  °a
. 7I‫و‬،.‫دא‬7Z‫א‬7ƒ `‫وطא‬/73ZI +‫ אא=د‬/‫ <א‬±²̀ O}v SEscoringF< `‫א‬
7
=‫د‬w& ‫ذא‬a+‫ د‬4‫و‬K Y`&‫ ?و‬/‫_א‬x³=‫א‬/`‫א“ دمא‬x^6< `‫د=
א‬U4
‫ ?و‬Y7,r=<76m7&{r، 7/‫א‬U74w7`3"&‫א‬L‫وط‬/‫<א‬c‫ن‬aJ?،  4< `‫א‬
7ًp 7Lً‫دא‬74‫?ن‬J?،7 &œ} < 7 `‫א‬7
=‫د‬w& ‫{ذא‬rKN( N(‫وא‬K YrxS
 K œ3œ`Z— ‫א‬H ZSM‫א‚א“ ص‬za Y`&<6m&{r، /‫א‬U43"&‫א‬L‫وط‬/‫א‬
37
 

 ‫אوאאאאد‬W
‫אدא و‬

g7 ƒ 7/J7b7 r g7 87S‫و‬. 7, 3‫אƒ<א‬7`‫وא‬.‫دא‬Z‫א`אƒ<א‬


 7`O 7Y&{r. , 3‫`אƒ<א‬3ZI3 rKً ƒ bSa YI `‫א‬M4 ZO ´a‫و‬،/‫א‬
 ƒ 77/‫<א‬7c‫'אض?ن‬r 7Efalse positivesF77‫א( ذ‬7  °)‫א‬qƒ 7I‫א‬µ‫و‬7S7

<ƒ‫א‬7`‫^אمא‬7‫ ًא‬7,6?‫و‬، œ 7œ/— ‫א‬r/± } ‫و‬+g#4k '/‫א‬


 K ƒ /‫] א‬bOM.‫دא‬Z‫ & א` ƒא‬hS/ . , 3‫א‬

Commercial ) ‫ ﺍﻟﻘﻮﺍﺋﻢ ﺍﻟﺒﻴﻀـﺎﺀ ﺍﻟﺘﺠﺎﺭﻳـﺔ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻟﺚ‬3.3.2


(Whitelists
776‫א‬77 ‫œم‬7 `} 77‫`?و‬77Z- 77Y
"77‫ عא‬773}O<ƒ‫א‬77L77c&?%778
 K œ3œ`Z— ‫א‬zaf6/‫ل‬#‫ نو‬, 
œ /— ‫א‬mr6% ¥3  `%&‫א)('و‬
،EscoringF< 777 `‫א‬%7778777c&‫א‬fx7778 777M^777Z‫א‬0  777‫א‬777
=77b77 77Y&Š 77/‫ ”א‬/77O77‫ذ‬U774. 77I‫و‬،EcertificatesF-‫ دא‬Y77‫وא‬
 K œ3œ`Z— ‫א‬6/za=‫و‬/ yVIO‫و‬،‫ق‬h

(Integrity Check) ‫ ﺍﻟﺘﺤﻘﻖ ﻣﻦ ﺍﻟﺘﻜﺎﻣﻠﻴﺔ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ‬4.3.2


M‫^’م‬7Z6}Jx7‫א‬ESMTPFš 7Z3‫א‬76‫ א‬7`&‫ل‬7 O/‫&  ` ً?ن‬/ ‫  ذ‬
67777b‫ א‬7777# 7777`]67777  ‫(א‬37777‫א‬U77774%7777&‫א)('و‬77776‫ א‬7777‫א‬/O
œ /— ‫אنא‬77I4% 77 ‫و‬،EAuthenticationF
‫ ً?و‬i i77#‫ن‬77(6‫?ن‬+=‫و‬/77, N 77K 7
76/‫אن‬7I4J? 7œ/— ‫ א‬7`SMd7,6”^WJ( r، 
œ /— ‫ א‬b^WN(6
77477/‫א‬g77 ƒ 77/‫ لא‬77=aM Cp77‫‹א‬77 I‫א‬+/77‫א‬fx778‫و‬،%77&‫('و‬a
 .EspoofingF‫ ل‬S$‫א‬6/Œ
 

 ‫אوאאאאد‬W
‫אدא و‬ 38
‫=?س‬7Z6‫و‬/O 7 ž6/Œ4  (‫`א‬i ƒ /‫”א‬ir‫ )( ن‬
d77EFromF?77?777‫ א‬77`SM= x77‫ א‬77
œ /— ‫אنא‬77I477&= `‫و‬،EHeaderF 77/‫א‬
M4 77ZO77`6/"‫א‬fx778KEReceivedF?‫ ?وא=د‬77`@‫א‬M7 Z6‫و‬/OM+‫د‬77
‫א‬77 `‫א‬
 K1 /‫א‬g ƒ /‫א  _א‬
‫ ﲢﻮﻳﺮ ﺍﻟﻌﻨﻮﺍﻥ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ‬5.3.2
(377‫א‬- i]77#Mw77& .‫א‬77،7  ‫א‬d77L‫אא‬MJ776‫אنא‬77I‫א‬77 
q‫א‬7777n/4 Y77° 778g‫?و‬،‫ ش‬77`I‫א‬- 774k‫?و‬،77h‫ د‬o‫_א‬/77‫?و‬،77  ‫א‬
g77776‫ لא‬77=aM‫^م‬77ZOt77‫א‬%77&‫א)('و‬776‫א‬6‫ و‬77I77 ‡‫א‬d77 V‫א‬
 77 7Y§J‫ د‬7]%7&‫א)('و‬6‫אنא‬I4/6ž.‫א‬/
a/Y•‫א‬xC‫و‬KH/‫א‬
 K ‫א‬dL‫אא‬MJ6‫א‬m&‫א‬I4 (”^‫א‬/"n‫ذאא‬aq‫אא‬fx8
77(‫?@?وא‬B/ 7 ?at?W7(‫אلא‬377‫א‬.‫א‬/7
)‫א‬fx78U747‫א‬7
،?xyz at abc dot com?/67i‫א‬7y37bO?xyz@abc.com?‫ ل‬7?K?"`I ،?dot?
_/7‫א‬7%7‡‫א‬%7&‫א)('و‬76‫א‬6‫ و‬7I4d ¤q‫א‬/d "ZO$`6/"‫א‬fxY‫و‬
 K‫אن‬I‫ لא‬b6‫א‬M‫ض‬/‫א‬-‫?د‬L‫(ن‬O Y&{r  ` ،m 4
Mً  7b&ً‫א‬B7=%&‫א)('و‬6‫אنא‬I4  .‫א‬/
)‫א‬fxC\/ ‫אא‬
 K‫אن‬I‫א‬U4_/‫א‡ א‬d V‫א‬q‫א‬/U4=x6%  ‫و‬،+=#F

‫ ﻋﺪﻡ ﺍﻟﺮﺩ ﻋﻠﻰ ﺍﻟﺮﺳﺎﺋﻞ ﻏﲑ ﺍﳌﺮﻏﻮﺑﺔ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺩﺱ‬6.3.2


EBulkFg3 ‫ د‬C =a<6/‫א‬g ƒ /‫{نא‬rF6/‫א‬M &/ ‫  ذ‬
–7za،/67`O 7L?U747‫و‬، C#‫? و‬U4 ƒ‫אא‬66‫א‬6‫ و‬I‫א‬

(1) Technologies to Combat Spam, Thomas A. Knox, GIAC Security Essentials


Certification (GSEC) Practical Assignment, Version 1.4b, Option 1, June 16, 2003,
SANS Institute 2003.
‫‪39‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ د‪?U747$‬نא‪/7‬د‪ 7L‬دم‬
‫‪fx8‬א‪ I‬و‪K6‬א‪/‬د‪U4‬א‪g ƒ /‬א‪%"6/‬א —‪œ /‬‬
‫‪I4‬אن& šو‪ K/g\/ ? 3`Z ƒ =MmZ r،%` `S‬‬
‫‪N]I‬א"‪{r`6/‬ن–א‪g ƒ /‬א‪=U4Jž/‬אš)زא‪7I4‬אن‬
‫ )‪ =a_ `6‬لא‪ ƒ /‬א‪ 3`Z‬א ‪7L،\/7‬‬
‫א —‪ œ3œ`Z‬א` ƒא‪œ /} 66‬‬
‫‪(6‬نא‪_C‬א@` `‪%‬و=א‪x8.‬אא‪/‬אš‪a 6ž8‬ذא ن‪I4‬אنא —‪ً " & œ3œ`Z‬‬
‫?م‪ K$‬‬
‫?‪ ƒ =d  `6/Œ ,r‬א‪g6‬א‪748/‬م‪ 7Yir‬وא)‪p7‬غ‬
‫‪M\/I  ، YI4‬א)
‪/‬א‪.‬א‪ ,‬دא‪ Kd Z‬‬

‫‪ 7.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ‪ :‬ﺍﻹﺑﻼﻍ ﻋﻦ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﻏـﲑ ﺍﳌﺮﻏﻮﺑـﺔ‬


‫)‪(Spam Reporting‬‬
‫‪4 Z6L‬א)‪p‬غ‪ ƒ 7=4‬א‪g776‬א‪M7/‬א` ‪ 7YI 7‬وא‪J7b‬‬
‫‪<6K C‬א)‪p‬غ‪fx7874‬א‪ 7bO$  ƒ 7/‬ل™`‪7‬م ‪7‬א‪76‬א)('و&‪ 7œ/— %7‬‬
‫א‪g /‬א‪7(K7/‬א‪7`U74_/7‬مא“‪77‬א‪<7‬א‪ 7"I‬ق‪M‬א‪7I‬אن‬
‫א‪K œ/}J6‬و  ‹ذ ‪{7rً ` 7f/7‬نא‪<7‬א‪ 7"I‬ق‪78‬א‪.B7X‬א‪7%OŠ76Jx7‬‬
‫‪77I4M?@?W77p4‬אنא‪776‬א)('و& ‪ًp77rK%7‬א‪<77‬א‪ 77"I‬ق‪77I‬אنא‪J776‬‬
‫?‪ 7() ?abc.com?8?xyz@abc.com‬نא@‪7b‬ل‪- 7& U74‬א‪ 7bO$‬ل‪J‬א‪<7‬‬
‫&" ق دم?‪ m§/O–1 ?WHOIS‬א‪(6? /‬ن؟?‪x78، J‬אא“‪ 7‬دم‬
‫Ÿ‪ VZO- & +4 LJ‬א‪ K- L "I‬‬

‫‪ bOp E1F‬ل‪xY‬אא“ دم‪B6‬مو


دوא
‪Y‬א^אم‪pp”bŽ 3"O6/Œ4 a‬م‪?،‬و‪4‬‬
‫א‪p$‬م ‪. Ewhois.netFWdL‬‬ ‫Œ‪S?6/‬אא‪U4dL‬א‪(3‬א  א‪`Ot‬م‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 40
 7 6Jx7‫א‬%7&‫א)('و‬76‫غ }`œم א‬pa8‫غ‬p›/ †\ZE I8
U7 r=‫אز=א‬77S?” 77bl^77Z‫غא‬p77)‫قא‬/77Œ77K œ3œ`77Z— ‫א‬776‫א‬0S 77#m77
- 7p‫ دم‬7“‫א‬7I4d7VO I4K‫غ‬p›%&‫א)('و‬6‫ א‬4M‫^œم‬Z— ‫א‬Y
‫وא‬
‫?و‬، 7/‫=א‬¹7b} ‫ دم‬7“‫غא‬pa YI،# -‫א‬.‫א‬/
ax^6m&{rmZ]&6‫א‬U4+g
 K\/ ? ƒ =‫= ل‬aًp3`Z(6pr،.‫دא‬Z‫א` ƒא‬M œ/— ‫אنא‬I4dn‫و‬
 7œ/}‘ 76‫و‬،77Sza7 r7/‫א‬g ƒ /+‫ د‬,‫`א‬6/"‫א‬fx8
 K/ †‫א^אمא<&" ق‬%  ‫و‬،/ † ‫`م‬za‫&` ل‬$‫ א‬Cp 
776‫א‬77  773L7777‫א‬E1 J2F (77‫א‬M1 %& 77 3‫<א‬77/‫א‬y77n6
 7773L‫ دم‬777“‫א‬za‫ دم‬777`‫א‬H777/‫א‬g7777776‫א‬3777Z&،2 EGmailF%777&‫א)('و‬
 ، ]7777777b‫א‬

 
‫ﻠﹶﻎ ﻋﻨﻪ‬‫( ﻧﺴﺒﺔ ﺍﻟﱪﻳﺪ ﻏﲑ ﺍﳌﺮﻏﻮﺏ ﺍﻟﻘﺎﺩﻡ ﺇﱃ ﺍﳋﺎﺩﻡ ﻗﺒﻞ ﺍﻟﺘﺼﻔﻴﺔ ﻭﻧﺴﺒﺔ ﺍﻟﱪﻳﺪ ﻏﲑ ﺍﳌﺮﻏﻮﺏ ﺍﳌﹸﺒ‬1-2) ‫ﺷﻜﻞ‬
(gmail.com ‫)ﺍﳌﺼﺪﺭ‬

(1) mail uses Google's innovative technology to keep spam out of your inbox”,
gmail.com, (http://www.google.com/mail/help/fightspam/spamexplained.html),
December, 2007.
. Egmail.comF  ‫(א‬3‫א‬U4„3%&‫('و‬a6/ ‫`م‬E2)
‫‪41‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫و&‪3Z‬א‪g6‬א‪H/‬א‪ 3LmI4¥3‬א —‪ Kœ3œ`Z‬‬


‫و  }‪/Yº c6‬א‪</‬א‪{r%& 3‬ن&‪3Z‬א‪g6‬א‪H/‬א‪ 7L? (7Om7I4¥73‬‬
‫‪4% §a٪1‬دא‪g ƒ /‬א‪ K/‬‬
‫ ‬
‫‪ 8.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻣﻦ‪ :‬ﺍﻟﺘﻘﻴﺪ ﺑﻮﺛﻴﻘﺔ ﻃﻠﺐ ﺍﻟﺘﻌﻠﻴﻘﺎﺕ ﻟﱪﺗﻮﻛﻮﻝ ﻧﻘﻞ‬
‫ﺍﻟﱪﻳﺪ ﺍﻟﺒﺴﻴﻂ)‪(SMTP RFC‬‬
‫‪’^77Z6}77L‬مא‪7777`i‬א"‪- 773‬א]‪77 I‬و‪77 O‬ل&`‪ 77‬א‪776‬א‪š 77Z3‬‬
‫‪MESMTPF‬א‪6‬אא=د` א‪g ƒ /‬א‪7/‬א` د‪77‬א“‪7‬אدمא‪t7‬‬
‫‪fxY `O$‬א"‪K- 73‬א‪%7œ/}776‬א‪g776‬א‪^7Z6H7/‬ن‪/7‬א‪q‬‬
‫=د‪?،P6‬و ‪<Y4 " N‬א` ‪- 73" 7‬א]‪7 I‬و‪7 O‬ل&`‪ 7‬א‪76‬א‪š 7Z3‬‬
‫‪`ESMTPF‬א‪M<Y6<(i‬א“ دمא‪/6Jx‬ن‪mI‬وא‪ 4Jx‬د‪(6 7+‬ن
‪ 7Y‬ز‬
‫‪‹ in‬א 'א‪KEHackersF/Ž 3LmL‬‬
‫ ‬
‫‪Fake MX‬‬ ‫‪ 9.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ‪ :‬ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺰﻳﻔـﺔ)‬
‫‪(Records‬‬
‫?‪7S‬א)
‪/7‬א‪.‬א‪-‬א‪ 77,‬د‪+‬א] ‪M7 ±‬א‪ ƒ 77/J7b‬א‪76‬א)('و&‪g77%7‬‬
‫א‪8/‬و‪ 3O-pVdn‬دل= ƒ ‪=7I4]6B‬د ‪ 7‬دم?˜‪. 7‬א‪U74- 7L "I‬‬
‫Œ‪0‬א‪p‬م‪ 4‬אدمא‪6‬א)('و&‪ "&<$%‬ق‪ K‬‬
‫و  ذ ‪ c&?W brM &/‬مא‪76‬א)('و&‪{7r?%7‬ن‪d7ً  7,]O 7L=E 7I8‬‬
‫ ‪M V‬א‪/‬د‪،‬و?نא‪/‬ض‪x8‬אא‪07 O/O8<L/‬א“‪7‬אدم‪ 7  7(rK‬ن=‪<7L‬‬
‫א]‪w7& /#? ,‬א‪7  S‬א‪ 7#OM7 ?‘ 7VI‬א‪K 7/‬و‪x7C‬א‪{7r‬نא“‪ 7‬دم‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪42‬‬
‫א —‪ Ÿ œ/‬ولא‪ bO$‬ل?و‪dً$‬א“ دمذ‪J‬א‪<L/‬אد&‪{r،U‬ن‪yVI6 ‬א‪ bO$‬ل‪m7‬‬
‫‪ Ÿm&{r 03Z‬ول‪d‬א“ دمא‪Km 6Jx‬‬
‫‪ 4&E I8‬نא‪-pVZ‬א‪ 4$ ]6B‬د‪U4‬א‪<L/‬א]‪ W VZ% ,‬‬
‫ ‬
‫• ﺳﺠﻞ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻷﺩﱏ ﺍﳌﺰﻳﻒ‬
‫)‪(Fake Lowest MX Record‬‬
‫‪774Š 7‬אد‬
‫&‪/7c‬אً"‪ ƒ 7=7 3‬א‪76‬א)('و&‪g7%7‬א‪’ /O} 7Y& M7/‬‬
‫‪ 774{ 877‬د‪ ‰+‬و‪77‬א‪ 77bO$‬ل®‪ 77‬دمא‪776‬‬
‫ ‪،+g377‬و‪077?M‬א‪ 77 S‬ن‪œ /}<77Y6$‬‬
‫א)('و&‪ SM%‬ل‪ r‬א‪ bO$‬ل‪`I6 ،‬ن‪za‬א‪I‬אنא‪J6‬א ‪ K%‬‬
‫‪ 3O V,O\b6‬دل‪ /#?% ,]O<L/F6B‬א‪M-pV7Z‬‬
‫א‪/77‬د‪ 77  773L77‬دم?˜‪. 77‬א‪077ŒU774- 77L "I‬א‪p77$‬م‪77 774‬אدمא‪776‬‬
‫א)('و&‪ "&<$%‬ق »( ‪ ± r‬ل‪g ƒ /‬א‪ K/‬‬
‫‪?0°‬ن‪ 73O V7/W6‬دلא‪ ƒ 7/‬אد&‪U7‬א‪7I4zaF76B‬אن ‪ 7‬دم&‪š 7‬‬
‫‪x77CEPort‬אא“‪ 77‬دم`‪ 77,ً 7‬نא‪p77‬مא‪ ƒ 77/‬‬ ‫‪77(6v77 ³‬نא‪25F25<77L=x77]I‬‬

‫א‪4š`r/‬א“אدمא ‪ K\/‬‬
‫ ‬
‫• ﺳﺠﻞ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﻷﻋﻠﻰ ﺍﳌﺰﻳﻒ‬
‫)‪(Fake Highest MX Record‬‬
‫‪œ/}.J36L‬א‪g ƒ /‬א‪ ‰/‬وא‪ bO$‬ل‪d7‬א“‪ 7‬دمذ‪J‬א‪<L/7‬‬
‫א]‪% ,‬א‪ً$U4‬א“ دمذ‪J‬א‪<L/‬א]‪% ,‬אد&‪ S$U‬ل ‪7 78g37‬ن‬
‫א“ دمذ‪J‬א‪<L/‬א]‪% 7,‬א‪ U74‬د‪ً 7‬א‪/7d7ً 7 Œ S‬א‪7ir (7 4 r 7L?q‬‬
‫‪43‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫א‪g ƒ /‬א‪d&= `/‬א“אدمא ‪ K\/‬‬


