   Pronounced "fishing“   The word has its Origin from two words “Password    Harvesting ” or fishing for Passwords   P...
   Phishing is a way of fraudulently acquiring sensitive    information using social engineering and technical    subterf...
   The purpose of a phishing message is to acquire sensitive    information about a user. For doing so the message needs ...
1) Detect and block the phishing Web sites in time2) Enhance the security of the web sites3) Block the phishing e-mails by...
i)Classification of the hyperlinks in the   phishing e-mailsii) Link guard algorithmIii)Link guard implemented clientIv) F...
   DON’T CLICK THE LINK    ◦ Type the site name in your browser (such as      www.paypal.com)   Never send sensitive acc...
Dear Valued Member,According to our terms of services, you will have to confirm youre-mail by the following link, or your ...
SOFTWARE REQUIREMENTS:Operating System : Windows XP/2000Language          : Java (J2sdk1.6.0)Database          : Oracle 10...
• Hard disk       : 20 GB and above• RAM             : 256 MB and above• Processor speed : 1.6 GHz and above
Phishing attacks ppt
Phishing attacks ppt
Phishing attacks ppt
Phishing attacks ppt
Phishing attacks ppt
Phishing attacks ppt
Upcoming SlideShare
Loading in...5
×

Phishing attacks ppt

31,932

Published on

4 Comments
15 Likes
Statistics
Notes
No Downloads
Views
Total Views
31,932
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2,270
Comments
4
Likes
15
Embeds 0
No embeds

No notes for slide
  • This is a “Spear Fishing” email. A phishing attack specifically targeted to a limited audience, thus making it seem more legitimate. If you HOVER your mouse over the link (DO NOT CLICK!), you will see the real URL show up as a floating box (in Outlook) or in the lower left-hand corner (in a web browser). The link above goes to nbmd.com NOT uc.edu A good general rule for email: If the shown URL and real URL do not match, be suspicious.
  • This one is bad. Note that the URL is actually owned by srvc.com NOT usbank.com Note too that there is no padlock icon and the URL is not https. This means that this is not a secure connection. Never do financial business on an unsecure web site.
  • This one is good. Note the padlock and that the URL is usbank.com
  • Phishing attacks ppt

    1. 1.  Pronounced "fishing“ The word has its Origin from two words “Password Harvesting ” or fishing for Passwords Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim Also known as "brand spoofing“ Phishers are phishing artists
    2. 2.  Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. It tries to trick users with official-looking messages ◦ Credit card ◦ Bank account ◦ eBay ◦ Paypal Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
    3. 3.  The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. ◦ So it doesn’t contains any useful information and hence falls under the category of spam. A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization. Techniques applied to spam message cant be applied naively to phishing messages.
    4. 4. 1) Detect and block the phishing Web sites in time2) Enhance the security of the web sites3) Block the phishing e-mails by various spam filters4) Install online anti-phishing software in user’s computers
    5. 5. i)Classification of the hyperlinks in the phishing e-mailsii) Link guard algorithmIii)Link guard implemented clientIv) Feasibility study
    6. 6.  DON’T CLICK THE LINK ◦ Type the site name in your browser (such as www.paypal.com) Never send sensitive account information by e-mail ◦ Account numbers, SSN, passwords Never give any password out to anyone Verify any person who contacts you (phone or email). ◦ If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.
    7. 7. Dear Valued Member,According to our terms of services, you will have to confirm youre-mail by the following link, or your account will be suspendedfor security reasons.http://www.uc.edu/confirm.php?account=d.mich.mal@uc.eduAfter following the instructions in the sheet, your account willnot be interrupted and will continue as normal. http://www.nbmd.cn/Confirmation_Sheet.pifThanks for your attention to this request. We apologize for anyinconvenience.Sincerely, Uc Abuse Department
    8. 8. SOFTWARE REQUIREMENTS:Operating System : Windows XP/2000Language : Java (J2sdk1.6.0)Database : Oracle 10gTECHNOLOGIES USED :• JSP• Servlets• Apache Tomcat 5.5
    9. 9. • Hard disk : 20 GB and above• RAM : 256 MB and above• Processor speed : 1.6 GHz and above
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×