SlideShare a Scribd company logo
1 of 19
Download to read offline
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Anti-Phishing
Mayur Rajendra Saner
Guided by,
Mr. M. E. Patil Sir
SSBT’s College of Engineering & Technology,
Bambhori, Jalgaon - 425 001, Maharashtra, India
April 6, 2016
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 1/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Lecture Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 2/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 3/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Introduction
What is Phishing?
Phishing is the act of attempting to acquire information by
masquerading as a trustworthy entity in an electronic
communication
Phishing is an attempt by an individual or a group to thieve
personal confidential information
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 4/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Introduction
Anti phishing refers to the method employed in order to
detect and prevent phishing attacks.
IT is a technological service that helps prevent unauthorized
access to secure and/or sensitive information
It protect various types of data in diverse ways across a varety
of platforms.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 5/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 6/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
When comes Anti Phishing popular?
As recently as 2007, the adoption of anti-phishing strategies
by businesses needing to protect personal and financial
information was low.
Now there are several different techniques to protect against
phishing.
Anti-phishing measures have been implemented as features
embedded in browsers.
In 2005, Mozilla fielded a yellow address bar as a better
indication of the secure connection.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 7/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 8/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Techniques used for Anti-Phishing
Visual Cryptography
One of the best known techniques to protect data is
cryptography.
It is the art of sending and receiving encrypted messages that
can be decrypted only by the sender or the receiver.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 9/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Halftoning
The main idea of halftoning is to utilize the density of printed
dots to simulate the grey scale of pixels.
For humaneyes, the denser the dots are, the darker the image
is.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 10/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 11/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Tools
There are so many AntiViruses which protects from
Anti-Phishing.
Google Safe Browsing API,
PhishDetector an extension for Google Chrome,
Windows Mail, an e-mail client that comes with Windows
Vista,
Avira Premium Security Suite.
etc are used for preventing ourself from Phishing.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 12/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 13/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
How to be safe ?
Establish corporate policies and communicate them to
consumers.
Provide a way for the consumer to validate that the E-mail is
legitimate.
Stronger authentication at web sites.
Monitor the Internet for potential phishing web sites.
and anti-spam solutions at the Internet gateway.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 14/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 15/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
How to be safe ?
Automatically block malicious/fraudulent E-mail.
Automatically detect and delete malicious software.
Automatically block outgoing delivery of sensitive information
to malicious parties.
Be suspicious.
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 16/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Outline
Introduction
History
Techniques
Protection by Tools
Some Solutions for Corporation
Some Solutions for Consumers
Bibliography
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 17/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Bibliography
Source:Internet
Referanced websites
www.ijirae.com
www.ijarcsse.com
https://en.wikipedia.org/wiki/Anti-phishing
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 18/19
Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B
Thank You...
April 5, 2016 Mayur Rajendra Saner Anti-Phishing 19/19

More Related Content

Viewers also liked

Satellite Radio
Satellite RadioSatellite Radio
Satellite Radio
Liz Kelley
 
Presentation on satellite radio
Presentation on satellite radioPresentation on satellite radio
Presentation on satellite radio
Pinky Rao
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology ppt
Arun Sivaraj
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Viewers also liked (16)

Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Satellite Radio
Satellite RadioSatellite Radio
Satellite Radio
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
iCloud - Apple Technology
iCloud - Apple TechnologyiCloud - Apple Technology
iCloud - Apple Technology
 
Sattelite Radio
Sattelite RadioSattelite Radio
Sattelite Radio
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
Presentation on satellite radio
Presentation on satellite radioPresentation on satellite radio
Presentation on satellite radio
 
seminar report on Li-Fi Technology
seminar report on Li-Fi Technologyseminar report on Li-Fi Technology
seminar report on Li-Fi Technology
 
Satellite Radio
Satellite RadioSatellite Radio
Satellite Radio
 
Apple iOS
Apple iOSApple iOS
Apple iOS
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology ppt
 
Haptic technology
 Haptic technology Haptic technology
Haptic technology
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Similar to Anti-Phishing

Similar to Anti-Phishing (20)

5 Essential Security Tips for Startups
5 Essential Security Tips for Startups5 Essential Security Tips for Startups
5 Essential Security Tips for Startups
 
Managing a Hack: A Communicator's Guide to a Data Breach
Managing a Hack: A Communicator's Guide to a Data BreachManaging a Hack: A Communicator's Guide to a Data Breach
Managing a Hack: A Communicator's Guide to a Data Breach
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOW
 
Crisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
Crisis Communications in the Age of Now: 2016 PRSA Tri-State ConferenceCrisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
Crisis Communications in the Age of Now: 2016 PRSA Tri-State Conference
 
Counterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengalCounterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengal
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Cyber security meetup from Nepal
Cyber security meetup from NepalCyber security meetup from Nepal
Cyber security meetup from Nepal
 
Building a Marketing Tech Stack to Accelerate Engagement
Building a Marketing Tech Stack to Accelerate EngagementBuilding a Marketing Tech Stack to Accelerate Engagement
Building a Marketing Tech Stack to Accelerate Engagement
 
How to succeed with your Content Marketing?
How to succeed with your Content Marketing?How to succeed with your Content Marketing?
How to succeed with your Content Marketing?
 