‫‪ 3O V,O‬دل‪ U4?% ,]O<L/F6B‬א‪M-pVZ‬א‪/7‬د‪7‬‬
‫œ‪  3’L‬دم?˜ ‪.‬א‪0ŒU4- L "I‬א‪p$‬م‪ 4‬אدمא‪6‬א)('و&‪<7$%‬‬
‫&" ق ]  ‪xCJb‬אא‪ =aMH‬لא‪g ƒ /‬א‪ K/‬‬
‫‪ 3O V‬دلא‪ ƒ /‬א‪U4‬א‪(6LF6B‬ن‪?،_»/g‬و‪7I4zag6‬אن‬
‫‪/‬و‪ O‬لא&'&‪?،Edead IP addressF  w‬و‪I4za/W6‬אن دم‪v7 ³%` `S‬‬
‫‪(6‬نא‪xEPort 25F25<L=x]I‬א“ دم` ً‪K‬‬
‫‪(6‬ن‪p  3"O‬א‪4I‬א‪-pVZ‬א‪/7
a7]6B‬א‪ 7,.‬دאً?‪M 7 ، 7,r‬‬
‫א( ‪ KE2 J2F‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (2-2‬ﻣﺜﺎﻝ ﻋﻠﻰ ﺳﺠﻼﺕ ﺗﺒﺎﺩﻝ ﺍﻟﺮﺳﺎﺋﻞ ﺍﳌﺰﻳﻔﺔ‬

‫‪ 10.3.2‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﻌﺎﺷﺮ‪ :‬ﺗﺄﺧﲑ ﺍﻟﺘﺮﺣﻴﺐ)‪ (Greeting delay‬‬


‫‪ 7  73L7+g7bL+']/ ŠO8‬دمא‪76‬א)('و&‪%7‬א —‪ 73L 3œ`7Z‬‬
‫א‪/‬د‪0ŒU4‬א‪ bO$‬ل دم‪'(a6/‬و&‪ K/ †%‬‬
‫Œ‪ً 7 `3‬א‪- ]77#‬א]‪77 O77 I‬ل&`‪ 77‬א‪776‬א‪77m77&{r،ESMTPFš 77Z3‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪44‬‬
‫Œ‪0‬א‪ bO$‬ل‪{r‬ن‪U4±‬א“‪ 7‬دمא —‪ 7œ/‬א‪7@= 7c&$‬א‪ 3`7‬ل=‪ 7‬א'‪707 S‬‬
‫א“ دمא —‪ =a 3L œ3œ`Z‬لא‪6‬א)('و&‪ Km a%‬‬
‫(א‪ ]$‬د‪+'7r+‬א‪g7 ƒ 7/J7bfx78/ Š7‬א‪7 ،7/‬ن‬
‫}‪ 4 Y œ/‬د‪/cI6$+‬ون= א'‪/6 ،0 S‬ن‪0Œ+/W 3‬א‪ bO$‬ل‪ K‬‬
‫ )( ن‪4a‬אدא“‪ 7‬دم‪fx78_ 7 $‬א"‪،7`6/‬و‪d7"L<7h7‬א‪ 7bO$‬ل‪d7‬‬
‫א“ دمא —‪ K œ/‬‬
‫‪45‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ا"! ا ‪-‬‬


‫ا‪ ./0‬د ا('&و ‬
‫)‪(Phishing‬‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 46
،m77r‫א‬8?‫و‬،m77]6/Ov77 S77%77&‫" دא)('و‬77#$‫ א‬77b]‫אא‬x778L 77I6
 K- cI‫אدوא‬/r‫\א‬ZU4m 43O'‫א=א‬/n‫وא‬
 77b^‫א‬- 77& 3‫א‬L/77WEPhishingF%77&‫" دא)('و‬77#$‫ ƒ א‬77=„77O
، 7b^‫ لא‬7i&‫ضא‬/7%7&‫א)('و‬76‫ ƒ א‬7=76/Œ74 Z@‫وא‬6/Z‫א‬
 i7,‫ مא‬7Y6a‫و‬7I 7cI‫?و‬،_= 7b‫א‬7S? 7b^W‫ ل‬7i&‫א‬6/Œ4‫وذ‬
 Km 8?‫و‬0"‫א‬6Q
 Y 77
œ /}‫ن‬%77&‫('و‬$‫" دא‬77#$‫ ƒ א‬77= ƒ 77/‫א‬77‫ع‬77I‫אא‬x778%77˜
77 78g‫و‬6/77Z‫ مא‬7L=‫" دא‬7#$ً 7" %7&‫א)('و‬776‫ א‬7=‫^ن‬7Z6
 K  ‫(א‬3‫א‬%^Z/³\/ ‫ א‬Z@‫ א‬b^‫א‬- & 3‫א‬
 ƒ 77=‫{ن‬77r،ESpamF77/‫א‬g7777 &‫ ƒ א)('و‬77/‫א‬M‫ ل‬77@‫א‬%778 77
- ` 3"Oza 8‫א‬O ،7"`r%&‫א)('و‬6‫א‬U4/b`O$%&‫" دא)('و‬#$‫א‬
‫?و‬7 &‡‫ ƒ א‬7/‫وא‬ESMSF+g7b`‫ א‬7bI‫ ƒ א‬7/ \/7 ‫א'א א)('و& א‬
M‫ن‬7(6_p7 $‫א‬7(‫و‬،m7Z]&U7`36‫م‬Y]‫ نא‬،EInstant MessagingF+/W 3‫א‬
/7 ‫א‬%78%7&‫א)('و‬6‫(= ƒ א‬Kmp /X‫א‬x ]IO<6Jx‫א šא‬
 K1 %&‫('و‬$‫" دא‬#$‫א‬- V8x ]IOMً 4 W
?ph?r/7@‫نא‬37Z6 +‫ د‬74EHackersF7  ‫(א‬37‫א‬%7L'Ž ƒ‫ ن?وא‬
،7  ‫(א‬37‫א‬I7#‫א‬/Ld7kJ?،<Y7kM+76
-  . &)?f?_/@ 
- I 7ZOMEPhishingF7 -Š7&KF7l7 (‫א‬7(‫و‬،m7Z]&787"I‫ نא‬
KZ‫" دא‬#‫„א‬Ot‫א‬EfishingF(‫א‬6/‫نא‬/`‫א‬
ESpamF/‫א‬g66‫ ƒ א‬/‫  א‬Y%&‫" دא)('و‬#$‫= ƒ א‬

(1) A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and


Countermeasures", Radix Labs, October 3, 2005.
47
 

 ‫אوאאאאد‬W
‫אدא و‬

M„77]‫א‬077& X‫א‬zar 77n) ،%4 77


$‫א‬077& X‫نא‬77Z6ً 7,6? Y 77
œ /}‫ن‬77
77IC‫א‬H 77w77ž‫=ج‬77I6ً ` 77/77 ‫ ذ‬77 ‫א‬x778‫و‬، i77,‫א‬U774‫ ل‬77 S$‫א‬77 4
 KESocial EngineeringF 4 
$‫א‬
،7 ` `S- 7cI 8=7b‫?ن‬7 &‫" دא)('و‬7#$‫ ƒ א‬7=7œ/}%4±6
، 77b^‫א‬m77O & . 77r)776‫אא‬x778 œ3œ`77Z}‫אع‬77“77‫‰ و‬M77  ‫ =_א‬77b
B7=‫و‬،‫^œم‬7Z— ‫<א‬7 ، 7_/7bM%7b^‫א‬H 7Z@‫א‬U74‫א ل‬- & 3
77 & ƒ$‫א‬EVISAF‫א‬B77 r77L "3 77 & ƒ$‫א‬- 77L "3‫א‬- 77& ‫?و‬،%77b^‫א‬F776/‫א‬
 Kً `S$ i,‫ א‬b^W‫ ل‬i&‫وא‬، YL/‫ض‬/
‫?ن‬%4»7O%7&‫('و‬a76/ 7=،%&‫('و‬$‫" دא‬#$‫ ƒ א‬/J `O‫ ل‬
ESMTPFš 7Z3‫א‬76‫ א‬7`&‫ل‬7 O/‫{ن‬rً ` / œ }‫و  ذ‬K?‫_?س‬/b‫ א‬8=b
‫?ن‬+=‫و‬/77, N 77 7œ/— ‫אنא‬77I4‫ن‬77 ،EAuthenticationF67b‫ א‬77# 7`]6
‫א‬x78M‫و‬K 7œ/— ‫אنא‬7I4 7`³074p‫א‬7(m&، œ/— ‫ א‬b^W` `SN(6
‫ م‬7Y6)،_/7b‫א‬x7‫ ق‬7"I‫<א‬7 ً 743ً `]© ً 66/ً &‫א‬I4 œ/— ‫א‬d,6‫א ل‬
g776‫ ƒ א‬7=‫^אم‬7‫א‬76/Œ74‫و‬K?‫_?س‬/7b‫א‬78 8=7b‫œ Šن‬3œ`Z— ‫א‬
 K &‫א)('و‬6‫א‬6‫ و‬I4 ƒ 8‫ د‬/‫א‬fx8 /OESpamF/‫א‬
- 77& . 77r) œ3œ`77Z— ‫אعא‬77“77`6/" 77/‫א‬fx778\77‰077(6_77
7 (7‫وذ‬،_/7b‫א‬x7%7&‫א)('و‬dL‫א‬4%b^‫א‬m ZSza‫א ل‬
7.p77Y
‫א‬766‫_א‬/7b‫ ƒ א‬7=EStyleFšI7Y `6/" /‫א‬
f= 7W‫و‬،ELogoF_/7b‫א‬B7=d7n‫وو‬،ELook and FeelF‫ س‬ZS)‫وא‬/cI‫א‬v S
 KEslogansF
‫Šن‬7. 74‫د‬$‫א‬78 /‫  ‰\א‬Mwœ^}‫א‬t‫א“אعא‬0  ?S?
 

 ‫אوאאאאد‬W
‫אدא و‬ 48
P3O$m&?‫و‬،-]I‫א‬L œ3œ`Z}%b^‫א‬H Z@‫א‬za‫א ل‬-$‫‰ و‬
=‫و‬B77d77Lš‫א‬/77‫אא‬x778‫ن‬77(6‫و‬، 77/ ‫د‬77
‫אšא‬/77‫א‬M‫د‬77
‫ذجא‬77I‫א‬
/77cI‫ א‬77,6?v77 S77%77#‫_א‬/77b‫א‬d77L< 77bO 77" <77bESpoofedF
7P 8‫ن‬7 ،f= 7W‫و‬fB7=‫_و‬/7b‫<א‬7‫א‬d7n‫وو‬،ELook and FeelF‫ س‬7ZS)‫وא‬

077‫א‬%77bI‫א‬B77 '‫א‬77%778‫و‬$?،77 &‫א)('و‬d77L‫אא‬. 77&) 77 ‫א‬77‫א‬


d7L‫אא‬7=b‫­א‬Z&- Y 3Œ‫ و‬¤،EHypertext Markup Language – HTMLF
_7C‫وא‬،ًpY7ً‫א‬/7?m7 (%7&‫א)('و‬dL‫­א‬Z&US‫?و‬،\/ ‫א)('و& א‬
7‫وذ‬،_/7b‫א‬x7 7 4m7&?_‫ د‬7#Jx7‫œ א‬3œ`Z— ‫‰ و אعא‬8‫ذ‬
،‫^م‬7Z‫<א‬7‫(نא‬O 7+‫ د‬74t7‫א‬%7&‫א)('و‬H 7Z@‫א‬za‫א ل‬- & L/Z
 K%b^‫א‬F6/‫א‬B=‫و‬
707"6‫و‬،EformF‫ذج‬I+‫ود‬B YZ]& &‫א)('و‬6‫(ن= א‬OL
‫ذج‬77I‫ <א‬77Z‫?و‬، 77œ/— ‫א‬za\/77 ?+/77 C 77=‫<א‬77h77‫و‬،m77P3O œ3œ`77Z— ‫א‬
%7&‫א)('و‬76‫א‬7 SM7  ‫(א‬37‫א‬U74d7L‫אن‬I4zam rP3‫א‬- & 3 
 KEWeb-based E-Mail – webmailF  ‫(א‬3‫א‬U4„3‫א‬
، i7,‫א‬Hx7
Jx7‫<א‬7"‫א‬w7² ±766‫ א‬/‫ ¼?نא‬Z‫א لא‬M
d7L‫ ’א‬7±’  7I ،_/7b‫א‬7‫\ذ‬7ًp 4‫(ن‬6‫ د_?ن‬#m&? &/ ‫  ذ‬Jx‫وא‬
 Km"‫ א‬i,‫" دא‬#‫‹א‬Jx‫א‬+= Ib‫א‬Hp — =‫و‬B‫א‬
‫" د‬77777#$‫ ƒ א‬77777=M^77777Z‫א‬+=Y77777‫\א‬/77777 ‫ ƒ א‬77777‫א‬77777
 W1 %&‫('و‬$‫א‬
707"O‫و‬، 7_/bM œ3œ`Z— ‫א‬H ZSM(E I8‫?ن‬%4»O = J

(1) A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and


Countermeasures", Radix Labs, October 3, 2005.
49
 

 ‫אوאאאאد‬W
‫אدא و‬

 K /‫א‬M‫و=
د‬BdLš‫א( ^אم=א‬y ibdL+= 6‫œ ز‬3œ`Z— ‫א‬
m7 4‫ض‬/7O‫و‬،/7" M 7_/7bM 3œ`7Z— ‫א‬H ZS‫?ن‬%4»O = J
 K- p $‫א‬ir (q &/M VZ‫א‬
، 7Y3" œ3œ`Z— ‫`<א‬6 ‫و‬،]6B #‫א‬M%8‫و‬،-  3+=O r = J
 KF6B‫א‬0"‫אא‬x8. ) /‫א‬M‫אš
د‬/ œ3œ`Z— ‫ودא‬B6‫و‬
M/77b‫א‬H 77Z@‫א‬U774d77Lg77g 77O‫ل‬77b³F776B= 77Wa 77= J
 Kg ‫אא‬x8M/cIš‫א‬/ œ3œ`Z— ‫ودא‬B6‫و‬، œ3œ`Z}
U74‫ض‬/7O‫و‬، 7_/7bM+76
7  - 7 ‫ول‬B7&%4»O = J
 KL+']ً & k“‫א‬fx8U4‫ل‬b@‫א‬#/rً  Sًp 4m& ، œ3œ`Z— ‫א‬
=‫و‬B7d7Lzam7
6 7/‫ א‬3œ`7Z}‫{ن‬7r` 7Z‫א‬-$ @‫ א‬S M
 77b^W‫ ل‬77i&‫א‬Mً 7 `S$?‫ دون‬77b‫ ?א‬Y^77Z6t77‫وא‬،6/77Z‫א‬- 77& 3‫א‬d77X
 K\/ ?‫   ?و‬a- 4M i,‫א‬
 W  ‫א‬-‫א“"א‬M%&‫('و‬$‫" دא‬#$‫א‬- V8= b ‫(א‬
K%&‫('و‬$‫" دא‬#$‫א‬VCš "^‫  א‬J1
KF6B‫א‬dL‫א‬B Y¤  J2
77S?‫^אم‬77 ‫ن‬77(O77L‫و‬،77]6B‫ ƒ א‬77/‫א‬7777ƒ 877  ‫ ل‬77=a  J3
.ESpamF/‫א‬g ƒ /‫א‬0  ?

š‫א‬/‫א‬d3O‫و‬، /‫א‬y]‫`ن‬6+=‫و‬B‫ א‬/œ3œ`Z— ‫دא‬4  J4


KF6B‫א‬dL‫א‬M"‫א‬- & 3‫<  א‬h‫و‬، /‫א‬M‫א
د‬
- 77b^W‫ن‬77iI6<77h77‫و‬،6/77Z‫א‬- 77& 3‫نא‬L/77Z6‫ دون‬77b‫  א‬J5
K 6 i,‫א‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪50‬‬
‫‪777‬א‪1 7 7‬אא‪- 777VC777 L‬א‪ "777#$‬دא‪'($‬و&‪ 777=%7 7‬א‪7776‬‬
‫א)('و&‪M  ،%‬א( ‪،E1-3F‬א‪t7‬ز‪<7ZL?7 7Y&? Y7œ/}<74‬א‪ 7‬ن?‪M‬‬
‫‪،? 3 ?_/b‬و?نא —‪ 
$4 œ3œ`Z‬ز ˜‪7 4?Wf‬א' ‪?” 7‬وو‪7n‬א‬
‫=א" ً‪ `&p‬ل‪i]#za‬א' ”‪7O‬وא‪Jx7‬א‪?y7,O‬ن‪fx78‬א‪d7L%78i]7b‬‬
‫‪? 3 ?dL< b "F6B‬א‪ S &%#‬א‪/7cI‬وא)‪ 7ZS‬س‪look and F‬‬

‫‪Efeel‬وא‪،EstyleFšI‬وو‪B=dn‬א‪M  _/b‬א( ‪ KE2-3F‬‬


‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (1-3‬ﺭﺳﺎﻟﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳌﻨﺘﺤﻠﺔ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ"‬
‫ ‬
‫ ‬

‫‪?E1F‬و‪ @  ž]L‬د‪ =h‬א‪ "#$‬دא‪'($‬و&‪%‬א


‪.pY‬א‪S‬א‪EI3‬א‪Z‬د‪ ،?6‬א‪+6/
،‬א‪ 6/‬ض‬
‫א‪Z‬د‪،6‬א‪14w3Z‬ذ‪J‬א@‪2006/6 I614 J781426V‬م‪ J‬אد‪ K13718‬‬
51
 

 ‫אوאאאאد‬W
‫אدא و‬

ً 736/Lm7n‫و‬za‫وא‬746‫ د‬7b‫?نא‬7¼_/7b‫" ق‬I‫א<א‬M I`L‫ذאد‬a


78‫א‬7mr 7 ‫ א‬i7,‫ א‬7 ‫א‬U740} 7b6’%7 ،y i7b‫" قא‬I‫א<א‬
‫ ق‬7"I‫<א‬7‫  نא‬I Esamba.comF8 3 _/by ib‫" قא‬I‫א<א‬Kz‫אو‬
/7 ‫و=ذ‬B7‫א‬d7L‫ ق‬7"I‫א<א‬M¼Esambaonlineaccess.comF8=‫و‬B‫א‬dL
%77"6‫و‬%S6 7¯،/7W 3‫ لא‬7bO$‫„א‬77O‫و‬،EonlineaccessF/7 ‫وذ‬،_/77b‫<א‬7‫א‬
 KdL‫ א‬4/ً 4 3"&‫א‬
 

 
"‫( ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ‬2-3) ‫ﺷﻜﻞ‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 52
=‫و‬B7‫א‬dL‫א‬m ‫و¼\א‬،%#‫ א‬3 dL8E3-3F (‫א‬
K%#‫א‬dL‫وא‬

 
"‫( ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ‬3-3) ‫ﺷﻜﻞ‬
 
d7L‫ ً?نא‬7,6?«7Sp&‫و‬K?‫ ض‬76/‫_?א‬/7bd7L8=‫و‬BdL/ †‫ ل‬
 (7‫א‬M 7 _/7b%#‫א‬dL‫< " א‬#E4-3F (‫א‬M  =‫و‬B‫א‬
 K‫ س‬ZS)‫وא‬/cI‫وא‬،šI‫وא‬،= ‫א‬v SE5-3F
d7L‫ ق‬7"I‫<א‬7‫وא‬،Eriyadbank.comFW78%#‫א‬dL‫" ق‬I‫א<א‬
 KEriyadonlin.net.msFF6B‫א‬
‫‪53‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‪0  7??W 7brML II‬א‪ "7#$‬دא)('و&‪0  7? 7b] (7?%7‬‬


‫א‪ 77 S$‬ل‪BOM‬و‪/776‬אא‪d77L‬؛و‪.B77
ML II77‬א)
‪/77‬א‪.‬א‪-‬א‪ 77,‬د‪+‬א‪- 77Œ S$‬‬
‫وא‪ ƒ$‬א^]‪_  $‬אא‪dL‬א‪B‬و=‪ K+‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (4-3‬ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺍﻟﺮﻳﺎﺽ"‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪54‬‬

‫ﺷﻜﻞ )‪ (5-3‬ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺍﻟﺮﻳﺎﺽ"‬


‫ ‬
‫و‪/Yc6‬א( ‪/7 †ً$ E6-3F‬א‪d7L‬א‪ "7#$‬دא‪'($‬و&‪،%7‬و‪x78‬אא‪ 7‬ل‬
‫‪ K?H ?_/b‬א‪dL‬א‪B‬و=א<א‪ 7"I‬ق‪Esabb.net.msF‬א‪<7$m 7‬א‪ 7"I‬ق‬
‫‪dL‬א‪M  ،Esabb.comF%#‬א‪KE7-3F (7‬و&‪?ً 7,6?\/7‬نא‪d7L‬א‪B7‬و=‬
‫‪ " <#‬א‪dL‬א‪v S%#‬א‪،šI‬وא =‪،‬وא‪/cI‬وא)‪ ZS‬س‪ K‬‬
‫‪55‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ﺷﻜﻞ ‪ 6-3‬ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﺏ" ‬

