SlideShare a Scribd company logo
1 of 13


Pronounced "fishing“
The word has its Origin from two words “Password
Harvesting” or fishing for Passwords


Phishing is an online form of pretexting, a kind of
deception in which an attacker pretends to be someone else
in order to obtain sensitive information from the victim
Also known as "brand spoofing “


Phishing is a way of fraudulently acquiring sensitive
information using social engineering.
It tries to trick users with official-looking messages

◦ Credit card
◦ Bank account
◦ eBay
◦ Paypal
Some phishing e-mails also
contain malicious or unwanted
software that can track your
activities or slow your computer
1. Misleading e-mails
2. No check of source address
3. Vulnerability in browsers
4. No strong authentication at websites of
banks and financial institutions
5. Limited use of digital signatures
6. Non-availability of secure desktop tools
7. Lack of user awareness
8. Vulnerability in applications
1. Internet fraud
2. Identity theft
3. Financial loss to the original
Institutions
4. Difficulties in Law Enforcement
Investigations
5. Erosion of Public Trust in the
Internet.
 DON’T CLICK THE LINK
◦ Type the site name in your browser (such as
www.paypal.com)
 Never send sensitive account information by
e-mail
◦ Account numbers, SSN, passwords
 Never give any password out to anyone
 Verify any person who contacts you (phone
or email).
◦ If someone calls you on a sensitive topic, thank
them, hang up and call them back using a
number that you know is correct, like from your
credit card or statement.
Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
for security reasons.
http://www.uc.edu/confirm.php?account=d.mich.mal@uc.edu
After following the instructions in the sheet, your account will
not be interrupted and will continue as normal.
Thanks for your attention to this request. We apologize for any
inconvenience.
Sincerely, Uc Abuse Department
http://www.nbmd.cn/Confirmation_Sheet.pif
Defend against phishing
attack
1. Preventing a phishing attack before it begins
2. Detecting a phishing attack
3. Preventing the delivery of phishing messages
4. Preventing deception in phishing messages and
sites
5. Counter measures
6. Interfering with the use of compromised
information
Conclusion
1. No single technology will completely stop phishing.
2. However, a combination of good organization and practice,
proper application of current technologies, and improvements
in security technology has the potential to drastically reduce the
prevalence of phishing and the losses suffered from it.
-SHUBH THAKKAR
Thank you

More Related Content

What's hot

Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

What's hot (20)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Social engineering
Social engineering Social engineering
Social engineering
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing
PhishingPhishing
Phishing
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 

Similar to PHISHING attack

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
tawnygsu
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
vinayakjadhav94
 

Similar to PHISHING attack (20)

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Id Theft
Id TheftId Theft
Id Theft
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
ID Theft
ID TheftID Theft
ID Theft
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

PHISHING attack

  • 1.
  • 2.   Pronounced "fishing“ The word has its Origin from two words “Password Harvesting” or fishing for Passwords   Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim Also known as "brand spoofing “
  • 3.   Phishing is a way of fraudulently acquiring sensitive information using social engineering. It tries to trick users with official-looking messages  ◦ Credit card ◦ Bank account ◦ eBay ◦ Paypal Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 4.
  • 5. 1. Misleading e-mails 2. No check of source address 3. Vulnerability in browsers 4. No strong authentication at websites of banks and financial institutions 5. Limited use of digital signatures 6. Non-availability of secure desktop tools 7. Lack of user awareness 8. Vulnerability in applications
  • 6. 1. Internet fraud 2. Identity theft 3. Financial loss to the original Institutions 4. Difficulties in Law Enforcement Investigations 5. Erosion of Public Trust in the Internet.
  • 7.  DON’T CLICK THE LINK ◦ Type the site name in your browser (such as www.paypal.com)  Never send sensitive account information by e-mail ◦ Account numbers, SSN, passwords  Never give any password out to anyone  Verify any person who contacts you (phone or email). ◦ If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.
  • 8.
  • 9.
  • 10. Dear Valued Member, According to our terms of services, you will have to confirm your e-mail by the following link, or your account will be suspended for security reasons. http://www.uc.edu/confirm.php?account=d.mich.mal@uc.edu After following the instructions in the sheet, your account will not be interrupted and will continue as normal. Thanks for your attention to this request. We apologize for any inconvenience. Sincerely, Uc Abuse Department http://www.nbmd.cn/Confirmation_Sheet.pif
  • 11. Defend against phishing attack 1. Preventing a phishing attack before it begins 2. Detecting a phishing attack 3. Preventing the delivery of phishing messages 4. Preventing deception in phishing messages and sites 5. Counter measures 6. Interfering with the use of compromised information
  • 12. Conclusion 1. No single technology will completely stop phishing. 2. However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.