Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Phishing.pptx
1. EDU 03 : TECHNOLOGY AND COMMUNICATION IN
EDUCATION
UNIT IV : STUDENTS SAFETY ON THE NET
PHISHING
Devika Rajan Pillai
Physical Science
MTTC, Pathanapuram
2. PHISHING
• Phishing is a form of fraud in which an attacker
masquerades as a reputable entity or person in email or other
forms of communication.
• Attackers will commonly use phishing emails to distribute
malicious links or attachments that can perform a variety of
functions.
• Some will extract login credentials or account information
from victims.
3. TYPES OF PHISHING
1. Deceptive Phishing : Sending a deceptive email, in bulk, with a
“call to action” that demands the recipient click on a link.
2. Spear phishing: Spear phishing targets specific individuals instead
of a wide group of people. It is often the first step used to penetrate a
company’s defenses.
3. Whaling: When attackers go after a “big fish” like a CEO, it’s
called whaling. These attackers often spend considerable time
profiling the target.
4. Voice Phishing : the use of fraudulent phone calls to trick people
into giving money or revealing personal information.
4. IDENTIFYING PHISHING EMAILS
• The message is sent from a public email domain
• The email is poorly written : You can often tell if an email
is a scam if it contains poor spelling and grammar.
• It includes suspicious attachments or links
• The message creates a sense of urgency
• Legit companies don’t request your sensitive information
via email
5. PREVENTION OF PHISHING
• Employ common sense before handing over sensitive
information.
• Protect your computer by using security software : Set the
software to update automatically so it can deal with any new
security threats.
• Protect your accounts by using multi-factor authentication :
Some accounts offer extra security by requiring two or more
credentials to log in to your account. This is called multi-
factor authentication.
6.
7. POPULAR PHISHING SCAM
Facebook and Google
• Between 2013 and 2015, Facebook and Google were tricked out of
$100 million due to an extended phishing campaign.
• The phisher took advantage of the fact that both companies used
Quanta, a Taiwan-based company, as a vendor.
• Eventually, the scam was discovered, and Facebook and Google took
action through the US legal system.
No single security technology can completely stop phishing. A combination of
proper application of current technologies and improvements in security systems
can reduce the prevalence of phishing.