‫ ‬
‫ﺷﻜﻞ)‪ (7-3‬ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﺏ"‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 56
(3‫א‬U4 8#=‫و‬Echat roomsFh‫ د‬o‫_א‬/3L‫א‬/w½ 1 ‫د=א‬M
‫" د‬77#$‫א‬- 77V8‫?ن‬-/77Y•?،EphishersF‫ دون‬77b‫ א‬77Y r 77Ÿ‫ ن‬77 t77‫א‬77  ‫א‬
- 7VC‫א‬fx78.‫نو=א‬a 7،7S‫^”وא‬7W 73’Lœ 7x]² IO}$‫ م‬4 (%&‫('و‬$‫א‬
EphishersF6‫ د‬77b‫א‬77 77 +4 77Z77‫ ل‬77kM”77b^ 77 /77 ‫^ ص‬77W?
77OB776BOMEhackersF/¹ 7 ^‫وא‬،EspammersF77/‫א‬g77 ƒ 77/‫א‬%77
œ /}‫و‬
‫ ل‬77‫א‬77- 774k+774E 77I8w77& m77&?77‫א=א‬fx778-77
‫و‬K- 77VC‫א‬
 7 ،EcashersF7bo‫وא‬EcollectorsF7‚‫وא‬EmailersF7œ/— bb^‫א‬
 W% ‫א‬M_/± 8
EspammersF7/‫א‬g7 ƒ 7/‫œא‬/} a<8‫و‬WEMailersF‫œن‬/— ‫ א‬J
g7 ƒ /‫ ƒ א‬8‫د‬4‫= ل‬aU4+=`‫<א‬Y66x‫א‬،EhackersF‫ن‬/¹ ^— ‫?وא‬
KEfraudulent emailsF‫ ل‬S$‫_א‬Y/‫א‬
d77L‫وאאא‬B77Y
6x77‫א‬EhackersF‫ن‬77/¹ ^‫<א‬778WECollectorsF‫ن‬77‚‫ א‬J
 7776ž<7776t777‫وא‬،‫ ل‬777 S$‫ضא‬/777Efraudulent websitesF777]6B‫א‬77 &‫א)('و‬

d7L‫אא‬fx78<YI707"O 77/‫א‬g66‫ ƒ א‬/‫ א‬3’Lœ  Y a 6 i,‫א‬


 K & ƒ$‫א‬L "3‫<א‬L=‫?و‬،=‫و‬/‫<א‬L=‫و‬،‫^م‬Z‫ {<א‬6/- & 6‫و‬BO
،EmailersF7œ/— ‫א‬I4‫=ون‬/(.p4<8¹ ‚‫א=א?نא‬wcS$‫و‬
 K/‫א‬g ƒ /‫ ً)= لא‬6‫ ً د‬3‫ن‬r6<8‫و‬
L‫و‬/7Z‫א‬6/7Z‫א‬- 7& 3‫א‬x Š‫`ن‬66x‫<א‬8‫و‬WECashersF‫ن‬b
¹ o‫ א‬J

(1) Christopher Abad, “The economy of phishing: A survey of the operations of the
phishing market”, First Monday, volume 10, number 9, September 2005,
(http://firstmonday.org/issues/issue10_9/abad/index.html). M. Jakobsson, S. Myers,
“Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
Identity Theft”, Wiley, 2007.
57
 

 ‫אوאאאאد‬W
‫אدא و‬

- 7L ". 7&{ ‫ق‬/7Œ+7‫ل‬p7$‫א‬x]I6‫و‬K Cp‫<א‬h’‫و‬،¹ ‚‫ א‬3L


J`I‫א‬0iZ‫^م‬ZO]6B r/b-  ZS- L "‫?و‬،]6B‫אƒ ن‬-  ZS
.‫א‬/7‫?وא‬،EAutomated Teller Machine – ATMF%7‡‫א_א‬/± 7b‫א‬+B7Y
?/W 3‫א‬
 K Y"‫א‬d 3‫وא‬
. 77`77‚‫א‬za/77W 3‫א‬J‫ د‬77‫א‬dr77  77a‫ن‬77r‫و‬/‫ن‬77¹bi— ‫א‬.$778‫و‬
 Kbo‫א‬6`I‫א‬- L‫و‬/Z‫א‬3Z&<Yƒ "4{‫?و‬،L‫و‬/Z‫א‬6/Z‫א‬- & 3‫א‬
- 7& 3‫א‬+‫د‬7
U747O37ZI‫א‬76/Œ74‫?و‬+/W 3.‫א‬4r‫א‬6‫א د‬¥ 3‫א‬
- 7VC‫א‬U4bo‫א‬+=LU4ً ,6?O‫و‬،¹ V— ‫ א‬3’Lœ  Y  ‫و‬+‫ود‬B‫א‬
^77Z‫א‬-  77ZS- 77& 377`‫א‬- 77cI‫א‬F77ŽU774+x77]I‫א‬-$ 77 S$‫وא‬
 K‚‫א‬
%7&‫('و‬$‫" دא‬7#$‫א‬- 77V8‫?ن‬wi7n‫?و‬t7‫א‬77‫א=א‬w7b  7I8za
 7Y&?$a،  7‫א‬M7 ‫א‬/
)‫א‬-  b‫ <א‬cI` "cI-  b4 8.‫و=א‬F`O
7  ‫(א‬37‫א‬  74J?،%7&‫א)('و‬  7‫א‬M<76 8x ]IO‫?ن‬Mš`r YI4Fl
 KEInternet worldF
ً‫א‬6
ًp 4‫`م‬O Y&?%&‫('و‬$‫" دא‬#$‫= ƒ א‬M%ƒ I$‫א‬.%‫א‬
- 77Œ S$‫א‬Mً 773 m778 ¤‹ 77778‫و‬،77 &‫א)('و‬77 I‫א‬- 77VC‫ א‬77‫א‬4
7776 @‫=אنא‬777VrKJ/7773‫ א‬777 ‫א‬7778‫و‬$?،- 777cI‫א‬M777 I‫א‬- 4 r777‫وא‬
،ESecure Socket Layer – SSL CertificatesF77 I‫א‬-‫ دא‬Y77‫وא‬،EFirewallsF

 78g‫و‬،(Intrusion Prevention Systems – IPS rules)‫'אق‬7 $‫א‬d7I7c&?&‫א‬7L‫و‬


%7&‡‫قא‬7h‫لא‬p7‫א‬F7LO‫?ن‬7($7](‫א‬c8 3‫ א‬I‫א‬6 @‫و ƒ א‬
7I4 8=/7nF7L6$t‫وא‬،cI‫(א  א وא‬3‫א‬4Eonline trustF
 

 ‫אوאאאאد‬W
‫אدא و‬ 58
Mg37 =/7nµ‫א‬7Saza 8‫א‬6 ،š`r»6/Z‫ وא‬b^‫א א‬- & H/ZO
%7‡‫دא‬/7‫ مא‬7c&‫?و‬7  ‫(א‬37‫א‬74.‫א‬،]^‫ لא‬bO$‫`א  ƒ א‬h
K- cI‫ لא وא‬bO$‫<و ƒ א‬8g‫?و‬،FO C‫א‬4
The Anti-Phishing F%7&‫" دא)('و‬7#$‫ ƒ א‬7/J7b‫ א‬7474k
- 4 I7b‫א‬F7Ž\7ZU747  4 §%8K1 EWorking Group – APWG
 ƒ 7=747¤ I‫ א‬b^‫ لא‬i&‫א“אعوא‬- Jb&‫&] ذא`א‬a Yr8
 K%&‫" دא)('و‬#$‫א‬
J7b‫ א‬744kmO4?Jx‫א‬2007‫ م‬4r&/YW2 /6/`OM
 W/Y‫ذא‬Mw3`‫א‬4‚‫?نא‬/Y•?EAPWGF%&‫" دא)('و‬#$‫ ƒ א‬/
K‫" د‬#‫= ƒ א‬4ً p28074 •
- 7cI7 &‫('و‬ad7L‫א‬4]6B &‫('و‬adL‫א‬4ً p23630 •
K ` `S
 ƒ 7=-p776/Œ74Ebrand hijackF Y] 6BO‹6= ¤p4178 •
w7L‫و‬U7S،7S‫وא‬/Y7WM V7Z<7L=U74?<L/7‫אא‬x78‫و‬K%7&‫('و‬$‫" دא‬#$‫א‬
K/Y‫א‬x/6/`‫א=א‬#a
U74-7S‫ א‬7YI4¥73‫א‬%7&‫('و‬$‫" دא‬7#$‫ع= ƒ א‬k٪34.3 •
‫ ل‬777KEdomain namesF- 777L "&. 7 7˜?777P 8U7774777 &‫('و‬ad777L‫šא‬777‫=وא‬

KExyzbank.comF

(1) The Anti-Phishing Working Group, www.apwg.com.


(2) Phishing Activity Trends, Report for the Month of November, 2007, Anti-Phishing
Working Group (APWG), apwg.org
59
 

 ‫אوאאאאد‬W
‫אدא و‬

U774-77S‫ א‬77YI4¥773‫א‬%77&‫('و‬$‫" دא‬77#$‫ ƒ א‬77=‫ع‬77k77٪6 •


KE10.212.21.33F‫ ل‬K6/46‫ و‬I4P 8U4 &‫('و‬adL‫=وאšא‬
KmLpa 3LF6B‫א‬dL‫א‬. `‫ل‬8‫ م‬6?hph •
KF6BdL. `+‫?Œل‬%8ً 630•
- 77 4Mš77‫قאو‬/77‫א‬MrY77Z‫א‬77  ‫א‬- 77cI‫دא‬774‫ د‬776‫• אزد‬
K6= V‫א‬p‫א‬F 6BO
% 77§a77٪93.8m377Z& 77™ً r‫א‬Y77‫א‬/77 ‫א‬77  ‫א‬- 77cI‫ א‬77cO •
KrYZ‫\א‬/ ‫א‬- 4 Ib‫א‬
‫אدم‬7“‫دא‬74M7 (6/‫א‬+7i‫א‬- 76$‫א‬b‫א‬w"l/Y‫ذא‬M •
٪24.21m3Z& ™ &‫" دא)('و‬#$‫א‬dL‫ ]א‬,Z‫א‬
%77&‫('و‬$‫" دא‬77#$‫א‬- 77p‫د‬774E8-3F%i 77n‫( א‬77‫א‬3776 •
‫ م‬77‫א‬77m77Z]&/Y77‫א‬za2006r77&/Y77W77+'77]‫لא‬p77  6/Y77W77Z‫א‬
K2007
%777&‫('و‬$‫" دא‬777#$‫א‬d777L‫دא‬7774E9-3F%i 777n‫( א‬777‫א‬37776 •
‫ م‬7‫א‬7m7Z]&/Y7‫א‬za2006r7&7+'7]‫لא‬p7 ً 6/YW](‫א‬+6X‫א‬
K2007
v77 S77- 77cI‫אعא‬77&?77‫ع‬77& 77(377ZI‫א‬E1-3F‫ول‬77X‫א‬3776 •
K C%&‫('و‬$‫" دא‬#$‫א‬- 4_‫א‬Y‫א‬
 K &‫" دא)('و‬#$‫א‬dL‫א‬r ,‫א‬3Z&Mz‫אو‬/‫אولא‬E2-3F‫ول‬X‫א‬36 •
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪60‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (8-3‬ﻋﺪﺩ ﺑﻼﻏﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳌﺴﺘﻠﻤﺔ ﺷﻬﺮﻳﺎﹰ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ﻣﻦ ﺷﻬﺮ‬
‫ﻧﻮﻓﻤﱪ ‪ 2006‬ﺇﱃ ﺍﻟﺸﻬﺮ ﻧﻔﺴﻪ ﻣﻦ ﺍﻟﻌﺎﻡ ‪2007‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (9-3‬ﻋﺪﺩ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳉﺪﻳﺪﺓ ﺍﳌﻜﺘﺸﻔﺔ ﺷﻬﺮﻳﺎﹰ ﺧﻼﻝ ﺍﻟﻔﺘﺮﺓ ﻣﻦ‬
‫ﻧﻮﻓﻤﱪ ‪ 2006‬ﺇﱃ ﺍﻟﺸﻬﺮ ﻧﻔﺴﻪ ﻣﻦ ﺍﻟﻌﺎﻡ ‪2007‬‬
‫‪61‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ﺟﺪﻭﻝ )‪ (1-3‬ﻗﺎﺋﻤﺔ ﺍﻟﻨﺴﺐ ﻟﻜﻞ ﻧﻮﻉ ﻣﻦ ﺃﻧﻮﺍﻉ ﺍﳌﻨﻈﻤﺎﺕ ﻣﻦ ﺣﻴﺚ ﺍﺳﺘﻬﺪﺍﻑ ﻋﻤﻠﻴﺎﺕ‬
‫ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﳍﺎ‬
‫ﺍﻟﻨﺴﺒﺔ )‪ (٪‬‬ ‫ﻧﻮﻉ ﺍﳌﻨﻈﻤﺔ‬
‫‪ 93.8‬‬ ‫א“ ‪-‬א  ‪ EFinancial ServicesF‬‬

‫‪ 2.8‬‬ ‫א‪ ERetailFƒBV d 3‬‬


‫‪ 2.2‬‬ ‫‪B‬ودو א‪(3‬א  ‪ EISPF‬‬
‫‪ 1.2‬‬ ‫א@(و` א‪- 4 Ib‬א ‪ EGovernment & MiscellaneousF\/‬‬

‫ﺟﺪﻭﻝ )‪ (2-3‬ﻗﺎﺋﻤﺔ ﺍﻟﺪﻭﻝ ﺍﻟﻌﺸﺮ ﺍﻷﻭﱃ ﰲ ﻧﺴﺒﺔ ﺍﺳﺘﻀﺎﻓﺔ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬
‫ﺍﻟﻨﺴﺒﺔ )‪ (٪‬‬ ‫ﺍﻟﺪﻭﻟﺔ ‬ ‫ﺍﻟﺘﺮﺗﻴﺐ‬
‫‪ 24.21‬‬ ‫א‪ b‬‬ ‫‪ 1‬‬
‫‪ 23.85‬‬ ‫א‪- 6$‬א‪+i‬א‪  (6/‬‬ ‫‪ 2‬‬
‫‪ 9.39‬‬ ‫א‪ IC‬‬ ‫‪ 3‬‬
‫‪ 8.06‬‬ ‫=و  ‬ ‫‪ 4‬‬
‫‪ 4.64‬‬ ‫‪ I6 O‬‬ ‫‪ 5‬‬
‫‪ 3.53‬‬ ‫=و &  ‬ ‫‪ 6‬‬
‫‪ 3.41‬‬ ‫? &  ‬ ‫‪ 7‬‬
‫‪ 2.42‬‬ ‫ =‪ 6‬א‪  IX‬‬ ‫‪ 8‬‬
‫‪ 1.47‬‬ ‫א(א‪ +i‬‬ ‫‪ 9‬‬
‫‪ 1.47‬‬ ‫‪  Z&/r‬‬ ‫‪ 10‬‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 62
77 (6/‫א‬+77i‫א‬- 776$‫א‬M/ƒ 77Z“‫?نא‬/77Y•?EGartnerF771 77 M
3.2za2007‫ م‬74M bw]O=‫א‬L%&‫('و‬$‫" دא‬#$‫א‬- V8¤ I‫א‬
%7&‫('و‬$‫" دא‬7#$‫א‬- 7V8Mً 4 ]O=‫ ًא‬,6?/6/`‫א‬/Y•?‫و‬K%(6/?=$‫دو‬6p
- 77L "3‫א‬-  77Z³77&= `، r/77b‫א‬-  77Z@‫وא‬776= X‫א‬- 77L "3‫א‬-  77ZSU774
_= 7b‫א‬7I4‫ ل‬7 S$‫א‬- 4_  ‫א‬c&?Fnza03Z‫א‬d
/6‫א)ƒ & و‬
 K & ƒ$‫א‬- L "3‫א‬- /Wza3ZI  YI4
‫ م‬747N"7Z?/Y7WMJ/7
?‫ع‬p"7‫א‬U74ً‫א‬. 7Im7&?ً 7,6?7“‫א‬/ ‫وذ‬
- 7V8‫?ن‬37O7 (6/‫א‬+7i‫א‬- 76$‫א‬M”^7W4500/ 2007
 777 777&= `،2007‫ م‬777‫א‬M777 ?ً 7 7S ¼w777``S%777&‫('و‬$‫" دא‬777#$‫א‬
774‫" د‬7#‫ ƒ א‬7=‫א‬3`7‫א‬6x7‫^ صא‬77W‫א‬7K٪3,337Z&w7 L،` 7Z‫א‬
‫" د‬77#$‫ ƒ א‬77=0377Z77  /ƒ 77Z“‫א‬77n/O<77Y&a%77&‫א)('و‬776‫א‬776/Œ
J?،m`377Jx77‫ مא‬77‫א‬Mm77Z]&.%77‫א‬77n/O٪2.377777&= `،%77&‫('و‬$‫א‬
Y 77- 4p"77‫א‬U774ً‫א‬. 77I2005‫ م‬77‫א‬772.9777 77,6?77&= `‫و‬،2006
.EGartnerF 3Lw6/
?

،77  ‫א‬- 77“‫ عא‬77"L77FI77bOt77‫وא‬،2?PayPal?‫ ً?ن‬7,6?77“‫א‬/7 ‫وذ‬


ً 7n/O/7 ‫ א‬7&( O/7‫א‬7ƒBV d7 3‫" عא‬LFIbOt‫وא‬،3 ?eBay?‫و‬
KEbrand spoofingF6= V‫א‬p‫ لא‬i&‫א‬- 
U4œ — ‫عא‬I‫א‬8‫אول‬،%&‫('و‬$‫" دא‬#$‫א‬- V8‫ ن‬4&E I8

(1) Media Relations, 2008 Press Releases, Gartner, “Gartner Survey Shows Phishing
Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks”, 05-March-
2008, (http://www.gartner.com/it/page.jsp?id=565125).
 K &‫א  א)('و‬-p6i‫وא‬- 4r‫א‬Mbb^ /W E2F
K  ‫(א‬3‫א‬6/Œ4ƒBV d 3‫א‬Mbb^ /WE3F
63
 

 ‫אوאאאאد‬W
‫אدא و‬

 7  J‫ دون‬7b‫ א‬7Z6‫ع‬7I‫אא‬x8MKESocial EngineeringF 4 


$‫א‬IC‫א‬
‫ ل‬7i&‫א‬76/‫^אم‬7 %7&‫('و‬$‫" دא‬7#$‫א‬- 7 4MJ/73‫א‬-0& X‫& א‬/ ‫ذ‬
 7"7b‫א‬+=‫و‬B7‫א‬d7L‫אא‬za 3œ`7Z— ‫א‬m7
Espoofed emailF b^7777777‫א‬

- 77& 3‫א‬. 77r) œ3œ`77Z— ‫אعא‬77“ 77/‫א‬d7777r/‫ذج‬77´77P3O‫?و‬، 77#?d77L‫א‬


 K6/Z‫ وא‬b^‫א‬
U77477‫عא‬77I‫א‬778%7 &‫('و‬$‫" دא‬77#$‫א‬- 77V877/77 ‡‫عא‬77I‫א‬
q‫א‬/7‫=ع‬B7‫ع‬7I‫אא‬x8M‫ دون‬b‫`مא‬6‫و‬،Etechnical subterfugeF I]‫א‬0  ‫א‬
 77b^‫א‬- 77& 3‫א‬L/77 7 Cp 77<77O 6 i77,‫א‬+B77Y
?MESpywareFN77Z¤
‫ ل‬77i&‫א‬- 77 4Mً 7 `S$ Y&^77Z6v77 S6‫ د‬77b‫א‬za C 77=a‫و‬،6/77Z‫وא‬
 K1  b^‫א‬

Anti-Phishing Working Group, apwg.org. E1F


‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪64‬‬
‫‪65‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ا"! اا‪1‬‬
‫أ  ‪ 2‬ا‪ ./0‬د ا('&و ‬
‫)‪(Phishing Techniques‬‬
‫ ‬
‫ﺗﺴﻤﻴﻢ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ )‪(DNS Poisoning‬‬ ‫•‬

‫ﺗﺴﻤﻴﻢ ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ )‪(Hosts File Poisoning‬‬ ‫•‬

‫ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺑﻮﺍﺳﻄﺔ ﺣﻘﻦ ﺍﶈﺘﻮﻯ )‪(Content Injection‬‬ ‫•‬