Fitman webinar 2015 06 sme engagement methodology
Fitman webinar 2015 06 sme engagement methodologyFitman webinar 2015 06 sme engagement methodology
Fitman webinar 2015 06 sme engagement methodology
 
Collaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the CounterfeitersCollaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the Counterfeiters
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Social listening & Marketo
Social listening & Marketo Social listening & Marketo
Social listening & Marketo
 
Neil Morgan EVP Global Marketing Sage
Neil Morgan EVP Global Marketing Sage Neil Morgan EVP Global Marketing Sage
Neil Morgan EVP Global Marketing Sage
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
MSOR 2016 Seminar 3rd presentation
MSOR 2016 Seminar 3rd presentationMSOR 2016 Seminar 3rd presentation
MSOR 2016 Seminar 3rd presentation
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
 
Develop your competitive intelligence skills
Develop your competitive intelligence skillsDevelop your competitive intelligence skills
Develop your competitive intelligence skills
 
A Good Software Product What and How - Part1
A Good Software Product What and How - Part1A Good Software Product What and How - Part1
A Good Software Product What and How - Part1
 
Media Analyst Perspective on Strategic Communications Consulting - Meizar Ass...
Media Analyst Perspective on Strategic Communications Consulting - Meizar Ass...Media Analyst Perspective on Strategic Communications Consulting - Meizar Ass...
Media Analyst Perspective on Strategic Communications Consulting - Meizar Ass...
 

Recently uploaded

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 

Anti-Phishing

  • 1. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Anti-Phishing Mayur Rajendra Saner Guided by, Mr. M. E. Patil Sir SSBT’s College of Engineering & Technology, Bambhori, Jalgaon - 425 001, Maharashtra, India April 6, 2016 April 5, 2016 Mayur Rajendra Saner Anti-Phishing 1/19
  • 2. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Lecture Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 2/19
  • 3. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 3/19
  • 4. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Introduction What is Phishing? Phishing is the act of attempting to acquire information by masquerading as a trustworthy entity in an electronic communication Phishing is an attempt by an individual or a group to thieve personal confidential information April 5, 2016 Mayur Rajendra Saner Anti-Phishing 4/19
  • 5. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Introduction Anti phishing refers to the method employed in order to detect and prevent phishing attacks. IT is a technological service that helps prevent unauthorized access to secure and/or sensitive information It protect various types of data in diverse ways across a varety of platforms. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 5/19
  • 6. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 6/19
  • 7. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B When comes Anti Phishing popular? As recently as 2007, the adoption of anti-phishing strategies by businesses needing to protect personal and financial information was low. Now there are several different techniques to protect against phishing. Anti-phishing measures have been implemented as features embedded in browsers. In 2005, Mozilla fielded a yellow address bar as a better indication of the secure connection. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 7/19
  • 8. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 8/19
  • 9. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Techniques used for Anti-Phishing Visual Cryptography One of the best known techniques to protect data is cryptography. It is the art of sending and receiving encrypted messages that can be decrypted only by the sender or the receiver. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 9/19
  • 10. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Halftoning The main idea of halftoning is to utilize the density of printed dots to simulate the grey scale of pixels. For humaneyes, the denser the dots are, the darker the image is. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 10/19
  • 11. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 11/19
  • 12. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Tools There are so many AntiViruses which protects from Anti-Phishing. Google Safe Browsing API, PhishDetector an extension for Google Chrome, Windows Mail, an e-mail client that comes with Windows Vista, Avira Premium Security Suite. etc are used for preventing ourself from Phishing. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 12/19
  • 13. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 13/19
  • 14. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B How to be safe ? Establish corporate policies and communicate them to consumers. Provide a way for the consumer to validate that the E-mail is legitimate. Stronger authentication at web sites. Monitor the Internet for potential phishing web sites. and anti-spam solutions at the Internet gateway. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 14/19
  • 15. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 15/19
  • 16. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B How to be safe ? Automatically block malicious/fraudulent E-mail. Automatically detect and delete malicious software. Automatically block outgoing delivery of sensitive information to malicious parties. Be suspicious. April 5, 2016 Mayur Rajendra Saner Anti-Phishing 16/19
  • 17. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers Bibliography April 5, 2016 Mayur Rajendra Saner Anti-Phishing 17/19
  • 18. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Bibliography Source:Internet Referanced websites www.ijirae.com www.ijarcsse.com https://en.wikipedia.org/wiki/Anti-phishing April 5, 2016 Mayur Rajendra Saner Anti-Phishing 18/19
  • 19. Outline Introduction History Techniques Protection by Tools Some Solutions for Corporation Some Solutions for Consumers B Thank You... April 5, 2016 Mayur Rajendra Saner Anti-Phishing 19/19