SlideShare uma empresa Scribd logo
1 de 9
PHISHING
WHAT IS PHISHING ??? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXAMPLE OF USE
DAMAGE CAUSED BY PHISHING ,[object Object],[object Object],[object Object]
IMPORTANT OF  PHISHING
Anti-phishing  measures have been implemented as features embedded in browsers, as extensions or toolbars for browsers, and as part of website login procedures. The following are some of the main approaches to the problem. Helping users identify legitimate sites   Since PHISHING is based on impersonation, preventing it depends on users having some reliable way to identify the sites they are dealing with.  Alerting users to fraudulent websites  Another popular approach to fighting PHISHING is to maintain a list of known phishing sites and to check websites against the list.  Microsoft's new IE7 browser ,  Mozilla   Firefox  2.0, and  Opera  all contain this type of anti-PHISING measure. Firefox 2 uses  Google  anti-phishing software. Opera 9.1 uses live blacklists from  PhishTank  and  GeoTrust , as well as live whitelists from  GeoTrust . Some implementations of this approach send the visited URLs to a central service to be checked, which has raised concerns about compromising the user's privacy. According to a report by Mozilla in late 2006, Firefox 2 was found to be more effective than Internet Explorer 7 at detecting fraudulent sites in a study by an independent software testing company.  Eliminating phishing mail   Spam filters  can also help by reducing the number of phishing emails that users receive.
STEP TO AVOID  PHISHING
Users can take steps to avoid PHISHING attempts by slightly modifying their browsing habits. Users who are contacted about an account needing to be "verified" (or any other topic used by PHISHERS) can contact the company that is the subject of the email to check that the email is legitimate, or can type in a trusted web address for the company's website into the address bar of their browser to bypass the link in the suspected PHISHING message. Nearly all legitimate email messages from companies to their customers will contain an item of information that is not readily available to PHISHERS. Some companies, like PAYPAL, always address their customers by their username in emails, so if an email addresses a user in a generic fashion (" Dear PAYPAL customer ") it is likely to be an attempt at PHISHING. Emails from banks and credit card companies will often include partial account numbers. However, recent research  has shown that typical users do not distinguish between the first few digits and  This is a significant problem since the first few digits often are the same for all clients of one financial institution. One should always be suspicious if the message does not contain specific personal information. PHISHING attempts in early 2006, however, used such highly personalized information, making it unsafe to rely on personal information alone as a sign that a message is legitimate. Furthermore, another recent study concluded in part that the presence of this information does not significantly affect the success rate of PHISHING attacks, suggesting that most users do not pay attention to such details anyway.  the last few digits of an account number
SOURCE OF REFERENCE ,[object Object]

Mais conteúdo relacionado

Mais procurados

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
temi
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

Mais procurados (20)

Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 

Destaque

La seu de manresa
La seu de manresaLa seu de manresa
La seu de manresa
nreguant
 
Biovale Biodiesel Business As An Agent Of Social Inclusion
Biovale   Biodiesel Business As An Agent Of Social InclusionBiovale   Biodiesel Business As An Agent Of Social Inclusion
Biovale Biodiesel Business As An Agent Of Social Inclusion
TEIAS TEIA DE EXECUTIVOS
 
Oostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutieOostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutie
Nuntra BVBA
 
Món Sant Benet. Melanie Fernández
Món Sant Benet. Melanie FernándezMón Sant Benet. Melanie Fernández
Món Sant Benet. Melanie Fernández
nreguant
 
Visita Als Geganters De Manresa
Visita Als Geganters De ManresaVisita Als Geganters De Manresa
Visita Als Geganters De Manresa
nreguant
 
Pastis de galetes de xocolata
Pastis de galetes de xocolataPastis de galetes de xocolata
Pastis de galetes de xocolata
nreguant
 
Credit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albertCredit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albert
nreguant
 
Trabajos De Animales
Trabajos De AnimalesTrabajos De Animales
Trabajos De Animales
rascallu
 

Destaque (20)

Navatas2007
Navatas2007Navatas2007
Navatas2007
 
KB More than a library
KB More than a libraryKB More than a library
KB More than a library
 
La seu de manresa
La seu de manresaLa seu de manresa
La seu de manresa
 
Real Miami Beach Keeping Current 2007 06
Real Miami Beach Keeping Current 2007 06Real Miami Beach Keeping Current 2007 06
Real Miami Beach Keeping Current 2007 06
 
Consejo infancia juventud_ainsa
Consejo infancia juventud_ainsaConsejo infancia juventud_ainsa
Consejo infancia juventud_ainsa
 
Biovale Biodiesel Business As An Agent Of Social Inclusion
Biovale   Biodiesel Business As An Agent Of Social InclusionBiovale   Biodiesel Business As An Agent Of Social Inclusion
Biovale Biodiesel Business As An Agent Of Social Inclusion
 
Els Gegants De Manresa
Els Gegants De ManresaEls Gegants De Manresa
Els Gegants De Manresa
 
Mba New Leaders New Perspectives
Mba  New Leaders New PerspectivesMba  New Leaders New Perspectives
Mba New Leaders New Perspectives
 
Fem un pastis de poma
Fem un pastis de pomaFem un pastis de poma
Fem un pastis de poma
 
Oostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutieOostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutie
 
Para O Ano
Para O AnoPara O Ano
Para O Ano
 
Món Sant Benet. Melanie Fernández
Món Sant Benet. Melanie FernándezMón Sant Benet. Melanie Fernández
Món Sant Benet. Melanie Fernández
 
Chasing Progress
Chasing ProgressChasing Progress
Chasing Progress
 
Visita Als Geganters De Manresa
Visita Als Geganters De ManresaVisita Als Geganters De Manresa
Visita Als Geganters De Manresa
 
Pastis de galetes de xocolata
Pastis de galetes de xocolataPastis de galetes de xocolata
Pastis de galetes de xocolata
 
Credit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albertCredit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albert
 
Trabajos De Animales
Trabajos De AnimalesTrabajos De Animales
Trabajos De Animales
 
Inernational Aspen
Inernational AspenInernational Aspen
Inernational Aspen
 
Living Carbon Neutral Eco Justice
Living Carbon Neutral   Eco JusticeLiving Carbon Neutral   Eco Justice
Living Carbon Neutral Eco Justice
 
Net Impact Chapter Updated
Net Impact Chapter  UpdatedNet Impact Chapter  Updated
Net Impact Chapter Updated
 

Semelhante a P H I S H I N G

Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 

Semelhante a P H I S H I N G (20)

Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Phis
PhisPhis
Phis
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Phishing
PhishingPhishing
Phishing
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
internet security
internet securityinternet security
internet security
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 

Último

FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
Cocity Enterprises
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
Cocity Enterprises
 
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnLaw of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
TintoTom3
 
abortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammam
abortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammamabortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammam
abortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammam
samsungultra782445
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
hyt3577
 
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammamAbortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
samsungultra782445
 

Último (20)

Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
In Sharjah ௵(+971)558539980 *_௵abortion pills now available.
 
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdfFOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
FOREX FUNDAMENTALS: A BEGINNER'S GUIDE.pdf
 
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdfMASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
MASTERING FOREX: STRATEGIES FOR SUCCESS.pdf
 
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnLaw of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Law of Demand.pptxnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
abortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammam
abortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammamabortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammam
abortion pills in Riyadh Saudi Arabia (+919707899604)cytotec pills in dammam
 
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
QATAR Pills for Abortion -+971*55*85*39*980-in Dubai. Abu Dhabi.
 
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammamAbortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
Abortion pills in Saudi Arabia (+919707899604)cytotec pills in dammam
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdf
 
fundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docxfundamentals of corporate finance 11th canadian edition test bank.docx
fundamentals of corporate finance 11th canadian edition test bank.docx
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
劳伦森大学毕业证
劳伦森大学毕业证劳伦森大学毕业证
劳伦森大学毕业证
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...
uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...
uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 

P H I S H I N G

  • 2.
  • 4.
  • 5. IMPORTANT OF PHISHING
  • 6. Anti-phishing measures have been implemented as features embedded in browsers, as extensions or toolbars for browsers, and as part of website login procedures. The following are some of the main approaches to the problem. Helping users identify legitimate sites Since PHISHING is based on impersonation, preventing it depends on users having some reliable way to identify the sites they are dealing with. Alerting users to fraudulent websites Another popular approach to fighting PHISHING is to maintain a list of known phishing sites and to check websites against the list. Microsoft's new IE7 browser , Mozilla Firefox 2.0, and Opera all contain this type of anti-PHISING measure. Firefox 2 uses Google anti-phishing software. Opera 9.1 uses live blacklists from PhishTank and GeoTrust , as well as live whitelists from GeoTrust . Some implementations of this approach send the visited URLs to a central service to be checked, which has raised concerns about compromising the user's privacy. According to a report by Mozilla in late 2006, Firefox 2 was found to be more effective than Internet Explorer 7 at detecting fraudulent sites in a study by an independent software testing company. Eliminating phishing mail Spam filters can also help by reducing the number of phishing emails that users receive.
  • 7. STEP TO AVOID PHISHING
  • 8. Users can take steps to avoid PHISHING attempts by slightly modifying their browsing habits. Users who are contacted about an account needing to be "verified" (or any other topic used by PHISHERS) can contact the company that is the subject of the email to check that the email is legitimate, or can type in a trusted web address for the company's website into the address bar of their browser to bypass the link in the suspected PHISHING message. Nearly all legitimate email messages from companies to their customers will contain an item of information that is not readily available to PHISHERS. Some companies, like PAYPAL, always address their customers by their username in emails, so if an email addresses a user in a generic fashion (" Dear PAYPAL customer ") it is likely to be an attempt at PHISHING. Emails from banks and credit card companies will often include partial account numbers. However, recent research has shown that typical users do not distinguish between the first few digits and This is a significant problem since the first few digits often are the same for all clients of one financial institution. One should always be suspicious if the message does not contain specific personal information. PHISHING attempts in early 2006, however, used such highly personalized information, making it unsafe to rely on personal information alone as a sign that a message is legitimate. Furthermore, another recent study concluded in part that the presence of this information does not significantly affect the success rate of PHISHING attacks, suggesting that most users do not pay attention to such details anyway. the last few digits of an account number
  • 9.