‫ﻫﺠﻤﺔ ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ )‪(Man-in-the-Middle Attack – MITM‬‬ ‫•‬

‫ﺗﺸﻮﻳﺶ ﺍﻟﻌﻨﻮﺍﻥ )‪(Address Obfuscation‬‬ ‫•‬

‫ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﱪﺍﻣﺞ ﺍﳋﺒﻴﺜﺔ )‪(Malware Attack‬‬ ‫•‬

‫‪Search Engine‬‬ ‫ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﳏﺮﻛﺎﺕ ﺍﻟﺒﺤﺚ )‬ ‫•‬

‫‪(Phishing‬‬
‫‪The Popup‬‬ ‫ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳـﻖ ﺍﻟﻨﻮﺍﻓـﺬ ﺍﳌﻨﺒﺜﻘـﺔ )‬ ‫•‬

‫‪(Attack‬‬
‫ﺷﺮﻳﻂ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺰﻳﻒ )‪(Fake Address Bar‬‬ ‫•‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪66‬‬
‫ ‬
67
 

 ‫אوאאאאد‬W
‫אدא و‬

 K%&‫" دא)('و‬#$‫א‬M^Z‫א‬0  ‫ א‬b]‫אא‬x8L I6


(DNS poisoning) ‫ ﺗﺴﻤﻴﻢ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻷﻭﻝ‬1.4
‫م‬7`6‫?ن‬H7‫אא‬x787`6/ŒK7 3“‫א‬74=B‫א‬J?EPharmingFً ,6?UZ6‫و‬
Domain Name Server – F- 7L "I‫א‬. 7˜?‫ دم‬7 U74‫م‬VC 7EhackerFH/7^‫א‬
 K-pVZ 04p‫وא‬،EDNS
- 77&(‫א‬77S?778EDNSF- 77L "I‫א‬. 77˜?‫ م‬77c&‫{ن‬77rً ` 77 77&/ ‫ ذ‬77
 (7 7O- 7L "I‫א‬. 7˜‫אدم‬7 +747‫(ن‬6‫و‬،  ‫(א‬3  ‫א‬
،6/7‫ א‬7YI6‫ و‬I4‫و‬- L "I‫א‬. ˜?š/‫א‬8‫ م‬cI‫אא‬x8-  <8?K  (
‫ ن‬77() J?،m77077Œ ^‫אدא‬/77‫ دمא‬77^J/77‫אنא‬77I‫א‬77r/7777$m77&
-4F (7‫א‬M 7 ،‫ ل‬7‫ א‬3UrK  ‫(א‬33ZI FO C‫د א‬f= 34‫א‬
 7C V7Z‫א‬J/7‫אنא‬7I‫א‬Ewww.ksu.edu.saF‫د‬7‫א<&" ق
א‬E1
777S ‫و‬+‫د‬777
‫ن‬777(Ofx7778š/777‫א‬- 777& ‫و‬،E213.230.10.197F7778
 K- L "I‫א‬. ˜?‫ אدم‬S?M‫م‬pp
za+= 7W)‫א‬zaJ‫د‬76 7¯6/7‫א‬6‫ و‬I‫א‬g -pVZ 04p‫(نא‬6
ً 7Z‫م‬p7$‫ دمא‬7 ‫ ن‬7 ‫{ذא‬7r،‫د‬77‫ ل
א‬M (rK]6BdL‫א‬
‫?ن‬7ً$3r،‫ אد‬XJ/‫אنא‬I‫Ÿ א‬Jx‫ א‬VZ 04p‫و‹א‬
7‫א‬7
‫ ق‬7"&<7$y i7b‫א‬J/7‫אنא‬7I‫א‬- 7L "I‫א‬. 7˜?‫ دم‬7 d

’ /6}
 K=‫و‬BdLzag6ً ]Žً 6/4ً &‫א‬I4d
gm&{r،‫د‬
- L "I‫א‬. ˜?U43"I6m&{r،‫ ل
אد‬M  ‫אא@ ل‬x ‫و‬
07"Ot7‫א‬d7L‫אא‬7 78g‫ =_و‬7b- L "I‫א‬. ˜? YIn‫و‬،\/ ‫א‬
 K6/‫ و‬ZS b^W- & 6‫و‬BO
 

 ‫אوאאאאد‬W
‫אدא و‬ 68

 
‫( ﺍﺳﺘﻌﻼﻡ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ‬1-4) ‫ﺷﻜﻞ‬
 
77778?‫_?س‬/7777b‫ ق‬7777"I‫<א‬7777‫?نא‬E2-4F (7777‫א‬M 7777 ‫ض‬/7777]I
‫" ق‬I‫_?س?א`  )<א‬/by ib‫א‬J/‫אنא‬I‫و?نא‬،Exyzbank.comF
x7‫ ق‬7"I‫<א‬7‫^” א‬W  Ir،E88.33.22.11F8Exyzbank.comF
–”^77‫ زא‬77Y
‫ `م‬77EInternet BrowserF77  ‫(א‬377‫א‬y]77bM_/77b‫א‬

?‫_?س‬/7bJ/77‫אنא‬77I‫א‬774‫م‬p77) y]77b‫א‬q 77&ًp77¯– 77 ‫א‬


‫ دم‬7“‫א‬7‫ نذ‬7 ‫ د_و‬7#‫{ذא‬7rK- L "I‫א‬. ˜?‫ دم‬za‫م‬p$‫א‬0Œ‫{= ل‬
( 7777‫و‬،=‫و‬B7777J/77774‫אن‬7777I‫د‬g7777m7777&{rE3-4F (7777‫א‬M 7777 ً 7777Z
_/7b%7#‫א‬d7L‫א‬7­7ZIZF76Bd7Lzag76Jx‫א‬E92.45.67.89F
m73 Jx7‫א‬78_/7b‫ قא‬7"&<‫ ن?نא‬،ً‫ ?א‬i,‫א‬m/6Jx‫א‬،?‫?س‬
7‫אن‬7I‫א‬M074p‫א‬7` 7Z‫א‬7‫א‬M 7I6?= 7 N ‫و‬،mI Š‫و‬mZ]I
 Ky ib‫אنא‬I g3 Szaً Y m
v S
‫‪69‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ﺷﻜﻞ )‪ (2-4‬ﺍﺳﺘﻌﻼﻡ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ‬

‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (3-4‬ﺍﺳﺘﻌﻼﻡ ﺧﺎﺩﻡ ﺃﲰﺎﺀ ﺍﻟﻨﻄﺎﻗﺎﺕ ﰲ ﺣﺎﻟﺔ ﺍﻟﺘﺴﻤﻴﻢ‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 70
(Hosts File Poisoning) ‫ ﺗﺴﻤﻴﻢ ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﱐ‬2.4
H7?- 77Sza-%&‫('و‬$‫" دא‬#$‫א‬0  ?H‫אא‬x8m36
< 7ZEhackersF‫ن‬7/^‫مא‬7`6H7‫אא‬x78MK- 7L "I‫א‬. 7˜?‫ < دم‬ZO
 K i,‫ زא‬Y
M‫א
د‬Ehosts fileF] ,‫א“אدمא‬F
m]7b6/7‫ א‬7YI6‫ و‬I4‫و‬- 7L "I‫א‬. 7˜?7] 7,‫אدمא‬7“‫א‬F7š/6
ElocallyFً 7 ‰m7<(i‫ ](א‬,‫א“אدمא‬F‫?ن‬$a‫؛‬- L "I‫א‬. ˜?‫ دم‬
 K‫^م‬Z‫ زא‬Y
 3L
‫אن‬77I‫א‬774v77i3 ً$‫م?و‬77`6 77 ‫ زא‬77Y
‫{ن‬77r، 77d77L077Œ77I4
7J/7‫אنא‬7I‫א‬74‫م‬p7$‫ א‬73L‫אدم‬7“‫א‬- 7]M‫ دم‬7“‫<א‬7$J/‫א‬
 K- L "I‫א‬. ˜?‫ دم‬
‫ م‬7c&M] 7,‫אدمא‬7“‫א‬F7M%ƒ‫א‬7$‫ א‬V7Z‫א‬E4-4F (7‫ضא‬/6
 .EMicrosoft WindowsF‫وز‬I6‫و‬wr‫و‬/(6  ‫א‬
7š/7‫א‬-pV7‫{ن‬7r- 7L "I‫א‬. 7˜?‫ < دم‬ZOH?M &/ ‫  ذ‬
za 6 i7,‫א‬m7
/¹ ^‫ א‬3’Lœ  8g O<66/‫ א‬YI6‫ و‬I4‫و‬- L "I‫א‬. ˜?
‫م‬7`6v S] ,‫א“אدمא‬F< ZOH?Mً ,6?mZ]&‫]؛وא@ ل‬6BdL‫א‬
77‫وذ‬، i77,‫ زא‬77Y
M] 77,‫אدمא‬77“‫א‬F77< 77Zm77Z]&.%77 ‫ن‬77/^‫א‬
 KF6BdLJ/4‫אن‬I‫šא<&" ق‬/6
 Vdn
 i7,‫א‬m7
O< H/¹ ^‫ א‬3’Lœ _ ,‫ א‬VZ‫א‬E5-4F (‫ضא‬/6
m7&‫א‬I4‫ ?ن‬I7n'r‫א‬Jx7‫وא‬%7#‫א‬d7L‫א‬7ً$7E92.45.67.89FF6B‫א‬dL‫א‬za
 KE88.33.22.11F
 
71
 

 ‫אوאאאאد‬W
‫אدא و‬

 
localhost 127.0.0.1

‫( ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ‬4-4) ‫ﺷﻜﻞ‬


 

xyzbank.com 92.45.67.89

‫( ﻣﻠﻒ ﺍﳋﻮﺍﺩﻡ ﺍﳌﻀﻴﻔﺔ ﺑﻌﺪ ﺍﻟﻌﺒﺚ ﺑﻪ‬5-4) ‫ﺷﻜﻞ‬

Content ) ‫ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺑﻮﺍﺳﻄﺔ ﺣﻘﻦ ﺍﶈﺘﻮﻯ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻟﺚ‬3.4


(Injection
Emalicious contentFv7 3 \7‰r 7n{‫ دون‬7b‫مא‬7`6H‫אא‬x8M
v77 3“‫\א‬77o‫אא‬x778‫م‬77`6‫?ن‬77(KElegitimate siteFy i77#d77LM77I`S‫?و‬

 W%  
 K\/ ?dL‫א‬zay ib‫א‬dL‫א‬/ƒ‫زא‬m
O+‫ د‬4a J
 KdL‫א‬/ƒ‫ ززא‬Y
MEmalwareF 3 q‫א‬/0 /O J
 K%&‫('و‬$‫" دא‬#$‫ دمא‬zadL‫א‬M ‫א‬- & 3‫א‬m
O+‫ د‬4a J
 W\o‫`א‬S"‫" دא‬#p  ?‫?&אع‬hphE I8
EhackersF‫ن‬7/¹ ^‫مא‬7` r،7  ‫(א‬37‫ دمא‬7 M I?+/h‫ل‬p‫ א‬J
 KEmalicious contentFv 3 \i™Elegitimate contentF%#‫\א‬o‫אلא‬3 
EhackersF /¹ 7^y7ZO7  ‫(א‬37‫ دمא‬M I?+/h‫ل‬p‫ א‬J
Cross-Site Script – F77+/7‫א‬fx78_/7OK‫אدم‬7“‫א‬fx78M7 3  k/‫`? אد‬S
 73’Lœ 7_ 7,\7‰7q}7I6’EProgramming FlawF%7k/ 7 %78‫و‬،EXSS
 

 ‫אوאאאאد‬W
‫אدא و‬ 72
< 7 `O‫?و‬،EblogsF- &‫و‬7‫א‬M=‫وא‬B7‫א‬- 7` O،‫ ل‬7‫ א‬3U4K%
= =b
‫?و‬،Ediscussion boardsF‫ ش‬7`I‫א‬- `SM =‫?و‬،Euser reviewF qI=‫وא‬B‫א‬
U747‫א‬%7&‫א)('و‬76‫א‬M+‫?و= وא=د‬،vi3‫א‬- /‰Mv³- 
 KEweb-based emailF  ‫(א‬3‫א‬
7L` 7Z‫א‬7‫א‬M 7 7
= =‫ د‬7b 3L_ ,‫\א‬o‫אא‬x8 
 73L‫وض‬/]8   Y ]bO<6  3  k/‫( ? אد‬WU4\‰‫(ن‬6
m7I4q7I6 7¯،=‫وא‬B7‫ א‬73L- r na 3`Ot‫א‬dL‫אא‬fx8 ] ,Z‫א“אدمא‬
 KdL‫א‬i]#‫ض‬/4I4 6 i,‫א‬y]bU4 3“‫א אدא‬fx8 4
1 ECNET News.comF= 73 ?M‫ و=د‬7‫ع‬7I‫אא‬x78U74 L‫אאא‬
<YL77M77 I?+/77hy i77bO774‫ن‬p4) 77gY77‫א‬2?PayPal?d77L‫ م‬77L 77I4
+‫ د‬74azaJ‫د‬76<YL7Mv7 3 dL`S‹‫و‬،  ‫(א‬3‫א‬U4%&‫א)('و‬
 KF6BdLza & ƒ$‫א‬L "3‫א‬- & ‫د ل‬ai]#0ŒI4 i,‫א‬m
O
78\7o‫א‬7`S"7‫א‬%7&‫('و‬$‫" دא‬7#$‫אعא‬7&?7v7 ‫عא‬I‫ א‬J
773 /‫مא‬p77$‫א‬7776/Œ7477`@‫א‬+/77hU7ZOd77L‫א‬M7 I?+/77h‫ل‬p7‫א‬
- 77& 3‫א‬+774 LM/77?x77 ]IO<77677`6/"‫א‬fx778MKESQL injection vulnerabilityF

+74 LM06/7ZOmI4qI6L‫و‬،dLF ,Z‫א“ دمא‬MEdatabase commandF


 K- & 3‫א‬
7 3“‫א‬7 k‫`א אدא‬S  Y3 /‫مא‬p$‫א‬6/Œ4`@‫א‬
 73L7‫وض‬/7]78 7  Y ]7bO‫ ل‬78)7V & 78Ecross-site script – XSSF

(1) “PayPal fixes phishing hole”, by Joris Evers, Staff Writer, CNET News.com, Published:
June 16, 2006 4:12 PM PDT, (http://www.news.com/PayPal-fixes-phishing-hole/2100-
7349_3-6084974.html).
K  ‫(א‬3‫א‬U4ƒBV d dL (2)
73
 

 ‫אوאאאאد‬W
‫אدא و‬

 K- r na 3`Ot‫א‬dL‫אא‬fx8 ] ,Z‫א“אدمא‬


747`@‫"א‬7‫א‬%7&‫('و‬$‫" دא‬7#$‫א‬H7 L‫אא‬1 ‫א‬S?
 /7Wd7Lµ7S 78ESQL injection vulnerabilityF3 /‫مא‬p$‫א‬6/Œ
B
77S%77"ld77L‫زوא=א‬77S?‫" ع‬77‫ א‬77I4Eknorr.comF?=77I ?77  ‫א‬776x‫א‬
d77L‫א‬M77 I?+/77h‫ل‬p77‫א‬776/Œ774Elogin authenticationF‫ل‬ 77‫א‬677bO
7 I‫א‬+/7‫لא‬p7‫ نא‬7 Œ 7Z3K73 /‫مא‬p7$‫ @`א"א‬wi˜
<7
'O73 /‫مא‬p7$‫א‬7M7Œ`I‫א‬7# ]‫وא‬،?;?Œ`I# rr n{fx8
y 7n‫ضא‬/7š`r‫د‬b`Yr،x ]I‫א‬Mm 8?$ O 8%OŠ6 ‫?ن‬za
true logical Fi i77#77 `"I+= 7734EHackerF‫'ق‬77^‫א‬d77,6‫?ن‬%77](6‫و‬K/77 ?$
‫م‬p77777777777$‫א‬777V &‫ن‬777(‫م‬p777$‫א‬M777Œ`I‫א‬777# ]‫ א‬7773LEexpression
7 7  7`SMEor ‘x’=‘x’F7 `"I‫א‬+= 3‫א‬dn‫ א لو‬3777777777U4،i i#
 K6b‫א‬B
S%"^ @‫א‬OM ] =‫و‬/‫^مو א‬Z‫א<א‬
 
Man-in-the-Middle ) ‫ ﻫﺠﻤﺔ ﺍﻟﺮﺟـﻞ ﰲ ﺍﻟﻮﺳـﻂ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺮﺍﺑﻊ‬4.4
(Attack – MITM
r/7"‫א‬7 7  7b^W‫ ل‬7i&‫ وא‬7 ‫ د‬7b‫مא‬7`6H‫אא‬x8M
M 77 ،d7L‫^œموא‬7Z— ‫א‬77  ‫(א‬37‫א‬U74/7W 3‫ لא‬7bO$‫א‬7 4‫ل‬p7
+/7W 3‫ دم‬7“‫ وא‬7 ‫א‬7 7‫<א'א‬76‫?ن‬%78i i7b‫א‬7 @‫א‬KE6-4F (‫א‬
 KE7 J4F (‫א‬M  ،r/"‫א‬p(‫ل‬Ykš ‫و‬J?‫ون‬

(1) “Knorr.de SQL Injection and XSS Vulnerabilities”, Sebastian Bauer, 01/12/07,
(http://blog.gjl-network.net/blog/index.php?/archives/78-Knorr.de-SQL-Injection-and-
XSS-Vulnerabilities.html)
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪74‬‬
‫‪<776‬א‪ 773L77 77‬א‪ 77b‬د‪. 77&a776/Œ774‬א‪ 77bO‬ل‪77 77( 77b]I‬‬
‫א —‪œ^77Z‬موא‪d77L‬א‪/77‬אدא‪ 77bO$‬ل‪،m77‬و‪77(6‬نא‪ 77b‬د‪M‬א‪77F77bI‬א‪^77Z‬م‬
‫وא‪ by 6 ،dL‬دא`‪ 3‬لא‪- & 3‬א‪ b‬د=‪+‬א‪^Z‬م‪za‬א‪7 4Md7L‬‬
‫א‪ bO$‬لא‪،EInstant MessagingF/W 3‬و‪<7h‬א‪، 7Y074p‬و‪ 74a‬د‪+/7 C 7=a+‬‬
‫? ‪za\/‬א‪dL‬א‪ Jx‬زאل‪?c6‬نא‪- & 3‬אא=د‪ Lm a+‬دא‪^Z‬م‪K‬و  ‬
‫‪ SM‬א)= ل ‪ SMx‬א‪/‬د‪{r‬نא‪ b‬د?‪`6ً ,6‬م `‪ C 3‬و‪ 74a<7h‬د‪+‬‬
‫‪za C =a‬א‪^Z‬م  ‪M‬א( ‪ KE8-4F‬‬
‫‪x8M‬אא‪?/Yc6H‬نא‪ bO$‬ل‪$?r/7Œ7<6‬و‪ 7Y
 78‬زא‪^7Z‬م‬
‫‪?F‬وא ‪،E‬و
‪ Y‬زא‪?FdL‬وא“ دم‪M<8(KE‬א@` `‪'6‬א‪7‬نא‪74- 7& 3‬‬

‪ Y‬ز† ‪/‬و š‪?7_/6‬א‪M
/‬אš?‪ KEMan-in-the-MiddleF‬‬
‫ ‬

‫ ‬
‫ﺷﻜﻞ)‪ (6-4‬ﺍﻟﺘﺮﺍﺳﻞ ﰲ ﻭﺟﻮﺩ "ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ"‬
‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (7-4‬ﺍﻟﺘﺮﺍﺳﻞ ﺍﳌﻔﺘﺮﺽ ﺑﲔ ﺍﳌﺴﺘﺨﺪﻡ ﻭﺍﳌﻮﻗﻊ‬
75
 

 ‫אوאאאאد‬W
‫אدא و‬

 

 
‫( ﺍﻟﺘﺮﺍﺳﻞ ﰲ ﺣﺎﻟﺔ ﻭﺟﻮﺩ ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ‬8-4) ‫ﺷﻜﻞ‬
 
‫^œم‬7Z— ‫א‬7 7‫ א'א‬4‫ل‬p š‫א‬M
/‫א‬V8  r‫(ن‬OL
 K ‫ א'א‬4‫?و‬،dL‫وא‬
?š 7I‫مא‬7V8?77 7U7ZO‫و‬، 7‫א'א‬7 4‫ل‬p7 7VC‫א‬7 4 r‫(ن‬O
‫^œم‬77Z— ‫א‬77- 77& 3‫א‬r77O‫ل‬p77 EcontentF\77o‫א‬g 77،EActive AttackF

