SlideShare uma empresa Scribd logo
1 de 12
PHISHING
What is ‘Phishing’ ?


Phishing is the act of attempting to acquire
valuable information such as usernames,
passwords, credit cards details, account data,
etc by pretending as a trustworthy entity in an
electronic communication.
History of Phishing
Phreaking    + Fishing = Phishing
        Phreaking = Making phone calls for free back in
70’s.
     Fishing = Use bait to lure the target.
Phishing in 1995

 Target : AOL users (America Online Users)
 Purpose : Getting account passwords.
 Threat level : Low.
 Techniques : Similar name, social engineering.
History Of Phishing (cont.)
 Phishing in 2001
 Target : Ebayers and major banks.
 Purpose : Getting credit card numbers, accounts.
 Threat level : Medium.
 Techniques : Same in 1995.
 Phishing in 2007
 Target : Paypal, banks, ebay.
 Purpose : Bank accounts.
 Threat level : High.
 Techniques : Browser vulnerabilities.
Why they Phish?
Phishing    is like playing the odds
  - simple to do and high gain for little work.
  - no real knowledge necessary
  - 4.5 people out of 10 fall for it.
Most is for financial gain

   - Money
   - Account information.
   - Identity theft.
 Some do it to spread malicious programs that in turn
carry out others attacks.
Techniques of Phishing
Spear  Phishing.
Clone Phishing.
Whaling.
Link Manipulation.
Filter Evasion.
Website Forgery.
Phone Phishing.
Targets and Victims…
Phishers are mainly targeting the customers of
banks and online payment services.
The others sectors are :-
Health care.
Lotteries/ Contests.
Money transfer.
Worlds events.
Employment opportunities.
Damaged caused by Phishing…
20,00,000  emails are sent.
5% get to the end user – 1,00,000.
5% click on the phishing link – 5,000.
2% enter data into the phishing site – 100.
$1,200 from each person who enters data.
Potential reward - $1,20,000.

     In 2005, The David Levi phishing gang from
UK was caught. It operated for 12 months with 6
members and made over $3,60,000 from 160
people using an Ebay Phishing Scam.
How to detect Phishing?

Bad Grammar.
Generic Salutations.
Account Information request / threats from
companies we don’t use.
Hovering over links/ long URL service.
Unknown senders.
Anti – Phishing Steps

3P’s – Proclaim, Protect, Pursue.
 Proclaim in all correspondence the use of an
official mark.
Protect all messages, web pages with the mark.
Pursue all imposters
Possible Solution
Keep   the browser updated.
Keep the anti-virus updated.
Use a firewall and keep it turned on.
Use digitally signed documents only.
Never respond to an email asking for personal
information.
Never click on a link on the email. Retype the
address in a new window.
Presented By:-


 SAYANTAN SUR
   BCA(H) – 2



  THANK YOU

Mais conteúdo relacionado

Mais procurados

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Email Security 101 – A Practical Guide For Every Business
 Email Security 101 – A Practical Guide For Every Business Email Security 101 – A Practical Guide For Every Business
Email Security 101 – A Practical Guide For Every Business
PECB
 

Mais procurados (20)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Phishing
PhishingPhishing
Phishing
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Phishing
PhishingPhishing
Phishing
 
Email Security 101 – A Practical Guide For Every Business
 Email Security 101 – A Practical Guide For Every Business Email Security 101 – A Practical Guide For Every Business
Email Security 101 – A Practical Guide For Every Business
 
Phishing
PhishingPhishing
Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing
PhishingPhishing
Phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 

Destaque (6)

Thriving in the social media jungle for internet marketing association 2013
Thriving in the social media jungle for internet marketing association 2013Thriving in the social media jungle for internet marketing association 2013
Thriving in the social media jungle for internet marketing association 2013
 
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Next gen summit social media networking
Next gen summit social media networkingNext gen summit social media networking
Next gen summit social media networking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 

Semelhante a Phising

Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
MH BS
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 

Semelhante a Phising (20)

Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 

Mais de Sayantan Sur (10)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Phising

  • 2. What is ‘Phishing’ ? Phishing is the act of attempting to acquire valuable information such as usernames, passwords, credit cards details, account data, etc by pretending as a trustworthy entity in an electronic communication.
  • 3. History of Phishing Phreaking + Fishing = Phishing Phreaking = Making phone calls for free back in 70’s. Fishing = Use bait to lure the target. Phishing in 1995 Target : AOL users (America Online Users) Purpose : Getting account passwords. Threat level : Low. Techniques : Similar name, social engineering.
  • 4. History Of Phishing (cont.)  Phishing in 2001  Target : Ebayers and major banks.  Purpose : Getting credit card numbers, accounts.  Threat level : Medium.  Techniques : Same in 1995.  Phishing in 2007  Target : Paypal, banks, ebay.  Purpose : Bank accounts.  Threat level : High.  Techniques : Browser vulnerabilities.
  • 5. Why they Phish? Phishing is like playing the odds - simple to do and high gain for little work. - no real knowledge necessary - 4.5 people out of 10 fall for it. Most is for financial gain - Money - Account information. - Identity theft.  Some do it to spread malicious programs that in turn carry out others attacks.
  • 6. Techniques of Phishing Spear Phishing. Clone Phishing. Whaling. Link Manipulation. Filter Evasion. Website Forgery. Phone Phishing.
  • 7. Targets and Victims… Phishers are mainly targeting the customers of banks and online payment services. The others sectors are :- Health care. Lotteries/ Contests. Money transfer. Worlds events. Employment opportunities.
  • 8. Damaged caused by Phishing… 20,00,000 emails are sent. 5% get to the end user – 1,00,000. 5% click on the phishing link – 5,000. 2% enter data into the phishing site – 100. $1,200 from each person who enters data. Potential reward - $1,20,000. In 2005, The David Levi phishing gang from UK was caught. It operated for 12 months with 6 members and made over $3,60,000 from 160 people using an Ebay Phishing Scam.
  • 9. How to detect Phishing? Bad Grammar. Generic Salutations. Account Information request / threats from companies we don’t use. Hovering over links/ long URL service. Unknown senders.
  • 10. Anti – Phishing Steps 3P’s – Proclaim, Protect, Pursue.  Proclaim in all correspondence the use of an official mark. Protect all messages, web pages with the mark. Pursue all imposters
  • 11. Possible Solution Keep the browser updated. Keep the anti-virus updated. Use a firewall and keep it turned on. Use digitally signed documents only. Never respond to an email asking for personal information. Never click on a link on the email. Retype the address in a new window.
  • 12. Presented By:- SAYANTAN SUR BCA(H) – 2 THANK YOU