• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Phishing -  A modern web attack
 

Phishing - A modern web attack

on

  • 636 views

Ready made presentation on PHISHING and its effects and the different methods to eradicate it.

Ready made presentation on PHISHING and its effects and the different methods to eradicate it.

Statistics

Views

Total Views
636
Views on SlideShare
636
Embed Views
0

Actions

Likes
0
Downloads
41
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Phishing -  A modern web attack Phishing - A modern web attack Presentation Transcript

    • A.SATYA KARTHIK K.DHEERAJ VARMA VNR-VJIET
    • 1. INTRODUCTION 2. HISTORY 3. PHISHING TECHNIQUES 4. DAMAGE CAUSED BY PHISHING 5. ANTI PHISHING 6. CASESTUDIES 7. REFERENCES
    •  Phishing—common method of online identity theft and virus spreading  Carried by email spoofing or instant messaging  Social websites  Online payment processors
    •  Described in a paper presentation delivered to International HP Users Group  Used in Hacking tool AOHELL  Believed that it is created by mid 1990’s spammer Khan C Smith  Chinese phishing campaign targeting US officials
    •  Spear Phishing  Clone Phishing  Link Manipulation  Filter evasion  Phone Phishing  Other Techniques
    •  The damage caused by phishing ranges from denial of access to e-mail to substantial financial loss.  Approximately 1.2 million computer users in the United States suffered losses caused by phishing.  United Kingdom losses from phishing fraud
    •  The process of preventing phishing is called anti phishing  There are several techniques of anti phishing Social Response Legal Response Technical Response
    •  In this technique emphasis is on training people to recognize the phishing attempts.  In June 2004 a military academy in new jersey was tested for awareness about phishing.  Anti-Phishing-Working-Group
    •  This technique emphasizes on:  Secure connection  Which site  Who is the authority
    •  USA Anti Phishing Act -2005  UK Fraud Act -2006  Partnership between Microsoft and Australian Government  Companies efforts to crack down phishing
    •  Phishers are targeting the customers of banks and online payment services.  AOL Scam  In late 2006 a computer worm took over pages on MySpace and altered links  The Rapid Sharefile sharing site has been targeted by phishing to obtain a premium account.
    •  Ollmann, Gunter.  The Phishing Guide: Understanding and Preventing Phishing Attacks  http://en.wikipedia.org/wiki/Phishing#History_and_c urrent_status_of_phishing
    • THANK YOU…