 76i‫ضא‬/7m7 4‫_و‬/7b7 7‫א'א‬7 SM‫ ل‬7‫ א‬37Ur،dL‫وא‬


H 7Z@‫<א‬7L=EHackerF‫'ق‬7^‫ دא‬7b‫א‬/7 ¹6}7LE9-4F (W-  Z@‫א‬% ‫א‬
Jx7‫א‬H 7Z@‫א‬7ً$7E4444<7L=H 7Z@‫א‬zapF،m a‫ אאل‬6ž‫אد‬/—‫א‬
‫ل‬73`–š7‫א‬M 7
/‫א‬d7 7‫'א‬6\x7‫_–א‬/7b‫مא‬7` r، 7 ‫א‬df‫د‬S
 K‫ د‬b‫א‬f‫د‬SJx‫א‬H Z@‫א‬za% ‫ א‬6i‫א‬x]I6‫و‬0"‫א‬
‫م‬7VC‫??و?א‬7Sp‫مא‬V8?7 7UZO‫و‬، ‫ א'א‬4 4 ]‫(نא‬O
<7{ ،6/7Z‫א‬- 7& 3‫ طא‬7`‫א‬7‫ د‬7b‫א‬7(…7،EPassive AttackF?¾7Z‫א‬
،d7L‫א‬za‫^œم‬7Z— ‫ א‬73L C =a‫ ل‬SM%b^‫א‬F6/‫א‬B=‫و‬،‫^œم‬Z— ‫א‬
 K‫^œم‬Z— ‫ א‬b^W‫ ل‬i&‫א‬Mً `S$ Y‫وא^א‬
 
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪76‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (9-4‬ﺗﻐﻴﲑ ﺭﻗﻢ ﺍﳊﺴﺎﺏ ﺍﶈﻮﻝ ﺇﻟﻴﻪ ﻣﻦ ﻗ‪‬ﺒ‪‬ﻞ ﺍﻟﺮﺟﻞ ﰲ ﺍﻟﻮﺳﻂ‪.‬‬
‫ ‬
‫‪\77Sa‬א"‪/77‬ق"‪77V8?77 3‬א‪M 77
/‬א‪ 77 < 77ZO%778?š77‬دم?˜‪. 77‬‬
‫א‪6/Œ4EDNS PoisoningF- L "I‬א‪g 7-pVZ 04p‬א‪ 7I‬و‪6‬א‪6/7‬‬
‫ ‪zagO%‬א‪U74ً$ 7K7]6Bd7L‬ذ‪07Œ7‬א‪p7$‬م‪74‬א‪7I‬אنא‪J/7‬‬
‫‪?_/b‬س?‪{r‬ذא ن دمא‪p$‬م‪،ً Z‬و‹א‪ VZ 04p‬א‪ 7ŸJx‬‬

‪ 7 d‬دم?˜‪. 7‬א‪- 7L "I‬א‪7I‬אن‬
‫א‪I‬אنא‪xJ/‬א‪?ً$3r،_/b‬ن}‪œ /6‬‬

‪I4d‬א&‪g76ً 7]Žً 6/74ً 7‬‬
‫א‪J/‬א‪ "&<$y ib‬قא‪?_/b‬س?‪œ / }m&{r‬‬
‫‪BdLza‬و=‪4‬א‪dL‬א‪?_/b%#‬س?‪ K‬‬
‫‪x8d`6‬אא‪dL‬א‪+/" 7wžF6B‬א‪ 7b‬د… ‪B76 7IrKً 7‬ود‪ 7 4‬א‪_/7b‬‬
‫‪F‬א‪dLE i,‬א‪< F6B‬א‪^Z‬م‪،‬و=‪B7‬א‪F76/‬א^‪%7b‬وذ‪ 77‬ل‬
‫‪(776،m 77ZSza‬א‪ 77b‬د‪fx77877r/77‬א‪- 77& 3‬א‪،6/77Z‬و‪77`6<77h77‬مא‪ 77b‬د‬
‫ ^ Œ‪d0‬א‪dL‬א‪?_/b%#‬س?‪ b^WxًpiI‬א א‪ K i,‬‬
‫ ‬
‫‪ 5.4‬ﺍﻷﺳﻠﻮﺏ ﺍﳋﺎﻣﺲ‪ :‬ﺗﺸﻮﻳﺶ ﺍﻟﻌﻨﻮﺍﻥ )‪(Address Obfuscation‬‬
‫‪`6‬مא‪ b‬دون‪x8M‬אא‪، dLF 6BH‬وو‪w7žm7n‬א‪ 7"&<7‬ق‬
‫‪m36‬א<&" قא‪dL‬א‪ KU#‬‬
‫‪6‬א‪ b‬دون‪x8M‬אא‪?zaH‬ن‪(6‬نא<&" قא‪d7L‬א‪ً 736/LF76B‬‬
77
 

 ‫אوאאאאد‬W
‫אدא و‬

 Kz‫אو‬8‫א‬mr  ‫ א‬i,‫א‬U40b6% y ib‫" قא‬I‫א<א‬


%S776U77Z™‫ن‬77(6‫?ن‬778F776B‫א‬d77L‫ قא‬77"&<77$/77 †= 77  ‫א‬E 77I8‫و‬
 KdL‫ א‬4/ً 4 3"&‫א‬%"6‫و‬
‫ ل‬778%7#‫א‬d7L‫ قא‬7"&< m 3WF6BdL‫א<&" ق‬U4ً$ 
‫ ق‬77"I‫<א‬77$ً " 77Zً‫אدא‬77‫ دא‬77b‫ _א‬77n?77L‫و‬،f/77 ‫ ذ‬77Z‫?א‬H 77?_/77b
،Esabb.comF%7#‫א‬d7L‫ ق‬7"&<$m ‫א‬،Esabb.net.msFy3b y ib‫א‬
 7" <7#=‫و‬B7‫א‬d7L‫ ً?نא‬7,6?\/7&‫و‬KE11-4F،E10-4F(‫א‬M 
 K‫ س‬ZS)‫وא‬/cI‫وא‬،= ‫وא‬،šI‫א‬v S%#‫א‬dL‫א‬
(77‫א‬My77n‫وא‬،f/77 ‫ ذ‬77Z‫א‬،? 3 77?_/77b‫ ل‬77M 77  77,6?‫و‬
%S776F776B‫א‬d77Lً 7 ˜‫א‬77h‫א@ د‬77OM‫ د‬77b‫ =א‬77 ‫א‬،E13-4F‫و‬E12-4F
M/7 ‫ذ‬7Lm&?¼KEsambaonlineaccess.comF8‫و‬$?dL‫ א‬4/ً 4 3"&‫א‬%"6‫و‬
%S6 77¯/77W 3‫ لא‬77bO$‫„א‬77O‫و‬،EonlineaccessF77 ‫و‬،_/77b‫ قא‬77"I‫<א‬77‫א‬
778? 3 77?_/77by i77b‫ قא‬77"I‫<א‬77‫ א‬77I ،d77L‫ א‬4/77ً 7 4 3"&‫א‬%77"6‫و‬
7%7#‫א‬d7L‫ א‬7" <7#=‫و‬B7‫א‬d7L‫ ?نא‬,6?\/&‫و‬KEsambaonline.comF
K‫ س‬ZS)‫وא‬/cI‫وא‬،= ‫وא‬،šI‫א‬v S
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪78‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (10-4‬ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﺏ"‬

‫ ‬
‫ﺷﻜﻞ)‪ (11-4‬ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﺏ"‬
‫‪79‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ﺷﻜﻞ)‪ (12-4‬ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ"‬

‫ ‬
‫ﺷﻜﻞ )‪ (13-4‬ﺍﳌﻮﻗﻊ ﺍﻷﺻﻠﻲ ﳌﺼﺮﻑ "ﺳﺎﻣﺒﺎ"‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 80
‫ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳـﻖ ﺍﻟـﱪﺍﻣﺞ ﺍﳋﺒﻴﺜـﺔ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺴﺎﺩﺱ‬6.4
(Malware Attack)
‫ل‬p77 77H77‫אא‬x778ME i77,‫א‬F‫^م‬77Z‫א‬- 77 4d77 §y377bO
q‫א‬77‫א‬za‫د‬776F77(‫אא‬x7780377K6‫ د‬77br77(77  ‫(א‬377‫א‬y]77b
 K‫^م‬Z‫ زא‬Y
M4‫=و‬B‫א‬EmalwareF 3“‫א‬
‫ل‬p7 7+x]I‫א‬- ‫א‬d §3L‫א‬/™‫ د‬b 3“‫א‬q‫אא‬fx8yZO
‫ ل‬7bO‫א‬7I4‫ ل‬7‫ א‬37U7rK( i7,‫^م)א‬7Z‫ א‬73L  ‫(א‬3‫א‬y]b
،‫^م‬7Z‫<א‬7$‫^م‬7Z‫א‬76‫و‬BO7I4‫و‬، 7_/7b%&‫א)('و‬dL ‫^م‬Z‫א‬
fx78 7‫د‬7
‫و‬7 S%7]r،M/b‫א‬m ZSU4‫ ل‬%b^‫א‬F6/‫א‬B=‫و‬
‫ د‬7b‫א‬za C 7=a‫و‬،6/7Z‫א‬- 7& 3‫א‬fx78‫ ط‬7`a< 7Zr i,‫ زא‬Y
Mq‫אא‬
_/7b%&‫א)('و‬dL‫א‬d  ‫א‬M‫^م‬Z‫ א‬b^Wf=‫ و‬iI Jx‫א‬
 K%` `@‫א א‬m&?U4‫ د‬b‫א‬d   Jx‫א‬
77S-‫א‬/77`& V77Z077 /O%778H77‫אא‬x77C+=Y77‫قא‬/77"‫\א‬77Sa
 V77Z‫م‬77`6m77˜‫א‬77Jx77‫وא‬، i77,‫ زא‬77Y
MEKeystroke LoggerFy O 77]‫א‬

f=‫و‬7‫م‬7`6Jx‫وא‬،‫ د‬b‫א‬za C ={‫`م‬6<h‫و‬،y O `‫א‬SU4-‫א‬/`I‫א‬


 K i,‫ א‬b^W‫ ل‬i&$- & 3‫صא‬p^‫وא‬، Y i
 
‫ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﳏﺮﻛـﺎﺕ ﺍﻟﺒﺤـﺚ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺴﺎﺑﻊ‬7.4
(Search Engine Phishing)
7ƒBV d7 37 &‫('و‬ad7L‫א‬. 7&a%78‫و‬،‫" د‬7#p\/ ?`6/Œ
O
‫אع‬77 778d77L‫אא‬fx77877‫ض‬/77‫א‬K77 8‫و‬- 77VI77  ‫(א‬377‫א‬U774ERetailF
81
 

 ‫אوאאאאد‬W
‫אدא و‬

 K.‫א‬/  ‫(א‬3‫א‬U4I - VI4S 3‫א‬


<6‫و‬،  ‫(א‬3‫א‬U4vi3‫א‬- /‰M/Y]dL‫אא‬fx8‫د ل‬a<6
S 3‫א‬HxX‫ق‬ZZr I= Š‫و‬،]Ž- VI™ً ,6?dL‫אא‬fx8 P3O
 K- VI‫א‬fx8 4
t7‫א‬v7i3‫א‬- 7 /‰S?6/Œ4qI4 ”^Wvi36 I4
d7L‫א‬7‫{نذ‬7r،%7&‫('و‬$‫" دא‬7#$‫ א‬Y7n/7ƒBV d dL‫א‬/Yr Y r‹
 KH"‫א‬qI‫א‬fI4
6‫ذא ن‬a-vi3V & -Z‫ضא‬/ 
7 4‫ م‬7…a‫ض‬/7m7&{r7qI.‫א‬/dL‫אא‬fx8^Z‫א‬+= 6‫ز‬I4
MH 7ZS. 7&) 7a7‫وذ‬،6/- & 3%&‫('و‬a‫´ذج‬P3OmI0"6.‫א‬/‫א‬
m7O & mƒ 7r{d7L‫א‬x7 i7nJ'7‫א‬d7` r،% 7‫ א‬6i‫?و‬،dL‫ذא‬
 Km b^W‫ ل‬i&‫א‬Mً `S$‫^م‬ZOLt‫א‬6/Z‫א‬
 
The ) ‫ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻋﻦ ﻃﺮﻳﻖ ﺍﻟﻨﻮﺍﻓـﺬ ﺍﳌﻨﺒﺜﻘـﺔ‬:‫ ﺍﻷﺳﻠﻮﺏ ﺍﻟﺜﺎﻣﻦ‬8.4
(Popup Attack
x7r‫א‬I‫א‬d7&‫אً
دא‬/c&،µ‫א@و‬+=‫ د‬I‫א‬0  ‫א‬H‫אא‬x86
‫א‬x7‫و‬،7  ‫(א‬37‫א‬- i]7b<7cM% ? (EPopup BlockerF`3I‫א‬
‫ ن‬7 H7‫אא‬x78‫?ن‬$aK+g7 ‫א‬7&‫א‡و‬MH‫אא‬x8‘ ¼-$w©L`r
 K- i]b‫א‬Md&‫אא‬fx8 ‫ و
د‬3L، Sza،ً$ r
+x77r &%778،E14-4F (77‫א‬M 77 ،H77‫אא‬x77C776 `‫א‬77`6/"‫א‬
+x7r I‫א‬fx78M‫و‬K_/7bd7L ،y i7#d7L+7(+x7r &‫ م‬7?73IO+/b
،‫^œم‬7Z— ‫<א‬7 6/7- 7& 3m7P3O،‫^œم‬7Z— ‫א‬707"6‫ذج‬7´7
6`3I‫א‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪82‬‬
‫و א‪/‬و=‪،‬وذ ‪`i‬א‪I‬אنא‪?،J6‬و‪g‬ذ‪7‬א‪ 7¯،H 37‬‬
‫}‪^Zً `"Iً 33%"6‬م‪P3‬א‪I‬ذج‪ K‬‬
‫א‪_C‬א@` `‪%‬א‪+xr I‬א(‪F +‬א‪+xr I‬א‪. 7"4a787`3I‬א —‪œ^7Z‬م‪،‬‬
‫?و‪ 77 4‬א‪_/77b‬א‪=77W i77,‬אً‪ 4/77‬א"‪،077‬وذ‪ 77SM77‬ل‪ 77#‬د_ &‪m77‬‬
‫‪xًp 4‬א‪ K_/b‬‬

‫ﺷﻜﻞ )‪ (14-4‬ﺍﻟﻨﺎﻓﺬﺓ ﺍﳌﻨﺒﺜﻘﺔ‬


83
 

 ‫אوאאאאد‬W
‫אدא و‬

(Fake Address Bar) ‫ ﺷﺮﻳﻂ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺰﻳﻒ‬:‫ﺍﻷﺳﻠﻮﺏ ﺍﻟﺘﺎﺳﻊ‬ 9.4


m7p 7<6‫و‬،%&‫('و‬$‫" دא‬#$‫א‬0  ?/" ?H‫אא‬x8’ 6}
(377‫א‬y]77b+x7r &77U774‫א‬.B7X‫א‬M‫אن‬77I‫šא‬6/77F76Bš6/77W‫אل‬37‫א‬
7 &‫('و‬ai]7#‫ض‬/747‫ د‬7b‫א‬H7‫אא‬x787(KEweb browserF7  ‫א‬

 Ki i# Y&?U4i]b‫א‬/ƒ‫א‬B‫و‬3O I ،  ( ]6B


Java F?w/( r
? ]Ž- I`O‫{^אم‬H7777‫אא‬x8x ]IO<6

 KEJava AppletF?w ? r


?‫و‬،EScript
7+‫د‬7‰-‫אدא‬74{،7  ‫(א‬37‫א‬y]7bM‫אن‬I‫šא‬6/W. ] a(
‫א‬x77C?w/(77 77r
?‫ز‬77=r 77n{77‫<ذ‬776‫و‬،%77&‫א)('و‬d77L‫א‬i]77# 773L
/7bI‫א‬76ž‫و‬،?window.open? EfunctionF7] •‫^אمא‬7‫אًא‬76ž‫و‬،‫ض‬/7‫א‬
 K?no? ` ?location?
76/Œ74،-‫ ل‬7‫ א‬37U74-‫^م‬7Z‫ א‬76žI4H‫אא‬x83"6
y]7b‫&عא‬U4dL‫_א‬/6‫و‬،F6B‫א‬dL‫א‬za-%&‫('و‬a6/ =Mš‫=א‬
y]7b‫א‬M%7` `@‫אنא‬7I‫šא‬6/7W. 7] a<h‫و‬،+/W 3/ƒ‫א‬B‫ א‬3’Lœ ‫^’م‬Z— ‫א‬
 7r
? 77]Ž- 7 I`O- 7&/ ‫ ذ‬7 -‫^אم‬7 ‫وذ‬،mF6B/ †‫אل‬3‫وא‬
+=7#d7n‫(و‬US‫?و‬،EJava AppletF?w ? r
?‫?و‬EJava ScriptF?w/(
 K‫אن‬I‫šא‬6/W‫
د‬/ƒ‫א‬B‫“אعא‬EimageF
M07 ~ =»} +=7#7P 8U74F76B‫אن‬7I4š6/7WE15 J4F (7‫א‬yn6
EInternet ExplorerF1 ?==3Z aw&'&a?  ‫(א‬3‫א‬y]bi]b‫א‬U4?
F77Žd77LzaEwww.nike.com/main.htmlF‫אن‬77I‫א‬g776‫و‬،77 ` `S 77Y&Š ‫و‬773

1 http://www.microsoft.com/ie
 

 ‫אوאאאאد‬W
‫אدא و‬ 84
www.contentverification.com/graphic-F77777777777777n‫و‬/‫א‬i]77777777777777b‫א‬777777777777774

 KEattacks/demo/adbarframeset.html
/7 †y]7b‫^אم‬7 7(‫و‬،mZ]& Z‫א لא‬E16-4F (‫ضא‬/6
774 F77(IOv77 S،9.23<77L=^77ZI‫א‬،EOperaF1 ?‫א‬/77‫??و‬77  ‫(א‬377
‫אن‬77I‫ضא‬/774%778‫و‬،‫א‬/77‫?و‬y]77b‫א‬M+‫د‬77
‫ א‬77# “‫א‬0377Z‫אن‬77I‫א‬F77 6BO
Mً 7,6?‫و‬K7n‫و‬/‫א‬i]7b‫ א‬73L7‫אن‬I‫šא‬6/W. ] a‫ ل‬SMdL%` `@‫א‬
‫אن‬77I‫šא‬6/77W‫\?ن‬/77&‫و‬،F776B‫אنא‬77I‫šא‬6/77W”ƒ 77b ‫ض‬/774m77Z]& (77‫א‬
 KEgifF‫אد‬$ EimageF+=#8F6B‫א‬
 

 
‫( ﺷﺮﻳﻂ ﻋﻨﻮﺍﻥ ﻣﺰﻳﻒ ﻋﻠﻰ ﻫﻴﺌﺔ ﺻﻮﺭﺓ‬15-4) ‫ﺷﻜﻞ‬

(1) opera.com.
85
 

 ‫אوאאאאد‬W
‫אدא و‬

 
"‫( ﺷﺮﻳﻂ ﺍﻟﻌﻨﻮﺍﻥ ﺍﳌﺰﻳﻒ ﰲ ﺍﳌﺘﺼﻔﺢ "ﺃﻭﺑﺮﺍ‬16-4) ‫ﺷﻜﻞ‬
 
t 7?_/7b1 µ7S 8F6B‫אنא‬I‫šא‬6/WH?U4/ †‫ ل‬
777iI777 &‫('و‬a7776/ 777=w777=? 777I4،%777(6/‫א‬ECitibankF2 ?777I
777778 77777œ/— ‫אنא‬77777I4‫ ن‬77777 ‫و‬،E17-4F (77777‫א‬M 77777 _/77777b‫ א‬77777b^W
‫و‬،?7It 7d7%&‫א)('و‬E6/`ž?W‫אن‬I‫وא‬support@citibank.com

(1) http://www.antiphishing.org/phishing_archive/Citibank_3-31-04.htm
(2) www.citibank.com
 

