SlideShare uma empresa Scribd logo
1 de 32
• Pronounced “fishing”
• The word has its Origin from two words “Password
Harvesting” or fishing for Passwords
• Phishing is an online form of pretexting, a kind of
deception in which an attacker pretends to be
someone else in order to obtain sensitive
information from the victim.
• Also known as "brand spoofing“.
• Phishers are phishing artists.
• Phishing is a way of fraudulently acquiring sensitive
information using social engineering and technical
subterfuge.
• It tries to trick users with official-looking messages
− Credit card
− Bank account
− eBay
− PayPal
• Some phishing e-mails also
contain malicious or unwanted
software that can track your
activities or slow your computer
1. Unsolicited requests for sensitive information
2. Content appears genuine
3. Disguised hyperlinks and sender address
4. Email consists of a clickable
image
5. Generic Greetings
6. Use various ruses to entice
recipients to click
What to do if you Receive a
Suspected Phishing Scam
≠ DO NOT click on any links in the scam email.
≠ DO NOT supply any personal information of
any kind as a result of the email
≠ DO NOT reply to the email or attempt to
contact the senders in any way.
≠ DO NOT supply any information on the bogus
website that may appear in your browser if
you have clicked a link in the email.
≠ DO NOT open any
attachments that arrive with the
email.
≠ REPORT the phishing scam.
≠ DELETE the email from your
computer as soon as possible.
 Recognise the scam
 Report the scam
 Stop the scam
 Planning
 Setup
 Attack
 Collection
 Identity Theft and Fraud
 Unawareness among public
 Unawareness of policy
 Technical sophistication
Techniques of
Phishing Scams
1) Man-in-the-middle
Attacks
2) URL Obfuscation Attacks
3) XSS (Cross-site Scripting)
WHY YOUR PERSONAL
ACCOUNT
IS
A TARGET
Phishing – A Cyber
Crime Provisions of
Information
Technology Act, 2000
• Section 66
• Section 66A
• Section 66 C
• Section 66 D
1. Keep antivirus up to date
2. Do not click on hyperlinks in emails
3. Advantage of anti-spam software
4. Get educated
5. Use anti-spam software
6. Firewall
7. Use back-up system
8. Not to enter sensitive information into
pop-up windows
9. Secure the hosts file
10. Protect against DNS pharming
attacks
AMRITA HEMRAJANI (17)
PEARLENE JASAVALA (24)
KHYATI NANDU (38)
SANAYA PATEL (40)
KRISHMA SANDESRA (42)
VATSAL SHAH (50)
Phishing scams in banking ppt

Mais conteúdo relacionado

Mais procurados

Insurance anti money laundering
Insurance   anti money launderingInsurance   anti money laundering
Insurance anti money laundering
Mohit Singla
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 

Mais procurados (20)

Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Online Financial Fraud
Online Financial FraudOnline Financial Fraud
Online Financial Fraud
 
Insurance anti money laundering
Insurance   anti money launderingInsurance   anti money laundering
Insurance anti money laundering
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Phishing
PhishingPhishing
Phishing
 
Types of Fraud.pptx
Types of Fraud.pptxTypes of Fraud.pptx
Types of Fraud.pptx
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 

Destaque

Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Proposition
abphillips30
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014
FIAB
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken Dessins
Hirmer
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
rafaelvarela
 

Destaque (20)

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing Attacks
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - Symantec
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Proposition
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
 
Sexo salvaje
Sexo salvajeSexo salvaje
Sexo salvaje
 
Grow MN Central Region 2012
Grow MN Central Region 2012Grow MN Central Region 2012
Grow MN Central Region 2012
 
Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
 
Treball diasdeclase 3rb
Treball diasdeclase 3rbTreball diasdeclase 3rb
Treball diasdeclase 3rb
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken Dessins
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
 
Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
 
Social hiring
Social hiringSocial hiring
Social hiring
 

Semelhante a Phishing scams in banking ppt

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
Alexine Marier
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 

Semelhante a Phishing scams in banking ppt (20)

IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Pp8
Pp8Pp8
Pp8
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Phishing
PhishingPhishing
Phishing
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

Mais de Krishma Sandesra (10)

silver bullion market
silver bullion marketsilver bullion market
silver bullion market
 
entry barriers for banks
entry barriers for banksentry barriers for banks
entry barriers for banks
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Jp morgan final ppt
Jp morgan final pptJp morgan final ppt
Jp morgan final ppt
 
Festivals of india old
Festivals of india oldFestivals of india old
Festivals of india old
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Tisco
Tisco Tisco
Tisco
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Em ppt
Em pptEm ppt
Em ppt
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 

Phishing scams in banking ppt

  • 1.
  • 2.
  • 3. • Pronounced “fishing” • The word has its Origin from two words “Password Harvesting” or fishing for Passwords • Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim. • Also known as "brand spoofing“. • Phishers are phishing artists.
  • 4.
  • 5. • Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. • It tries to trick users with official-looking messages − Credit card − Bank account − eBay − PayPal • Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 6. 1. Unsolicited requests for sensitive information 2. Content appears genuine 3. Disguised hyperlinks and sender address
  • 7. 4. Email consists of a clickable image 5. Generic Greetings 6. Use various ruses to entice recipients to click
  • 8.
  • 9.
  • 10. What to do if you Receive a Suspected Phishing Scam ≠ DO NOT click on any links in the scam email. ≠ DO NOT supply any personal information of any kind as a result of the email ≠ DO NOT reply to the email or attempt to contact the senders in any way. ≠ DO NOT supply any information on the bogus website that may appear in your browser if you have clicked a link in the email.
  • 11. ≠ DO NOT open any attachments that arrive with the email. ≠ REPORT the phishing scam. ≠ DELETE the email from your computer as soon as possible.
  • 12.
  • 13.  Recognise the scam  Report the scam  Stop the scam
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.  Planning  Setup  Attack  Collection  Identity Theft and Fraud
  • 19.
  • 20.  Unawareness among public  Unawareness of policy  Technical sophistication
  • 21.
  • 22. Techniques of Phishing Scams 1) Man-in-the-middle Attacks 2) URL Obfuscation Attacks 3) XSS (Cross-site Scripting)
  • 23.
  • 25. Phishing – A Cyber Crime Provisions of Information Technology Act, 2000 • Section 66 • Section 66A • Section 66 C • Section 66 D
  • 26. 1. Keep antivirus up to date 2. Do not click on hyperlinks in emails 3. Advantage of anti-spam software
  • 27. 4. Get educated 5. Use anti-spam software 6. Firewall 7. Use back-up system
  • 28. 8. Not to enter sensitive information into pop-up windows 9. Secure the hosts file 10. Protect against DNS pharming attacks
  • 29.
  • 30.
  • 31. AMRITA HEMRAJANI (17) PEARLENE JASAVALA (24) KHYATI NANDU (38) SANAYA PATEL (40) KRISHMA SANDESRA (42) VATSAL SHAH (50)