Phishing attacks ppt


Published on

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • This is a “Spear Fishing” email. A phishing attack specifically targeted to a limited audience, thus making it seem more legitimate. If you HOVER your mouse over the link (DO NOT CLICK!), you will see the real URL show up as a floating box (in Outlook) or in the lower left-hand corner (in a web browser). The link above goes to NOT A good general rule for email: If the shown URL and real URL do not match, be suspicious.
  • This one is bad. Note that the URL is actually owned by NOT Note too that there is no padlock icon and the URL is not https. This means that this is not a secure connection. Never do financial business on an unsecure web site.
  • This one is good. Note the padlock and that the URL is
  • Phishing attacks ppt

    1. 1.  Pronounced "fishing“ The word has its Origin from two words “Password Harvesting ” or fishing for Passwords Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim Also known as "brand spoofing“ Phishers are phishing artists
    2. 2.  Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. It tries to trick users with official-looking messages ◦ Credit card ◦ Bank account ◦ eBay ◦ Paypal Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
    3. 3.  The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. ◦ So it doesn’t contains any useful information and hence falls under the category of spam. A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization. Techniques applied to spam message cant be applied naively to phishing messages.
    4. 4. 1) Detect and block the phishing Web sites in time2) Enhance the security of the web sites3) Block the phishing e-mails by various spam filters4) Install online anti-phishing software in user’s computers
    5. 5. i)Classification of the hyperlinks in the phishing e-mailsii) Link guard algorithmIii)Link guard implemented clientIv) Feasibility study
    6. 6.  DON’T CLICK THE LINK ◦ Type the site name in your browser (such as Never send sensitive account information by e-mail ◦ Account numbers, SSN, passwords Never give any password out to anyone Verify any person who contacts you (phone or email). ◦ If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.
    7. 7. Dear Valued Member,According to our terms of services, you will have to confirm youre-mail by the following link, or your account will be suspendedfor security reasons. following the instructions in the sheet, your account willnot be interrupted and will continue as normal. for your attention to this request. We apologize for anyinconvenience.Sincerely, Uc Abuse Department
    8. 8. SOFTWARE REQUIREMENTS:Operating System : Windows XP/2000Language : Java (J2sdk1.6.0)Database : Oracle 10gTECHNOLOGIES USED :• JSP• Servlets• Apache Tomcat 5.5
    9. 9. • Hard disk : 20 GB and above• RAM : 256 MB and above• Processor speed : 1.6 GHz and above