 ‫אوאאאאد‬W
‫אدא و‬ 86
6‫אא‬x80"6K?It ?W_/b.p4<86‫אא‬x8 3LrYZ‫א‬P]‫א‬
‫אن‬7I4777`i‫ א‬4‫ )  ل‬/ ‫אšא
د‬/‫א‬U4š,‫א‬mœ3œ`Z}
_‫א‬/7b‫א‬7L "<7L=mI0"6‫´ذج‬/ƒ‫א‬B/Yc6š‫א‬/‫א‬d3OI4K%&‫א)('و‬f6/
PIN – Personal F%77b^‫א‬F776/‫א‬B77=‫و‬EATM/Debit card numberF%77‡‫א‬

fx787`i‫א‬7 47‫ض‬/7‫ ?نא‬7/‫א‬Ow4‫وאد‬،EIdentification Number


77$7‫ ذ‬7
?7m7&?‫و‬،766‫<א‬YI6‫ و‬7I‫א‬7b6 .p7‫–א‬7‫?ن‬8
K?It ?_/bF6B‫א‬dL+=#‫ض‬/6E18-4F (‫א‬،>>`i‫א‬
N77(6$%77&‫א)('و‬776‫ א‬77=M 77
œ /— ‫אنא‬77I4‫ن‬aً ` 77 77&/ ‫ ذ‬77
 7`³074p‫א‬7(v7 S، Z‫ א لא‬SM  ، œ/— ‫ א‬b^W+=‫و‬/, 
 Km r LJ?dn‫وو‬،EFromF œ/— ‫א‬
 K?It ?_/by ib‫א‬dL‫א‬+=#E19-4F (‫ضא‬/6
07"‫ א‬4/7WU74‫ل‬76f/8 7•š7‫=א‬U74 Z‫א لא‬M /‫א‬-S‫א‬
 777Yƒ‫א‬S$ Ehttps://web.da-us.citibank.com/signin/citifi/scripts/E-Mail_verify.jspF
d7L‫א‬zag7O7` `@‫א‬M 7YI(،_/7b‫א<א‬%8‫?و‬citibank?(‫א‬U4š‫א‬/‫א‬
7777‫ن?ن‬7777 ،Ehttp://69.56.202.82/~citisecu/scripts/E-Mail_verify.htmFF77776B‫א‬
 7Cp 7‘ 76EHypertext Markup Language – HTMLF07‫א‬%7bI‫א‬B7 '‫א‬
 773L77+/77‫א‬fx778‫ل‬p77‫‹א‬77L‫و‬،‫אن‬77I‫א‬774F77Ž”I77š‫א‬/77‫ضא‬/774
 K 6 i,‫ אعא‬M6‫ د‬b‫א‬
 
 
 
‫‪87‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ ‬

‫ﺍﺷﻜﻞ)‪ (17-4‬ﻧﺴﺨﺔ ﻣﻦ ﺭﺳﺎﻟﺔ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﻨﺘﺤﻠﺔ ﻟﺸﺨﺼﻴﺔ ﻣﺼﺮﻑ "ﺳﻴﱵ ﺑﻨﻚ" ‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 88


"‫( ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺳﻴﱵ ﺑﻨﻚ‬18-4) ‫ﺷﻜﻞ‬
 
?<ƒ 77@‫א‬%77bI‫šא‬6/77‫?א‬U77Z6F776B‫אنא‬77I‫šא‬6/771 /7 †H77?
‫ ن‬77(M. 77, 77 ]®EText FieldF%77b& 77`Sd77n‫و‬778‫و‬Ehovering text boxF

7 Yr 7 ‫א‬0b6‫و‬E19-4F (‫א‬M  ،y]b‫א‬M%` `@‫אنא‬I‫šא‬6/W


 Kz‫אو‬8‫א‬

 

(1) http://www.fraudwatchinternational.com/phishing-fraud/phishing-web-site-methods/
‫‪89‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫‪%"6‬א( ‪،/± `} +/c&E20-4F‬وذ‪/747I47‬ض ‪”ƒ 7b‬א‪i]7b‬‬


‫‪/776v7 S‬ض‪7I4‬אنא‪i]77b‬א@` `‪،%7‬و‪+x77r &76/ž77I4‬א“‪š6/77Wza”ƒ 7b‬‬
‫א‪I‬אن‪/Yc6‬א@` א‪ K‘n%bI‬‬
‫ ‬
‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (19-4‬ﺷﺮﻳﻂ ﻋﻨﻮﺍﻥ ﻣﺰﻳﻒ ﻋﻠﻰ ﻫﻴﺌﺔ ﺣﻘﻞ ﻧﺼﻲ‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪90‬‬

‫ ‬
‫ﺷﻜﻞ )‪ (20-4‬ﻧﺎﻓﺬﺓ ﺍﳋﺼﺎﺋﺺ ﺗﻮﺿﺢ ﺣﻘﻞ ﺍﻟﻨﺼﻲ‬
‫‪91‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ا"! ا‪45 6‬‬


‫ا(‪9‬اءات ا < دة ‪ ./:‬د ا('&و ‬
‫)‪(Phishing Countermeasures‬‬

‫ﻣﻨﻊ ﻫﺠﻤﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻗﺒﻞ ﺣﺪﻭﺛﻬﺎ‬ ‫•‬

‫ﺍﻟﺘﺼﻔﻴﺔ )‪(Filteration‬‬ ‫•‬

‫ﺍﻟﺘﺤﺪﻳﺜﺎﺕ ﺍﻷﻣﻨﻴﺔ )‪ (Security Patches‬ﻭ ﺟﺪﺭﺍﻥ ﺍﳉﻤﺎﻳﺔ )‪(Firewall‬‬ ‫•‬

‫ﺗﺼﻔﻴﺔ ﺍﻷﻛﻮﺍﺩ ﺍﻟﱪﳎﻴﺔ ﺍﳋﺒﻴﺜﺔ )‪(Cross-Site Script - XSS‬‬ ‫•‬

‫ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ )‪(Visual Keyboard‬‬ ‫•‬

‫ﺍﻟﺘﺼﺪﻳﻖ ﺍﻟﺜﻨﺎﺋﻲ )‪(Two-Factor Authentication‬‬ ‫•‬

‫ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ )‪(Mutual Authentication‬‬ ‫•‬

‫‪Anti-Phishing‬‬ ‫ﺃﺷﺮﻃﺔ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤـﺔ ﺍﻻﺻـﻄﻴﺎﺩ ﺍﻻﻟﻜﺘـﺮﻭﱐ )‬ ‫•‬

‫‪(Toolbars‬‬
‫ﺑﺮﺍﻣﺞ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ )‪(Anti-Phishing Softwares‬‬ ‫•‬

‫‪x8L I6‬אא]‪FŽ b‬א)


‪/‬א‪.‬א‪-‬א‪ ,‬د‪- VC+‬א‪ "#$‬دא)('و&‪ K%‬‬
‫ ‬

‫‪87‬‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 92
1 ‫ ﻣﻨﻊ ﻫﺠﻤﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﻗﺒﻞ ﺣﺪﻭﺛﻬﺎ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻷﻭﻝ‬1,5
%7&‫('و‬$‫" دא‬7#$‫א‬- 7V8 73L7 Yr‫א‬Y7‫ א‬o‫א‬- cI‫{( نא‬
‫" د‬777#$‫א‬- 777VC- 777cI‫א‬fx77787 7‫` و‬777Zž Y&Š777W777-‫א‬.‫א‬/777
a‫ ذ‬7 7l‫א‬
‫" د‬77#$‫א‬- 77V877q77IO77Lt77‫א‬/ƒ 77Z“‫ א‬77 `O‫و‬، 77Y4L‫ و‬773L%77&‫('و‬$‫א‬
 K%&‫('و‬$‫א‬
 W% ‫א‬-‫א‬.‫א‬/
)‫א‬fx8 O‫و‬
‫ ﺇﻧﺸﺎﺀ ﺣﺴﺎﺏ ﺑﺮﻳﺪ ﺇﻟﻜﺘﺮﻭﱐ ﻟﻠﺒﻼﻏﺎﺕ‬1.1.5
 ƒ 7/‫א‬74‫غ‬p7)‫<א‬CUIZ %&‫('و‬a6/‫אن‬IcI‫א‬.p46‫و‬BO
 ƒ 77/‫א‬fx778w77& ‫ذא‬a 77/776/`H 77Z@‫אא‬x778y77Z6K77cI‫ א‬77b^77iI‫א‬
 K6=
‫" د‬#‫א‬- V84ً‫א=א‬x&aً ,6?%"6‫و‬،$‫?م‬i i#
(Bounced E-Mails) ‫ ﻣﺮﺍﻗﺒﺔ ﺭﺳﺎﺋﻞ ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺗﺪﺓ‬2.1.5
U774 7777cI 77b^77iI‫א‬%77&‫('و‬$‫" دא‬77#$‫ ƒ א‬77=J77ž77L
 3œ`7Z— ‫ دمא‬7 7`i6 I4KdL‫אא‬M+‫
د‬g ] &‫('و‬a6/6‫ و‬I4
= 7Wad7 7œ/— ‫ دمא‬7“‫א‬za 7Y
gr،m76V7Zg Y&?°6‫ و‬I‫א‬fx8
 Km6 VZgm& œ3œ`Z— ‫א‬za bO  /‫א‬fx8‫Šن‬
 7b+7O/‫ ƒ א‬/‫{نא‬r cI b^WiIw² =—? ƒ /‫™ ?نא‬
- 7 4zag7O+7O/‫א‬766‫ ƒ א‬/‫א‬+/ K Y b^W iI‫א‬cI‫ دمא‬za
 K6=
‫" د‬#‫א‬
1<77L=+77"“‫א‬M،Ebouncing emailF77O/‫א‬776‫א‬E1-5F (77‫א‬y77n6

 77iI‫ دא‬77b‫ א‬7 3’Lœ 77 7 


’ /— ‫א‬%77&‫א)('و‬776‫مא‬p77  œ3œ`77Z— ‫ دمא‬77 ‫م‬77`6

(1) A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and


Countermeasures", Radix Labs, October 3, 2005.
‫‪93‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫^‪ 7b‬א‪v7 S?xyz.com?7cI‬و‪d7n‬א‪ 7b‬دא‪<7‬א‪ 7"I‬ق‪M7cI‬א‪K 77/‬‬


‫ ‪`6‬م دمא —‪`i  œ3œ`Z‬א<א —‪œ^Z‬م?‪ V7Zg7m&?°،?ahmed‬‬
‫‪zaJ?، 77‬‬
‫‪Mm776‬א‪ 77cI‬م‪77` r،‬م ‪M 77‬א“"‪ 77
={2<77L=+77‬عא‪za 77/‬א —‪œ /‬‬
‫א‪I‬אنא
د‪M‬א@` ‪EFromF‬א‪ K /‬‬
‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (1-5‬ﺍﻟﱪﻳﺪ ﺍﻹﻟﻜﺘﺮﻭﱐ ﺍﳌﺮﺗﺪ )‪(Bouncing Email‬‬
‫‪ 3.1.5‬ﻣﺮﺍﻗﺒﺔ ﻣﺮﺍﻛﺰ ﺧﺪﻣﺔ ﺍﻟﻌﻤﻼﺀ‬
‫‪/‬א‪77  773L‬א‪-$ 77bO$‬وŒ‪77 3‬א‪= 77Z]$‬א‪-‬א‪77‬א=د‪/za+‬א ‪77 B77‬‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 94
d7L‫א‬74‫ ل‬7‫–א‬7r= 7-‫ =א‬7Z]$‫א‬7+‫د‬7o‫אعא‬7&‫–א‬37rK.p‫א‬
 K‫" د‬#‫א‬- V8‫
د‬%SOL%&‫א)('و‬
‫ ﻣﺮﺍﻗﺒﺔ ﺣﺴﺎﺑﺎﺕ ﺍﻟﻌﻤﻼﺀ‬4.1.5
-$‫ و‬77‰77d77Lg77‫د‬77 ،-  77Z@‫א‬U774- 77 ‫א‬F77Ž773L‫א‬/
‫?و‬-p6777i‫?وא‬،%777b^‫א‬F7776/‫א‬B7 7=g 777O‫?و‬،-  777Z@‫א‬za‫ ل‬777‫א‬
 K  ‫ =_א‬b‫ א‬SM- iZ‫א‬
‫ ﻣﺮﺍﻗﺒﺔ ﺍﺳﺘﺨﺪﺍﻡ ﺍﻟﺼﻮﺭ ﺍﶈﺘﻮﻳﺔ ﻋﻠﻰ ﺷﻌﺎﺭ ﺍﳌﻨﻈﻤﺔ ﺃﻭ ﺭﻣﺰﻫﺎ‬5.1.5
r ,Z‫زא‬/‫وא‬-‫=א =א‬#- ]‫ & ًא^אم‬S?‫ دون‬b‫ א‬6
M7 ‰=7#- 7]‫^אم‬7‫א‬7ً$7،7]6B‫<א‬YL‫א‬MrYZ‫א‬cI‫ א‬3L
 K]6B‫<א‬YO i]b] ,Z‫א“אدمא‬M‫?و‬،<Y‫אد‬
F 77,Z‫א‬7  ‫(א‬377‫ دمא‬7  773L7-$ 77@‫א‬fx78 77_ 7 ‫א‬7(
 8= 7W‫و‬cI‫א‬B==#- ]%  F ,Z‫وא‬،cI%&‫א)('و‬dL
 7`I‫لא‬7 O‫و‬/07Œd7‫ دم‬7`‫א‬EreferrerF?/7W‫ ?א‬7`S77`i‫א‬76/Œ4
،+=7b‫א‬F7 7 iEHTTP – Hypertext Transfer ProtocolF07‫א‬%7bI‫א‬
 77`S‫ ن‬77 ‫ذא‬aK+=77b‫ضא‬/77t77‫א‬77 &‫א)('و‬i]77b‫אنא‬77I4‫ (ن‬77Jx77‫א‬
07Œ–r/76‫ دم‬7“‫{نא‬7r‫ل‬7Yk‫אن‬I4za‫?و‬،cI‫אنא‬I4gzag6?/W‫?א‬
+=77#-/77 †ًp7S7 ’ 6} 77–‫ دم‬77“‫ضא‬/77677L‫?و‬،+=77b‫א‬F77 77 iHTTP
 K"‫א‬+=b‫ًא‬$،m 3I6/6xž
‫ل‬7 O‫و‬1 - 7` ‫א‬07Œ7` h‫و‬0ZirK Sza‫ ل‬± r.‫א‬/
)‫אא‬x8
،‫ دم‬7“‫א‬+7ƒ ]d7n‫و‬EreferrerF?/W‫` ?א‬S‫{ن‬r،EHTTPF0‫א‬%bI‫` א‬I‫א‬

 KEhttp://tools.ietf.org/html/rfc2616F` h‫^א)('و& א‬ZI‫א‬E1F


95
 

 ‫אوאאאאد‬W
‫אدא و‬

، 7`@‫א‬7‫ذ‬7 Lg 7O 7 ‫ نא‬7({‫م?ن‬p7(‫ذא‬UIKJ=  ‫` א‬Sm&?‫و‬


J? 7Y rd7nO7L ` `@‫א‬i]b‫א‬zagO‫ً?ن‬$3rK 6 i‫( & א‬a%  ‫و‬
 KEblankF= rE'O‫?و‬، L
7‫ذ‬7 L77`i‫א‬+‫] د‬$‫א‬dI…$?/W‫` ?א‬SM 6 i‫( & א‬a
–377rK%7 &‫('و‬$‫" دא‬77#$‫א‬- 77VCJ77bً‫ دא‬77,.‫א‬/77
a77 77 77`@‫א‬
077&‫א‬X‫א‬Mًp8 77
‫و‬،%7 &‫('و‬$‫" دא‬77#$‫א‬  774Mً ƒ773‫ن‬77(677L6‫ د‬77b‫א‬
 7Mً 6k?/W‫` ?א‬S`i‫ (نא‬r،‫ ل‬S$‫אא‬x8 w]6pr، I]‫א‬
K-$ @‫א‬fx8
?/7W‫` ?א‬S L`i‫\א‬b`‫א‬+‫] د‬p\/ ?- S‫'א‬L‫א‬E I8
7ً 7,6?`i 7 ،%7&‫('و‬$‫" دא‬7#$‫א‬- VCJbً‫ دא‬,¿.‫א‬/
am]#
‫ ن‬7,+=7b‫א‬Fzar n) ، ‫ ذא‬3LF0Œ‹Lm&?
‫ن‬7(67‫א‬F7‫א‬7‫ذ‬،7Lhi]7#7‫ دم‬7L+=7b‫א‬F7 7 ž07Œ‫?ن‬
K 78B=‫و‬7cI‫ =א‬7W=7#- 7] 7 i7Lh‫א‬- i]7b‫`š\א‬rً 
‫ ن‬7({‫{ن‬7r6‫ د‬7b‫ א‬73L7?/W‫` ?א‬SM 6 i‫ن‹א‬a‫و‬US`6/"‫א‬fxY‫و‬
‹7L‫ذא‬a ‫و‬M n)‫`א‬i‫א‬6/Œ4+=b‫א‬F0Œ=b Š‫א“ دمא‬
V I‫א‬w& ‫ذא‬a‫؟‬$‫?م‬mZ]&+=b‫א‬F0 Œ=b‫אא‬F‫ذא‬0Œ
07 "‫ دم‬7“‫دא‬/76 7&/ ‫ ذ‬7 ‫?و‬،+=b‫א‬F ž0Œ–r/6‫{نא“ دم‬r?$?
 K‫ د‬b‫­ذא‬rM‫ع‬L‫א‬/6xi Y 3IO+=b+=b‫א‬F
76o‫=א‬7b‫^אمא‬7‫א‬73L‫א‬/?J?،‫ د‬7,— ‫א‬.‫א‬/7
)‫אא‬x78y 7n1 ‫ ل‬
77S?‫ م‬77L 77I4،2 ?N 77O?_/77bµ77S 778،? 778B=‫?و‬77cI‫ =א‬77W

(1) F-Secure (http://www.f-secure.com/weblog/archives/archive-042006.html)


(2) http://www.chase.com/
 

 ‫אوאאאאد‬W
‫אدא و‬ 96
 77#‫_א‬/77b‫ =א‬77W+=77#‫^אم‬77‫ دא‬774?‫و‬F776Bd77L. 77&{6‫ د‬77b‫א‬
 KE2-5F (‫א‬M  _/b‫  دمא‬3Lr ,Z‫א‬
?N 77O?_/77b%77` `@‫א‬d77L+=77#‫ض‬/776E5-5F (77‫ضא‬/76
 K?N O?_/b= +=#‫ض‬/6E3-5F (‫وא‬
? 78B=‫?و‬cI‫ =א‬W6o‫=א‬b‫א^אمא‬3L‫א‬/?‫ د‬,— ‫א‬.‫א‬/
)‫ א‬3"O
77`i 77rK77O%77&‫('و‬$‫" دא‬77#$‫א‬77V877_/77b‫א‬77‫ذ‬%77i ‫ ن‬77
‫" د‬77#$‫א‬77 4F77( ‫ ن‬77 _/77b‫ =א‬77W+=77#F77 77 ž077Œ=‫ د‬77b
 (7‫א‬M 7 /6x7i7 Y 3IO+=7b‫د‬/  C ra_/b‫و(©א‬%&‫('و‬$‫א‬
Md7`6‫ ?ن‬73L i7,‫א‬/7ƒ‫א‬B‫א‬m7 3I‫وذ‬cI‫ =א‬WF™‫د‬/‫ًא‬$E4-5F
 K%&‫('و‬$‫" دא‬#$‫­א‬r
‫ ل‬7‫אא‬x78ME4-5F (7‫א‬M-‫و=د‬t7‫א‬76/6xi‫א‬m7 3I‫ א‬7=\‰
<7L=d7n‫و‹و‬،?KKK77 7bO‫א‬J/7Z‫א‬7L=07(Opr، 7/‫א‬fx8w6?=‫ذא‬a?8
 K‫ ل‬bOp
‫‪97‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ﺷﻜﻞ )‪ (2-5‬ﺍﳌﻮﻗﻊ ﺍﳌﺰﻳﻒ ﳌﺼﺮﻑ "ﺗﺸﻴﺲ"‬

