Your SlideShare is downloading. ×
Phishing Attacks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Phishing Attacks

1,701
views

Published on

a presentation on how phishing can be done.

a presentation on how phishing can be done.


0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,701
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
191
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ATTACK & COUNTER MEASURES
  • 2. INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords and/or credit card information. In a typical phishing attack a user will receive an e-mail message impersonated to be sent by a financial institution. 1%-20% users respond to such attacks.
  • 3. PHISHING ATTACKS Phishing attacks are combined with malicious code attacks such as Mimail, Bank Withdrawal Trojan, Mydoom.m worm etc In such blended attacks these virus/worms carry the payloads which harness email addresses from the internet and affected systems and further launch phishing attacks.
  • 4. PHISHING EXAMPLESExample 1.
  • 5. Example 2.
  • 6. PHISHING TRENDS APWG is an industry association focused on eliminating the identity theft and fraud that result from phishing and email spoofing. This group provides forums to discuss phishing issues, trials and evaluations of potential technology solutions. Publish Phishing Attack Trends Report
  • 7. TECHNOLOGICAL SOLUTIONS Ultimate solution is training the end users not to reveal any sensitive information. Basic approach for an effective anti-phishing effort includes detection, prevention and awareness. Counter measures are in the form of technological solutions, policy guidelines and user awareness.
  • 8. • Anti-phishing solution includes:a. Detection: scanning, flitering and alertingb. Mail server authenticationc. Secure web-authenticationd. Digitally signed e-maile. Mail gateway filteringf. Desktop filtering
  • 9. Secure web-authentication
  • 10. Digitally signed e-mail
  • 11. CONCLUSIONThe phishing attacks are major threat to e-commerce and e- banking applications. The scammers are making huge losses by stealing financial data from the users. There is need for adoption of counter-measure steps by the financial institutions and individual customers for fighting phishing attacks. Digital signature usage should be promoted for secure mail transactions.