Your SlideShare is downloading. ×
0
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
phishing
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

phishing

332

Published on

ppt of phising.. …

ppt of phising..
easy to understand it and also easy to understand the other...!

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
332
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
35
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. PHISHING Not the kind of Fishing you are used to. Presented by: - SANDESH SUMAN B.Tech (CSE), 6th Semester Regd. No: 1101209130
  2. OUTLINE • INTRODUCTION • HISTORY • TECHNIQUES • TARGETS • DAMAGED CAUSED • PHISHING EXAMPLE • ANTI-PHISHING • PRECAUTION • CONCLUSION • REFRENCE
  3. INTRODUCTION • A collection of techniques used to manipulate people into performing actions or divulging confidential information. • Steal valuable data.
  4. HISTORY  Phreaking + Fishing = Phishing - Phreaking = making phone calls for free back in 70’s – Fishing = Use bait to lure the target  Phishing in 1995 Purpose: getting account passwords for free time Threat level: low Techniques: Similar names ( www.ao1.com for www.aol.com )  Phishing in 2001 Purpose: getting credit card numbers, accounts Threat level: medium Techniques: Same in 1995, key logger  Phishing in 2007 Purpose: bank accounts Threat level: high Techniques: browser vulnerabilities, link obfuscation
  5. TECHNIQUES • Link Manipulation Example :- www.aol.com to www.ao1.com • Filter Evasion • Website Forgery • Fake Call
  6. TECHNIQUES
  7. TARGETS
  8. Damaged Caused • 2,000,000 emails are sent • 5% get to the end user – 100,000 (APWG) • 5% click on the phishing link – 5,000 (APWG) • 2% enter data into the phishing site –100 (Gartner) • $1,200 from each person who enters data (FTC) • Potential reward: $120,000 In 2005 David Levi made over $360,000 from 160 people using an eBay Phishing scam
  9. Damaged Caused • Over 28,000 unique phishing attacks reported in Dec. 2006, about double the number from 2005 • Estimates suggest phishing affected 2 million US citizens and cost businesses billions of dollars in 2005 • Additional losses due to consumer fears
  10. Anti Phishing • Social Responses • Legal Responses • Technical Responses
  11. PRECAUTION • Never respond to an email asking for personal information • Always check the site to see if it is secure. Call the phone number if necessary • Never click on the link on the email. Retype the address in a new window • Keep your browser updated • Keep antivirus definitions updated • Use a firewall
  12. PRECAUTION
  13. CONCLUSION • No single technology will completely stop phishing. However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it
  14. REFERENCES [1] http://wikipedia.org/ downloaded on 27/12/2013 at 9:00 pm. [2] http://webopedia.com/ downloaded on 27/12/2013 at 9:00 pm. [3] http://computerworld.com/ downloaded on 28/12/2013 at 8:00 pm. [4] http://www.anti-phishing.info/ downloaded on 30/12/2013 at 8:00 pm. [5] http://lorrie.cranor.org/ downloaded on 30/12/2013 at 8:30 pm.

×