‫ ‬
‫ﺷﻜﻞ )‪ (3-5‬ﺷﻌﺎﺭ ﻣﺼﺮﻑ "ﺗﺸﻴﺲ"‬

‫ ‬
‫ﺷﻜﻞ )‪ (4-5‬ﺭﺳﺎﻟﺔ ﺍﻟﺘﻨﺒﻴﻪ ﺍﻟﺘﺤﺬﻳﺮﻳﺔ‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪98‬‬
‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (5-5‬ﻣﻮﻗﻊ ﻣﺼﺮﻑ "ﺗﺸﻴﺲ"‬
‫ ‬
‫‪ 2.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﱐ‪ :‬ﺍﻟﺘﺼﻔﻴﺔ )‪(Filteration‬‬
‫}‪ ƒ 77= ]77bO7 ’ O‬א‪776‬א)('و&‪%77‬א‪M YS/77W377t77‬א]‪ 77b‬א‪%& 77‬‬
‫‪/7
a Y]7b‬א‪ 77,.‬دאً‪g77 ƒ 7/‬א‪ 77, 7Y& M77 rً 7,6?ESpamF7/‬دאً‬
‫‪- 7VC‬א‪ "77#$‬دא‪'($‬و&‪%77‬א‪ ƒ 77=U774+7‬א‪76‬א)('و&‪M%77‬א“‪77‬אع‬
‫‪ KEdeception-based phishing emilsF‬‬
‫ ‬
99
 

 ‫אوאאאאد‬W
‫אدא و‬

(Security Patches ) ‫ ﺍﻟﺘﺤـﺪﻳﺜﺎﺕ ﺍﻷﻣﻨﻴـﺔ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻟـﺚ‬3.5


(Firewalls) ‫ﻭﺟﺪﺭﺍﻥ ﺍﳉﻤﺎﻳﺔ‬
- 77 I`‫א‬U77477‫عא‬77I‫א‬778%77&‫('و‬$‫" دא‬77#$‫א‬- 77V8‫אع‬77&?77S?
‫ ز‬7Y
M7 I‫א‬-‫א‬/7‫لא‬p7‫א‬m7p 7<76‫و‬،Etechnical subterfugeF7 I]‫א‬

 KEmalwareF 3“‫א‬q‫אא‬0 /O‫و‬،ESpywareFNZV‫א‬q‫א‬/‫=ع‬B i,‫א‬


،Eoperating systemsF 7‫א‬7c&7 I‫א‬- 67i‫א‬/7 †07 /O’ 6}
‫=אن‬7
F7 +B7Y
‫א‬76 ‫و‬،EInternet BrowsersF7  ‫(א‬37‫א‬- i]b‫و‬
‫ل‬p7‫א‬U74+7‫א‬%7&‫('و‬$‫" دא‬7#$‫א‬- 7VCً$ 7¹ rً‫ دא‬7,¿.‫א‬/
a6 X‫א‬
 K I‫א‬-‫א‬/‫א‬
  ‫(א‬37777‫א‬- 777i]bM I‫א‬-‫א‬/‫لא‬p‫א‬U41 ‫א‬
EMozilla FirefoxF?N7777 r/6 rp6‫ز‬77?y77]bM77 I‫א‬+/77‫" دא‬77#‫א‬77 4

Unified Resource Locator - F‫אن‬7I‫א‬F7 6BO‫و‬074p‫א‬wS O?t‫א‬،1.0^ZI‫א‬

‫^م‬7Z‫ א‬7 ž‫ ل‬7SM73IOt7‫א‬Edownload windowF 7 i‫א‬+x7r &MEURL


 K dLF
 77 i‫א‬+x77r &‫ن‬77 ،y]77b‫ <א‬77bOMŠ77" 0377Zwh77S+/77‫א‬fx778
K/7"^œ^7Z— ‫ضא‬/¹ 7O}7L+/7‫א‬fx8K.%Œ  (6"‫א‬6‫ و‬I‫ضא‬/O
76/Œ74%78+/7‫א‬fx78‫ل‬p7‫א‬7V & i7n^7Z‫عא‬7L`6/ŒH/L?
<7h7‫و‬،F76Bd7Lzag76Jx7‫وא‬7 &‫('و‬a6/ =Mš‫=א‬U4š,‫א‬
 Y&?U4 i,‫^مא‬Z/YcO‫א‬xY‫و‬،F6B‫א‬dL‫ ذא‬3 q‫א‬/ ž

(1) “Firefox flaw raises phishing fears”, by Ingrid Marson, Published: January 7, 2005
11:06 AM PST , (http://www.news.com/Firefox-flaw-raises-phishing-fears/2100-
1002_3-5517149.html)
 

 ‫אوאאאאد‬W
‫אدא و‬ 100
 Ky i#dL ž
’Zœ‫ز‬p‫א‬- 6i‫?א‬N r/6 rp6‫?ز‬-=#?+/‫א‬fx8_  ‫א‬
‫ع‬7L‫א‬/7" J‫ د‬7]m76žy]7b‫א‬%^7Zd7 §U7407
‫وو‬،+/‫א‬fx8
 K+/‫א‬fx8‫ل‬p$ in
 
Cross-Site Script ) ‫ ﺗﺼﻔﻴﺔ ﺍﻷﻛﻮﺍﺩ ﺍﻟﱪﳎﻴﺔ ﺍﳋﺒﻴﺜﺔ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺮﺍﺑﻊ‬4.5
(- XSS
7Emalicious content injectionFv7 3“‫\א‬o‫`א‬SH?M &/ ‫  ذ‬
v7 3 \7‰7`S‫?و‬r n{‫`ن‬66‫ د‬b‫?نא‬،%&‫('و‬$‫" دא‬#$‫א‬0  ?
\7o‫אא‬x78‫م‬7`6‫?ن‬7(KElegitimate siteFy i#dLza Emalicious contentF
 W%  v 3“‫א‬
 K\/ ?dL‫א‬zay ib‫א‬dL‫א‬/ƒ‫زא‬m
O+‫ د‬4a J
 KdL‫א‬/ƒ‫ ززא‬Y
MEmalwareF 3 q‫א‬/0 /O J
 K%&‫('و‬$‫" دא‬#$‫ دمא‬zadL‫א‬M ‫א‬- & 3‫א‬m
O+‫ د‬4a J
M7 I?+/7h‫ل‬p7‫א‬76/Œ74\7o‫א‬7`³H7‫(ž` ذא‬
fx78M7 3 7 k/‫אد‬7 ?7`SEhackersF /¹ 7^y 6   ‫(א‬3‫ دمא‬
%77k/ 77 %778‫و‬،Ecross-site script - XSSF777+/77‫א‬fx778_/77OK‫אدم‬77“‫א‬

 37U74K%
= 7 =7b 73L7_ ,\‰qI6Eprogramming flawF
،Euser reviewF 7q7I=‫وא‬B7‫` <א‬O‫?و‬،EblogsF- &‫אو‬M=‫وא‬B‫א‬- ` O‫א ل‬
- 77 /‰Mv77³- 77 ‫?و‬،Ediscussion boardsF‫ ش‬77`I‫א‬- 77`SM 77=‫?و‬

7777  ‫(א‬3777777‫א‬U77477‫א‬%77&‫א)('و‬776‫א‬M+‫ وא=د‬77777777=‫?و‬،v77i3‫א‬


101
 

 ‫אوאאאאد‬W
‫אدא و‬

 KEweb-based emailF
H77Š%77&‫('و‬$‫" دא‬77#$‫ א‬i77n‫ع‬77L‫א‬/77" J‫ د‬77]U77‫א‬77`6/"‫א‬
‫ دم‬77“‫א‬M 77Yc]S 773L 778‫ د‬a‫אدو‬77 ‫א‬fx778 ]77bO778،v77 3“‫\א‬77o‫א‬77`S
 K=‫وא‬B‫א‬- i]bU4 Yn/4‫م‬4‫ ن‬n%  ‫و‬
 
(Visual Keyboard) ‫ ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﳋﺎﻣﺲ‬5.5
<76‫و‬،76 `‫א‬7`6/"‫א‬746/7Z‫א‬- 7& 3‫ لא‬7 ‫)د‬76`6/Œfx8O
= 77À‫و‬،77 &‫ لא)('و‬77‫א‬i]77#M77 ƒ/y O 77]77S776/Œ774 77C ‫د‬a
y O 7]‫א‬7S7H7"‫ ‘א‬7]‫א‬U74/`I‫وא‬+=Š]‫א‬6/ž"‫ א‬YI‫^م‬Z‫א‬
 KW ‫א‬U4 ƒ/‫א‬
776/Œ7746/77Z‫א‬- 77& 3‫א‬L/77Zً‫ دא‬77,¿.‫א‬/77
a77 ƒ/‫א‬y O 77]‫א‬77S773"O
‫ ز‬7Y
7Ekey loggingFy O ]‫א‬S-‫א‬/`& VZOt‫א‬EmalwareF 3“‫א‬q‫אא‬
‫ص‬p^7‫وא‬، Y7 i‫م‬7`6Jx7‫א‬،‫ د‬7b‫א‬za C 7={‫م‬7`O<7h‫و‬، i,‫א‬
 K i,‫ א‬b^W‫ ل‬i&$- & 3‫א‬
^77Z‫ =_א‬77b‫א‬77S77 ƒ/‫א‬y O 77]‫א‬77SE6-5F (77‫ضא‬/776
 Km ZSza‫ ل‬6/Z‫א א‬- & ‫)د ل‬
/67"O‫א‡ن‬U7S6‫ د‬7b7Z6<r، Sza ± r ƒ/‫א‬y O ]‫א‬S
‫^אم‬7‫א‬7©L 7•M7 ƒ/‫א‬y O 7]‫א‬S43"‫א‬- & 3‫` طא‬$ 3 q‫א‬/
 K &‫א)('و‬dL‫אא‬M ƒ/‫א‬y O ]‫א‬S
- 77& 3‫א‬U774_/7777 3 q‫א‬/77/677"O77ً 7`S$‫ن‬77/¹ ^‫(א‬77677L
 K ƒ/‫א‬y O ]‫א‬S"‫א(א‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬ ‫‪102‬‬
‫ ‬
‫ ‬

‫ ‬
‫ﺷﻜﻞ )‪ (6-5‬ﻟﻮﺣﺔ ﺍﳌﻔﺎﺗﻴﺢ ﺍﳌﺮﺋﻴﺔ ﰲ ﺻﻔﺤﺔ ﺍﻟﺪﺧﻮﻝ ﻷﺣﺪ ﺍﳌﺼﺎﺭﻑ‬

‫‪Two-Factor‬‬ ‫‪ 6.5‬ﺍﻹﺟــﺮﺍﺀ ﺍﳌﻀــﺎﺩ ﺍﻟﺴــﺎﺩﺱ‪ :‬ﺍﻟﺘﺼــﺪﻳﻖ ﺍﻟﺜﻨــﺎﺋﻲ )‬


‫‪(Authentication‬‬
‫‪?77ً 7,6?_/76‬א‪67b‬א`‪x78MKEStrong AuthenticationF?J7‬אא)
‪/7‬א‪.‬‬
‫‪<6‬א^אمŒ‪/Œ`6/‬قא‪ ,6b‬ند=
?‪U4‬א‪ K6b‬‬
‫‪/Œ-phE I8‬ق‪ W6b‬‬
103
 

 ‫אوאאאאد‬W
‫אدא و‬

 K=‫و‬/‫و א‬،‫^م‬Z‫ <א‬W?what you know??‫_؟‬/O‫  ذא‬J


 Esmart cardF x‫א‬L "3 W?what you have??‫  ذא…؟‬J
d37#)‫א‬7b3 ،76 @‫א‬- ]7b‫א‬%78‫و‬W،?what you are??‫؟‬w7&?7 J
 KEfingerprintF
 7Y r<76‫و‬،‫عאول‬I‫א‬%8،6b‫ א‬4M^Z‫א‬6 `‫`א‬6/"‫א‬
،‫ ل‬7bO$‫ א‬4Mr/"‫( א‬r‫و‬/‫و‬L- & 36b‫א‬0 Œ6‫و‬BO
 K=‫و‬/‫و א‬،‫^م‬Z‫ <א‬
76‫و‬B ،fp74?+= x7‫אعא‬7&‫א‬4&‫<א^אم‬6%ƒ I‫א‬6b‫א‬M
 K x‫א‬L "3‫?وא^אمא‬،d3#‫א‬b‫و‬،=‫و‬/‫و א‬،‫^م‬Z‫א<א‬
‫^م‬77ZOt77‫وא‬،EATM cardF_‫א‬/77b‫א‬77L "%ƒ 77I‫א‬677b‫א‬U774‫ ل‬77

 7 ‫مא‬7`6J7`I‫א‬0i7Z‫א‬7 4MK%7‡‫_א‬/b‫א‬+BY
?J`I‫א‬0iZ
7 ‫ ً{د ل‬,6?‫`م‬6‫و‬،?‫? ذא…؟‬%& ‫عא‬I‫א‬Ot‫وא‬،L "3‫{د لא‬
 K?‫_؟‬/O‫عאول? ذא‬I‫א‬6Jx‫و=א‬/‫א‬
77  77،6/77Z‫א‬- 77& 3‫قא‬/7ZO%77&‫('و‬$‫" دא‬77#$‫א‬- 77 4M+‫ د‬74
\/7 ?- 7& 07Œ<76x،?‫_؟‬/O‫عאول? ذא‬I‫א‬F»IbOt‫א‬،=‫و‬/‫א‬
67b‫אعא‬7&?76/7 ‡‫א‬4I‫א‬za%IO- & 3 ،6b‫ א‬4M r na
 K?‫؟‬w&? ?‫?و‬،?‫? ذא…؟‬
74%7&‫('و‬$‫" دא‬7#$‫א‬- VCً‫ دא‬,ً‫א‬.‫א‬/
a‫^م‬Z6%ƒ I‫א‬6b‫א‬
‫" د‬7777#$‫وא‬،EMan-in-the-middle AttackFš7777‫א‬M 7 77
/‫א‬7777V877776/Œ

 KEIdentity AttackF b^‫ لא‬i&‫وא‬،dL‫אא‬F 6BO6/Œ4%&‫('و‬$‫א‬


 
 

 ‫אوאאאאد‬W
‫אدא و‬ 104
(Mutual Authentication) ‫ ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺴﺎﺑﻊ‬7.5
‫א‬x78MKETwo-way AuthenticationF?f ¤$‫א‬%ƒ I‫א‬6b‫?א‬7ً ,6?_/6‫و‬
677b‫ دم‬77“‫مא‬77` r،/77 ‡‫ א‬Y77,‫ دم‬77“‫ وא‬77 ‫א‬77ٍ 7 ‫ق‬¹7 b6}.‫א‬/77
)‫א‬
N 6 7` ،6b‫و ƒ א‬fg‫?و‬،%b^‫א‬F6/‫א‬B=6/Œ4 ‫א‬
m7&?77`i6‫و‬، 7 ‫ א‬73L7‫א“ دم‬6bO<6ً ,6?‫و‬،EBiometricsF6 @‫א‬
 Kً ]6Bً L‫(ن‬6‫ א“ دم Šن‬b^ iI™N ‫و‬،‫د‬b`‫  “ دمא‬b
77`iً 7L/Œ‫ ل‬7bO‫א‬7 4Mr/7"‫א‬7 7(‫ دل‬73‫א‬6b‫א‬y 6
 K–3 Y,68i#
 (7‫א‬y7n6‫؛و‬f 7¤$‫א‬J‫ د‬7S‫א‬67b‫א‬7 4E7-5F (‫א‬yn6
 K‫ دل‬3‫א‬6b‫ א‬4E8 J5F
‫م‬7`67Sm7&?%78، ‫ א‬3L‫א“ دم‬6b^Z‫قא‬/"‫\א‬Sa
‫^م‬7ZOEphraseF7§‫?و‬+=7#= 7À 7 ‫{نא‬7r‫ دم‬7“‫ \א‬VZ  ‫א‬
‫م‬7`6،‫ دم‬7“‫ لא وא‬bO‫א‬. &aIrK ‫ א‬3L‫א“ دم‬6b `S$
+=7b‫א‬w7& ‫{ذא‬r، VZ‫ א‬4Mً `3Z+‫د‬o‫א‬X‫وא‬+=b‫ضא‬/‫א“ دم‬
 K‫א“ دم‬6bO<6i i#X‫وא‬
74%7&‫('و‬$‫" دא‬7#$‫א‬- 7VCً‫ دא‬7,¿.‫א‬/
a‫^م‬Z6‫ دل‬3‫א‬6b‫א‬
‫" د‬7777#$‫وא‬،EMan-in-the-Middle AttackFš7777‫א‬M 7777
/‫א‬7777V877776/Œ

 KEIdentity AttackF b^‫ لא‬i&‫وא‬،dL‫אא‬F 6BO6/Œ4%&‫('و‬$‫א‬


‫‪105‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ﺷﻜﻞ )‪ (7-5‬ﺍﻟﺘﺼﺪﻳﻖ ﺍﻷﺣﺎﺩﻱ ﺍﻻﲡﺎﻩ‬

‫ ‬
‫ﺷﻜﻞ )‪ (8-5‬ﺍﻟﺘﺼﺪﻳﻖ ﺍﳌﺘﺒﺎﺩﻝ‬

‫‪ 8.5‬ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺜﺎﻣﻦ‪ :‬ﺃﺷـــﺮﻃﺔ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤـﺔ ﺍﻻﺻـﻄﻴﺎﺩ‬


‫ﺍﻻﻟﻜﺘﺮﻭﱐ )‪(Anti-Phishing Toolbars‬‬
‫‪š6/77W‬אدوא‪?+774J77Ÿš6/77W778-‬ز=א=‪ 77‬و•‪77I Fƒ 77‬؛و‪77(6‬ن‬
‫‪ 4‬د‪M+‬א‪YX‬א‪/76KEApplicationF 77 3"O776‬ضא‪š6/7WE9-5F (7‬‬
‫‪Internet‬‬ ‫?دوא‪y]77bU774? 77

?-‬א‪(377777777‬א  ‪F?==377777Z aw77&'&a?77‬‬
‫‪ KEExplorer‬‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 106
- /77‫א‬77776‫ مא‬77L%7 &‫('و‬$‫" دא‬77#$‫א‬- 77V8/77" U774ً‫=دא‬
-‫Œ?دوא‬/777W?‫ ج‬777& ?wr777‫و‬/(6 ?7777 ،- 777 k‫א‬%777VI‫?و‬eBay? /777
U7774EAdd-onF- r 777na0777 /O%7 7&‫('و‬$‫" دא‬777#$‫א‬777ir (M777bb^
 KEE-Mail ClientF%&‫א)('و‬6‫ א‬4q‫א‬/‫و‬،  ‫(א‬3‫א‬- i]b
‫" د‬7#‫א‬d7L‫א‬mO= 6‫ز‬I4‫^م‬Z‫א‬m 3IO8‫ م‬4 (Œ/W‫א‬fx8] •‫و‬
U74_/7‫א‬%7&‫('و‬$‫" دא‬7#$‫א‬ir (-‫Œ?دوא‬/W?‫ل‬p ‘ 6K83
m7O= 6‫אدز‬/7‫א‬d7L‫א‬74‫م‬p$‫א‬6/Œ4%&‫('و‬$‫" دא‬#$‫?و= ƒ א‬dL‫א‬
 7Y r V
± 7ZO}EdatabasesF- 7& 74‫א‬L7‫א=د‬7‫א‬6‫א‬4‫?و‬،‫^م‬Z‫ א‬3L
 Y67ž<76t‫א‬،83‫א(]?وא‬.‫א‬،%&‫('و‬$‫" دא‬#$‫و= ƒ א‬dL‫א‬
76/Œ74‫?و‬،%7&‫('و‬$‫" دא‬7#$‫א‬d7L‫ _א‬7 ‫א‬M7bb^- Y
 3L
M7`ً 7L/Œ‫^م‬7ZO-‫–אدوא‬7‫و‬K6/ †^Z+‫אא=د‬- p3‫א‬
77 36/V‫قא‬/77"‫א‬77 3" ،%7 &‫('و‬$‫" دא‬77#$‫א‬d77L‫ ƒ وא‬77=U774_/77‫א‬
‫" د‬7#$‫א‬- 7 4_ 7 $EpatternsF/8 7c‫א‬U74_/Eheuristic methodsF
 K%&‫('و‬$‫א‬
‫" د‬77#$‫א‬77ir (-‫Œ?دوא‬/77W?F77^77ƒ LE1-5F‫ول‬77X‫ضא‬/776
 K  ‫(א‬3‫א‬U4 Y"‫=وא‬zar n) ،%&‫('و‬$‫א‬
Phishing Fq 7&/،%7&‫('و‬$‫" دא‬7#$‫א‬ir (-‫Œ?دوא‬/W?U4ً$ 
‫א‬x77877`i6K 77Z‫^א‬77ZI‫==?א‬377Z aw77&'&a?y]77b‫א‬d77q77‫א‬1 EFilter
8377i]77b‫א‬w77& ‫ذא‬a، 77YO= 6‫^مز‬77Z‫א‬077"6i]77# 77 77q 77&‫א‬
/6x77i/]77#‫ نא‬77=‫ز‬-‫אن‬77I‫šא‬6/77W077& Q-y]77b‫א‬U774?M/Yc 77Zr

