Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Anti-Phishing
1. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Anti-Phishing
Mayur Rajendra Saner
Guided by,
Mr. M. E. Patil Sir
SSBT’s College of Engineering & Technology,
Bambhori, Jalgaon - 425 001, Maharashtra, India
April 6, 2016
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 1/19
2. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Lecture Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 2/19
3. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 3/19
4. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Introduction
What is Phishing?
Phishing is the act of attempting to acquire information by
masquerading as a trustworthy entity in an electronic
communication
Phishing is an attempt by an individual or a group to thieve
personal confidential information
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 4/19
5. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Introduction
Anti phishing refers to the method employed in order to
detect and prevent phishing attacks.
IT is a technological service that helps prevent unauthorized
access to secure and/or sensitive information
It protect various types of data in diverse ways across a varety
of platforms.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 5/19
6. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 6/19
7. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
When comes Anti Phishing popular?
As recently as 2007, the adoption of anti-phishing strategies
by businesses needing to protect personal and financial
information was low.
Now there are several different techniques to protect against
phishing.
Anti-phishing measures have been implemented as features
embedded in browsers.
In 2005, Mozilla fielded a yellow address bar as a better
indication of the secure connection.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 7/19
8. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 8/19
9. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Techniques used for Anti-Phishing
Visual Cryptography
One of the best known techniques to protect data is
cryptography.
It is the art of sending and receiving encrypted messages that
can be decrypted only by the sender or the receiver.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 9/19
10. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Halftoning
The main idea of halftoning is to utilize the density of printed
dots to simulate the grey scale of pixels.
For humaneyes, the denser the dots are, the darker the image
is.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 10/19
11. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 11/19
12. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Tools
There are so many AntiViruses which protects from
Anti-Phishing.
Google Safe Browsing API,
PhishDetector an extension for Google Chrome,
Windows Mail, an e-mail client that comes with Windows
Vista,
Avira Premium Security Suite.
etc are used for preventing ourself from Phishing.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 12/19
13. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 13/19
14. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
How to be safe ?
Establish corporate policies and communicate them to
consumers.
Provide a way for the consumer to validate that the E-mail is
legitimate.
Stronger authentication at web sites.
Monitor the Internet for potential phishing web sites.
and anti-spam solutions at the Internet gateway.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 14/19
15. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 15/19
16. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
How to be safe ?
Automatically block malicious/fraudulent E-mail.
Automatically detect and delete malicious software.
Automatically block outgoing delivery of sensitive information
to malicious parties.
Be suspicious.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 16/19
17. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 17/19
18. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Bibliography
Source:Internet
Referanced websites
www.ijirae.com
www.ijarcsse.com
https://en.wikipedia.org/wiki/Anti-phishing
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 18/19
19. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Thank You...
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 19/19