(1) “Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce


Content”, anti-phishing white paper, Microsoft.com,2005
107
 

 ‫אوאאאאد‬W
‫אدא و‬

- 7& J?. 7ra‫م‬7y7bIO7 Y 3IO =‫ض‬/=B‫א‬U4š, ،‫^م‬Z‫א‬


 KE10-5F (‫א‬M  ،i]b‫א‬fxC b^W‫?و‬،6/
 73L7m7O= 6‫ز‬H7"‫א‬dL‫?نא‬EPhishing FilterFq &/ ŠO‫ ل‬SM

–‫אن‬7I‫šא‬6/7W07& Q–y]b‫א‬U4?M/Yc  J‫" د‬#‫א‬dL8‫^œم‬Z— ‫א‬


‫" د‬7#$‫א‬i]7#‫ض‬/74dI 7m&?r n) ،‫^œم‬Z— ‫א‬/6xi/‫ز= نא‬
،i]7b‫قא‬p7a 7a،‫ =אن‬7  Y r6/6xži]# YIً$‫ض‬/6‫و‬،%&‫('و‬$‫א‬
 7 ،‫^œم‬7Z— ‫و א‬7ZU4%&‫('و‬$‫" دא‬#$‫א‬i]#‫ض‬/4M=‫א‬/$‫?وא‬
 KE11-5F (‫א‬M
-5F (77‫א‬M‫وض‬/77‫א‬1 ?SpoofGuard?-‫šאدوא‬6/77W778/77 †‫ ل‬77
LdL‫{ذא نא‬r،‫^م‬Z‫ א‬3LmO= 6‫אدز‬/‫א‬dL‫א‬+‫אدא‬fx8`iOKE12
+‫אدא‬d"7ZO ‫ذא‬a‫و‬،.‫א‬/77&`6?+‫ضאدא‬/7Zr‫" د‬7#‫א‬dLm&?U4_/¹ 4}
،.‫א‬/]7#7&`6?+‫ضאدא‬/7Zr$‫" د?م‬7#‫א‬d7Ld7L‫ذא نא‬a U4_/‫א‬
 K.‫א‬/, &`6?+‫ضאدא‬/Zr†m&?U4dL‫`א‬i‫ذא‹א‬a‫و‬
 

 
"‫( ﺷﺮﻳﻂ ﺃﺩﻭﺍﺕ ﺟﻮﺟﻞ ﻋﻠﻰ ﻣﺘﺼﻔﺢ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ "ﺇﻧﺘﺮﻧﺖ ﺇﻛﺴـﺒﻠﻮﺭﺭ‬9-5) ‫ﺷﻜﻞ‬
(Internet Explorer)
 

1 crypto.stanford.edu/SpoofGuardL
 

 ‫אوאאאאد‬W
‫אدא و‬ 108
. ‫ ﻗﺎﺋﻤﺔ ﺃﺷﺮﻃﺔ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ‬.(1-5) ‫ﺍﳉﺪﻭﻝ‬
‫ﺭﺍﺑﻂ ﺍﻟﺸﺒﻜﺔ ﺍﻟﻌﺎﳌﻴﺔ‬ ‫ﺷﺮﻳﻂ ﺍﻷﺩﻭﺍﺕ‬
microsoft.com/ie Internet Explorer 7 Phishing Filter
pages.ebay.com/ebay_toolbar eBay
www.callingid.com CallingID
cloudmark.com CLOUDMARK
earthlink.net EarthLink
toolbar.trustwatch.com TrustWatch
crypto.stanford.edu/SpoofGuard SpoofGuard
 
 

 

‫( ﺭﺳﺎﻟﺔ ﺍﻟﺘﻨﺒﻴﻪ ﻋﻦ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﺍﳌﺸـﺒﻮﻫﺔ ﰲ ﺍﳌﺘﺼـﻔﺢ‬10-5) ‫ﺷﻜﻞ‬


"‫"ﺇﻧﺘﺮﻧﺖ ﺇﻛﺴﺒﻠﻮﺭﺭ‬
‫‪109‬‬
‫ ‬

‫אدא و
‪W‬אوאאאאد ‬

‫ ‬
‫ﺷﻜﻞ )‪ (11-5‬ﺭﺳﺎﻟﺔ ﺍﻟﺘﻨﺒﻴﻪ ﻋﻦ ﻣﻮﺍﻗﻊ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ ﰲ ﺍﳌﺘﺼﻔﺢ "ﺍﻧﺘﺮﻧﺖ‬
‫ﺍﻛﺴﺒﻠﻮﺭﺭ"‬

‫ﺷﻜﻞ )‪ (12-5‬ﺷﺮﻳﻂ ﺃﺩﻭﺍﺕ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ "‪"SpoofGuard‬‬


 

 ‫אوאאאאد‬W
‫אدא و‬ 110
Anti- ) ‫ ﺑﺮﺍﻣﺞ ﻣﻜﺎﻓﺤﺔ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘـﺮﻭﱐ‬:‫ ﺍﻹﺟﺮﺍﺀ ﺍﳌﻀﺎﺩ ﺍﻟﺘﺎﺳﻊ‬9.5
(Phishing Software
- 77V877n776 @‫א‬Esecurity softwareF776 @‫א‬q‫א‬/77<77c77,O

‫ل‬p77‫א‬U77477‫?وא‬، ƒ 77/‫א‬U77477‫ א‬77Y 4I%7 &‫('و‬$‫" دא‬77#$‫א‬


 K I‫א‬-‫א‬/‫א‬
‫" د‬777#$‫ ƒ א‬777=‫و‬d777L‫א‬U7774_/777‫ ًא‬7 74q‫א‬777‫א‬fx7778d "777ZO
،%7&‫('و‬$‫" دא‬7#$‫א‬ir (-‫Œ?دوא‬/W?M3‫ א‬YZ]&`6/" %&‫('و‬$‫א‬
(377‫א‬- i]77bU774- r 77na-‫Œ?دوא‬/77W?077 '‫م‬77`O776 @‫א‬q‫א‬77r
 K%&‫א)('و‬6‫ א‬4q‫א‬/‫و‬،  ‫א‬
‫" د‬77#$‫א‬- 77VCJ77b‫א‬zar 77n) 3rK77 (ً$77S776 @‫א‬y 77O
-‫א‬/77`&-pV77 Z‫و‬،EmalewareF77 3“‫א‬q‫א‬77‫א‬yr 77(Oً 7 ,6? 77Y&{r،%77&‫('و‬$‫א‬
 K b^‫وא‬،6/Z‫א‬- & 3‫א‬L/zaJ‫د‬OLt‫א‬،Ekey loggerFy O ]‫א‬S
 K YI+
/‫א‬+ƒ ]‫` א‬i% ?‫ط‬/W/Z‫א‬6 @‫א‬q‫א‬/v6ž
77n776 @‫א‬U77477‫א‬776 @‫א‬q‫א‬7777ƒ L‫ض‬/776E2-5F‫ول‬77X‫א‬
 K  ‫(א‬3‫א‬U4 Y"‫=وא‬zar n) ،%&‫('و‬$‫" دא‬#$‫א‬- V8
 
‫( ﻗﺎﺋﻤﺔ ﺑﺮﺍﻣﺞ ﺍﳊﻤﺎﻳﺔ ﺿﺪ ﻫﺠﻤﺎﺕ ﺍﻻﺻﻄﻴﺎﺩ ﺍﻻﻟﻜﺘﺮﻭﱐ‬2-5) ‫ﺟﺪﻭﻝ‬
  ‫(א‬3‫=אšא‬  6 @‫א‬q &/
kaspersky.com Kaspersky Internet Security
symantec.com Norton Internet Security
mcafee.com McAfee Internet Security Suite
trendmicro.com Trend Micro Internet Security
bitdefender.com BitDefender Internet Security
grisoft.com AVG Internet Security
pandasecurity.com Panda Internet Security
111
 

 ‫אوאאאאد‬W
‫אدא و‬

‫)( ا دات‬


Access
‫ ل‬bO‫א‬
Active Attack
š I‫مא‬VC‫א‬
Address Obfuscation
‫אن‬I‫א‬6O
ATM
 %‡‫_א‬/b‫א‬+BY
?
Anti-Phishing Toolbars
‫" د‬77777777#$‫א‬77777777ir (-‫Œ?دوא‬/77777777W?
 %&‫('و‬$‫א‬
Anti-Phishing Softwares
 %&‫('و‬$‫" دא‬#$‫א‬ir (q‫א‬/
Application
  3"O
Attachments
- `r/
Attacker
<
Y‫א‬
Authentication
6b‫א‬
Backdoors
 ] H‫?א‬
Bandwidth
 ‫ ل‬bO$‫א‬+ IL
Bank
 _/b
Biometrics
6 @‫א‬N 6 `‫א‬
Black List
.‫دא‬Z‫א` ƒא‬
Blog
 &‫و‬
Bounced E-Mail
 +O/‫א‬%&‫א)('و‬6‫= ƒ א‬
Browser
y]b‫א‬
 

 ‫אوאאאאد‬W
‫אدא و‬ 112
Chat Rooms
 h‫ د‬o‫_א‬/
Commercial Whitelists
 6= V‫א‬. , 3‫א`אƒ<א‬
Computer
H S
Configuration
š3nL‫אد‬4‫א‬LP YO
Content
 \‰
Cracker
H»/Ž
Database
 - & +4 L
Data Integrity
- & 3‫א‬E  (O‫?و‬Fp
Dialog Box
J=‫א‬S‫وق‬I#
Dictionary Attack
 ‫א` س‬V8
Discussion Boards
 ‫` ش‬I‫א‬- `S
DNS Poisoning
 - L "I‫א‬. ˜?‫ < دم‬ZO
Domain Name
‫" ق‬I‫א<א‬
Download

E-mail
%&‫א)('و‬6‫א‬
E-mail account
%&‫א)('و‬6‫א‬H ZS
E-mail address
%&‫א)('و‬6‫אنא‬I4
E-mail client
%&‫א)('و‬6‫ א‬4q &/
E-mail Filtering
%&‫א)('و‬6‫] א‬bO
E-Mail Header
  /‫=?سא‬Z6‫و‬/O
E-Mail Route
 %&‫א)('و‬6‫ == א‬Z
113
 

 ‫אوאאאאد‬W
‫אدא و‬

E-mail Server
%&‫א)('و‬6‫ دمא‬
Fax
 EN ]‫א‬Fˆ &
Filtering
 ]bO
Firewalls
6 @‫
א=א‬
Form
 ‫´ذج‬
Forums
 - 6I‫א‬
Hackers
E‫ز‬/ C‫א‬F  ‫(א‬3‫א‬L'Ž
Heuristics Methods
 36/V‫قא‬/"‫א‬
Hosts File
 ] ,‫א“אدمא‬F
HTML
 0‫א‬%bI‫א‬B '‫א‬
HTTP
 0‫א‬%bI‫` א‬I‫ لא‬O/
Inquiry
‫م‬p‫א‬
Install
w 3OL0 bIOL0 /O
Instant Messenging
/W 3‫א'א א‬L%&‡‫א'א א‬
Internet
   ‫(א‬3‫א‬
Integrity Check
   (‫`א‬i‫א‬
IP Address
w&'&$‫ لא‬O‫و‬/‫אن‬I4
IPS
 - L‫ 'א‬$‫א‬dIc&?
Junk mail
H/‫א‬g6‫א‬
Keystroke Logger
y O ]‫א‬S-‫א‬/`& VZ
Locally
 %‰
 

 ‫אوאאאאد‬W
‫אدא و‬ 114
Look and Feel
 ‫ س‬ZS)‫وא‬/cI‫א‬
Malicious content
v 3 \‰
Malware
 3“‫א‬q‫אא‬
Man-In-The-Middle
 š‫א‬M
/‫א‬V8
Message body
 /‫&”א‬
Mutual Authentication
 ‫ دل‬3‫א‬6b‫א‬
OCR
 ً ƒn_@‫א‬U4_/‫א‬
Online
 /W 3‫ ل‬bO‫א‬L%&†‫ ل‬bO‫א‬
Online trust
 %&‡‫قא‬h‫א‬
Open Mail Rely
 ‘]‫א‬%&‫א)('و‬6‫ دمא‬
Operating System
  ‫ مא‬c&
Passive Attack
 ¾Z‫مא‬VC‫א‬LSp‫مא‬VC‫א‬
Password
 =‫و‬/‫ א‬
- 7L "I‫ א‬. 7˜?‫ دم‬-pVM04p‫א‬
Pharming
  3“‫א‬4=B‫א‬L
Phishing %&‫('و‬$‫" دא‬#$‫א‬
POP3
 6‫א‬0(‫ ل‬O‫و‬/
Popup
`3I‫א‬- i]b‫א‬
Programming Flow
 %k/ 
Regular Expressions
 rŠ‫א‬-‫א‬g3‫א‬
Scam
‫  »אع‬4
115
 

 ‫אوאאאאد‬W
‫אدא و‬

Search Engines
 vi3‫א‬- /‰
Security Updates
 I‫א‬- 6i‫א‬
Server
‫א“ دم‬
Smart Card
 x‫א‬L "3‫א‬
SMTP
 š Z3‫א‬6‫ ل&` א‬O‫و‬/
SMS
 +gbL b& =
Social Engineering
  4 
$‫א‬IC‫א‬
Spywares
NZV‫א‬q‫א‬/
Strong Authentication
 J`‫א‬6b‫א‬
Subject
 /‫عא‬n
Text Field
 %»b& `S
Tools
+4 Z‫א‬-‫אدوא‬
Traffic
 r‫א‬
Two-Factor Authentication
 %ƒ I‫א‬6b‫א‬
Upgrade
 L'‫א‬-‫א=א‬#a
User name
‫^م‬Z‫א<א‬
Version number
^ZI‫<א‬L=
Virus
‫وس‬gr
Visual Keyboard
  ƒ/‫א‬y O ]‫א‬S
Vulnerability
+/h
Web browser
   ‫(א‬3‫א‬y]b
 

 ‫אوאאאאد‬W
‫אدא و‬ 116
Webmail    ‫(א‬3‫א‬U4„3‫א‬%&‫א)('و‬6‫א‬
White List
. , 3‫א` ƒא‬
Window
 +xr &
Worm
+‫دود‬
www
  ‫(א‬3‫א‬
 
 
117
 

 ‫אوאאאאد‬W
‫אدא و‬

+‫ا ا*ــــــــ‬
 
• Jonathan B. Postel, "SIMPLE MAIL TRANSFER PROTOCOL", RFC 821,
(http://tools.ietf.org/html/rfc821), August 1982.
• Network Working Group, "Requirements for Internet Hosts -- Application and
Support", RFC 1123, (http://tools.ietf.org/html/rfc1123), May 1996.
• Network Working Group, "Post Office Protocol - Version 3", RFC 1939,
(http://tools.ietf.org/html/rfc1939), May 1996.
• Network Working Group, "MAIL ROUTING AND THE DOMAIN
SYSTEM", RFC 974, (http://tools.ietf.org/html/rfc974) , January 1986.
• Network Working Group, "Common DNS Operational and Configuration
Errors", RFC 1912, (http://tools.ietf.org/html/rfc1912) , February 1996.
7P 8،?6‫د‬7Z‫א‬7 /‫א(א‬M  iL$‫ ƒ א‬/8‫א‬/‫א‬dn‫` <א‬O? •

،‫م‬2008 J77777777777781429،- 77777777777‫א‬77777777777 I`O‫و‬-$ 77777777777bO$‫א‬


Ehttp://www.spam.gov.sa/Statistics-Arabic.docF
• The State of Spam, A Monthly Report – February 2007, Generated by
Symantec Messaging and Web Security
(http://www.symantec.com/avcenter/reference/Symantec_Spam_Report_-
_February_2007.pdf).
• 2006  Spam Trends Report: Year of the Zombies, December 27, 2006,
Commtouch® Software Ltd.,
(http://www.commtouch.com/documents/Commtouch_2006_Spam_Trends_Ye
ar_of_the_Zombies.pdf).
• CALIFORNIA BUSINESS AND PROFESSIONS CODE, DIVISION 7,
PART 3, CHAPTER 1, ARTICLE 1.8.Restrictions On Unsolicited
Commercial E-mail AdvertisersK

• ?Virus description service" from "F-Secure", (http://www.f-secure.com/v-


descs/novarg.shtm).
W‫אن‬I2004\ Z6‫\د‬31­6=  `6/r?HIX‫א‬24= 3 ‫א‬+6/

SA cops, Interpol probe murder” ?
(http://www.news24.com/News24/South_Africa/News/0,,2-7-
 E1442_1641875,00.html
• Thomas A. Knox,Technologies to Combat Spam, GIAC Security Essentials
 

 ‫אوאאאאد‬W
‫אدא و‬ 118
Certification (GSEC) Practical Assignment, Version 1.4b, Option 1 , SANS
Institute, June 16, 2003K
• “Gmail uses Google's innovative technology to keep spam out of your inbox”,
gmail.com, (http://www.google.com/mail/help/fightspam/spamexplained.html),
December, 2007K

• ? Nick Johnston, PDF Spam: Spam Evolves, PDF becomes the Latest Threat",
Anti-Spam Development at MessageLabs, A MessageLabs Whitepaper,
August 2007K
• Anti-Spam Research Group (ASRG) of the Internet Research Task Force
(IRTF), (http://asrg.sp.amL).
• Mark Ciampa, “Security + Guide to Network Security Fundamentals”, 2nd
edition, THOMSON, 2005.
• M. Jakobsson, S. Myers, “Phishing and Countermeasures: Understanding the
Increasing Problem of Electronic Identity Theft”, WILEY, 2007.
• R. Lininger, R. Vines, “Phishing: Cutting the Identity Theft Line”, WILEY,
2005.
• L. James, “Phishing Exposed”, SYNGRESS, 2005.
• A. Emigh, "Online Identity Theft: Phishing Technology, Chokepoints and
Countermeasures", Radix Labs, October 3, 2005.
EI3‫א‬S‫א‬.pY
‫א‬%&‫('و‬$‫" دא‬#$‫= א‬h‫]ž  @ د‬L‫?و‬ •

77V@‫א‬J‫ذ‬7714w377Z‫א‬،6‫د‬77Z‫ ضא‬776/‫א‬+776/
،77‫א‬77 ،?6‫د‬77Z‫א‬
13718‫ אد‬J‫م‬2006/6 I614 J781426
• Christopher Abad, “The economy of phishing: A survey of the operations of
the phishing market”, First Monday, volume 10, number 9, September 2005,
(http://firstmonday.org/issues/issue10_9/abad/index.html). M. Jakobsson, S.
Myers, “Phishing and Countermeasures: Understanding the Increasing Problem
of Electronic Identity Theft”, Wiley, 2007.
• The Anti-Phishing Working Group, www.apwg.com.
• Phishing Activity Trends, Report for the Month of November, 2007, Anti-
Phishing Working Group (APWG), apwg.org
• Gartner, Media Relations, 2008 Press Releases, “Gartner Survey Shows
Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These
Attacks”, (http://www.gartner.com/it/page.jsp?id=565125), 05-March-2008.
• Joris Evers, Staff Writer, “PayPal fixes phishing hole”, CNET News.com,
119
 

 ‫אوאאאאد‬W
‫אدא و‬

(http://www.news.com/PayPal-fixes-phishing-hole/2100-7349_3-
6084974.html) , Published: June 16, 2006 4:12 PM PDT.
• Sebastian Bauer, “Knorr.de SQL Injection and XSS Vulnerabilities”,
(http://blog.gjl-network.net/blog/index.php?/archives/78-Knorr.de-SQL-
Injection-and-XSS-Vulnerabilities.html) , 01/12/07.
• http://www.antiphishing.org/phishing_archive/Citibank_3-31-04.htm
• Ingrid Marson, “Firefox flaw raises phishing fears”,
(http://www.news.com/Firefox-flaw-raises-phishing-fears/2100-1002_3-
5517149.html), Published: January 7, 2005 11:06 AM PST
• Network Working Group, "Hypertext Transfer Protocol -- HTTP/1.1", RFC
2616, June 1999, (http://tools.ietf.org/html/rfc2616)
• “Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce
Content”, anti-phishing white paper, Microsoft.com,2005

You might also like